Volume 15 (2023)
Volume 14 (2022)
Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
Number of Articles: 282
Editorial
Volume 5, Issue 1 , January 2013, , Pages 1-3
Abstract
From the Editor-in-Chief Read MoreEditorial
Volume 6, Issue 1 , January 2014, , Pages 1-2
Abstract
From the Editor-in-Chief Read MoreEditorial
Volume 1, Issue 1 , January 2009, , Pages 1-2
Abstract
From the Editor-in-Chief Read MoreEditorial
Volume 2, Issue 1 , January 2010, , Pages 1-2
Abstract
From the Editor-in-Chief Read MoreEditorial
Volume 3, Issue 1 , January 2011, , Pages 1-2
Abstract
From the Editor-in-Chief Read MoreEditorial
Volume 4, Issue 1 , January 2012, , Pages 1-2
Abstract
From the Editor-in-Chief Read MoreEditorial
Volume 7, Issue 1 , January 2015, , Pages 1-2
Abstract
From the Editor-in-Chief Read MoreEditorial
Volume 8, Issue 1 , January 2016, , Pages 1-2
Abstract
From the Editor-in-Chief Read MoreEditorial
Volume 9, Issue 1 , January 2017, , Pages 1-2
Abstract
From the Editor-in-Chief Read MoreEditorial
Volume 10, Issue 1 , January 2018, , Pages 1-2
Abstract
From the Editor-in-Chief Read MoreEditorial
Volume 11, Issue 1 , January 2019, , Pages 1-2
Abstract
From the Editor-in-Chief Read MoreExtension of Cube Attack with Probabilistic Equations and its Application on Cryptanalysis of KATAN Cipher
Volume 12, Issue 1 , January 2020, , Pages 1-12
Abstract
Cube Attack is a successful case of Algebraic Attack. Cube Attack consists of two phases, linear equation extraction and solving the extracted equation system. Due to the high complexity of equation extraction phase in finding linear equations, we can extract nonlinear ones that could be approximated ... Read MoreOT-Feature Extraction on Scrambled Images with Instantaneous Clustering for CBIR Scheme in Cloud Computing
Volume 13, Issue 1 , January 2021, , Pages 1-17
Abstract
A novel feature extraction algorithm using Otsu’s Threshold (OT-features) on scrambled images and the Instantaneous Clustering (IC-CBIR) approach is proposed for Content-Based Image Retrieval in cloud computing. Images are stored in the cloud in an encrypted or scrambled form to preserve the privacy ... Read MoreA New Variant of the Winternitz One Time Signature Based on Graded Encoding Schemes
Volume 14, Issue 1 , January 2022, , Pages 1-11
Abstract
Digital signature schemes are used to guarantee for non-repudiation and authenticity of any kind of data like documents, messages or software. The Winternitz one-time signature (WOTS) scheme, which can be described using a certain number of so-called “function chains”, plays an important ... Read MoreCloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art
Volume 15, Issue 1 , January 2023, , Pages 1-58
Abstract
Cloud computing created a revolution in the way IT organizations and IT teams manage their internal digital resources and workloads. One major drawback or limitation of cloud computing, among others, is security. Cloud computing is plagued by a plethora of threats and vulnerabilities, with new ones being ... Read MoreEditorial
Volume 2, Issue 2 , July 2010, , Pages 67-68
Abstract
From the Editor-in-Chief Read MoreEditorial
Volume 3, Issue 2 , July 2011, , Pages 67-68
Abstract
From the Editor-in-Chief Read MoreCPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking
Volume 12, Issue 2 , July 2020, , Pages 67-80
Abstract
Authenticated encryption schemes are important cryptographic primitives that received extensive attention recently. They can provide both confidentiality and authenticity services, simultaneously. Correlation power analysis (CPA) can be a thread for authenticated ciphers, similar to the any physical ... Read MoreEditorial
Volume 1, Issue 2 , July 2009, , Pages 69-70
Abstract
From the Editor-in-Chief Read MoreEditorial
Volume 10, Issue 2 , July 2018, , Pages 77-78
Abstract
From the Editor-in-Chief Read MorePrivacy Preserving Attribute-Based Encryption with Conjunctive Keyword Search for E-health Records in Cloud
Volume 13, Issue 2 , July 2021, , Pages 87-100
Abstract
The advent of cloud computing in the healthcare system makes accuracy and speed increased, costs reduced, and health services widely used. However, system users are always seriously concerned about the security of outsourced data. The ciphertext-policy attribute-based encryption (CP-ABE) is a promising ... Read MoreEditorial
Volume 7, Issue 2 , July 2015, , Pages 89-90
Abstract
From the Editor-in-Chief Read MoreEditorial
Volume 8, Issue 2 , July 2016, , Pages 91-92
Abstract
From the Editor-in-Chief Read MoreEditorial
Volume 11, Issue 2 , July 2019, , Pages 93-94
Abstract
From the Editor-in-Chief Read MoreEditorial
Volume 4, Issue 2 , July 2012, , Pages 95-96