Volume 16 (2024)
Volume 15 (2023)
Volume 14 (2022)
Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 1 (2009)
Review Article
Authorization models for secure information sharing: a survey and research agenda

F. Salim; J. Reid; E. Dawson

Volume 2, Issue 2 , July 2010, Pages 69-87

https://doi.org/10.22042/isecure.2015.2.2.2

Abstract
  This article presents a survey of authorization models and considers their 'fitness-for-purpose' in facilitating information sharing. Network-supported information sharing is an important technical capability that underpins collaboration in support of dynamic and unpredictable activities such as emergency ...  Read More

Research Article
An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks

A. Fanian; M. Berenjkoub; H. Saidi; T. A. Gulliver

Volume 2, Issue 2 , July 2010, Pages 89-105

https://doi.org/10.22042/isecure.2015.2.2.3

Abstract
  An essential requirement for providing secure services in wireless sensor networks is the ability to establish pairwise keys among sensors. Due to resource constraints on the sensors, the key establishment scheme should not create significant overhead. To date, several key establishment schemes have ...  Read More

Research Article
High capacity steganography tool for Arabic text using 'Kashida'

A. Abdul-Aziz Gutub; A. A. Al-Nazer

Volume 2, Issue 2 , July 2010, Pages 107-118

https://doi.org/10.22042/isecure.2015.2.2.4

Abstract
  Steganography is the ability to hide secret information in a cover-media such as sound, pictures and text. A new approach is proposed to hide a secret into Arabic text cover media using "Kashida", an Arabic extension character. The proposed approach is an attempt to maximize the use of "Kashida" to hide ...  Read More

Research Article
Detection of perturbed quantization (PQ) steganography based on empirical matrix

M. Abolghasemi; H. Aghaeinia; K. Faez

Volume 2, Issue 2 , July 2010, Pages 119-128

https://doi.org/10.22042/isecure.2015.2.2.5

Abstract
  Perturbed Quantization (PQ) steganography scheme is almost undetectable with the current steganalysis methods. We present a new steganalysis method for detection of this data hiding algorithm. We show that the PQ method distorts the dependencies of DCT coefficient values; especially changes much lower ...  Read More