Volume 16 (2024)
Volume 15 (2023)
Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
Research Article
Mutual Lightweight PUF-Based Authentication Scheme Using Random Key Management Mechanism for Resource-Constrained IoT Devices

Amir Ashtari; Ahmad Shabani; Bijan Alizadeh

Volume 14, Issue 3 , October 2022, Pages 1-8

https://doi.org/10.22042/isecure.2022.14.3.1

Abstract
  This paper presents a novel RF-PUF-based authentication scheme, called RKM-PUF which takes advantage of a dynamic random key generation that depends upon both communication parties in the network to detect intrusion attacks. Unlike the existing authentication schemes, our proposed approach takes the ...  Read More

Research Article
Practical Differential Fault Analysis on SKINNY

Navid Vafaei; Maryam Porkar; Hamed Ramzanipour; Nasour Bagheri

Volume 14, Issue 3 , October 2022, Pages 9-19

https://doi.org/10.22042/isecure.2022.14.3.2

Abstract
  SKINNY is a lightweight tweakable block cipher that for the first time introduced in CRYPTO 2016. SKINNY is considered in two block sizes: 64 bits and 128 bits, as well as three TWEAK versions. In the beginning, this paper reflects our findings that improve the effectiveness of DFA analysis on SKINNY, ...  Read More

Research Article
Practical Differential Fault Analysis on CRAFT, a Lightweight Block Cipher

Hamed Ramzanipour; Navid Vafaei; Nasour Bagheri

Volume 14, Issue 3 , October 2022, Pages 21-31

https://doi.org/10.22042/isecure.2022.14.3.3

Abstract
  Differential fault analysis, a kind of active non-invasive attack, is an effective way of analyzing cryptographic primitives that have lately earned more attention. In this study, we apply this attack on CRAFT, a recently proposed lightweight tweakable block cipher, supported by simulation and experimental ...  Read More

Research Article
On the Suitability of Improved TrustChain for Smartphones

Seyed Salar Ghazi; Haleh Amintoosi; Sahar Pilevar Moakhar

Volume 14, Issue 3 , October 2022, Pages 33-42

https://doi.org/10.22042/isecure.2022.14.3.4

Abstract
  In recent years, blockchain technology has been used in many fields, including IoT and Smartphones. Since most of these devices are battery constrained and have low processing capabilities, conventional blockchains are not suitable for these types of systems. In this field, critical challenges that need ...  Read More

Research Article
Attribute-Based Remote Data Auditing and User Authentication for Cloud Storage Systems

Mohammad Ali

Volume 14, Issue 3 , October 2022, Pages 43-49

https://doi.org/10.22042/isecure.2022.0.0.0

Abstract
  Remote data auditing (RDA) protocols enable a cloud server to persuade an auditor that it is storing a data file honestly. Unlike digital signature(DS) schemes, in RDA protocols, the auditor can carry out the auditing procedure without having the entire data file. Therefore, RDA protocols seem to be ...  Read More

Research Article
Android Malware Detection Using One-Class Graph Neural Networks

Fatemeh Deldar; Mahdi Abadi; Mohammad Ebrahimifard

Volume 14, Issue 3 , October 2022, Pages 51-60

https://doi.org/10.22042/isecure.2022.14.3.6

Abstract
  With the widespread use of Android smartphones, the Android platform has become an attractive target for cybersecurity attackers and malware authors. Meanwhile, the growing emergence of zero-day malware has long been a major concern for cybersecurity researchers. This is because malware that has not ...  Read More

Research Article
Towards a Formal Approach for Detection of Vulnerabilities in the Android Permissions System

Amirhosein Sayyadabdi; Behrouz Tork Ladani; Bahman Zamani

Volume 14, Issue 3 , October 2022, Pages 61-69

https://doi.org/10.22042/isecure.2022.14.3.7

Abstract
  Android is a widely used operating system that employs a permission-based access control model. The Android Permissions System (APS) is responsible for mediating application resource requests. APS is a critical component of the Android security mechanism; hence, a failure in the design of APS can potentially ...  Read More

Research Article
One-Shot Achievable Secrecy Rate Regions for Quantum Interference Wiretap Channel

Hadi Aghaee; Bahareh Akhbari

Volume 14, Issue 3 , October 2022, Pages 71-80

https://doi.org/10.22042/isecure.2022.14.3.8

Abstract
  In this paper, we want to derive achievable secrecy rate regions for quantum interference channels with classical inputs under a one-shot setting. The main idea to this end is to use the combination of superposition and rate splitting for the encoding scheme and construct a decoding scheme based on simultaneous ...  Read More

Research Article
Lightweight Identification of Android Malware with Knowledge Distillation and Deep Learning Approach

Somayeh Mozafari; Amir Jalaly Bidgoly

Volume 14, Issue 3 , October 2022, Pages 81-92

https://doi.org/10.22042/isecure.2022.14.3.9

Abstract
  Today, with the advancement of science and technology, the use of smartphones has become very common, and the Android operating system has been able to gain lots of popularity in the meantime. However, these devices face manysecurity challenges, including malware. Malware may cause many problems in both ...  Read More

Research Article
Secure and Low-Area Implementation of the AES Using FPGA

Muhamadali Hajisoltani; Raziyeh Salarifard; Hadi Soleimany

Volume 14, Issue 3 , October 2022, Pages 93-99

https://doi.org/10.22042/isecure.2022.14.3.0

Abstract
  Masking techniques are used to protect the hardware implementation of cryptographic algorithms against side-channel attacks. Reconfigurable hardware, such as FPGA, is an ideal target for the secure implementation of cryptographic algorithms. Due to the restricted resources available to the reconfigurable ...  Read More

Research Article
Light-Weight Privacy-Preserving Data Aggregation Protocols in Smart Grid Metering Networks

Afshin Karampour; Maede Ashouri-Talouki; Behrouz Tork Ladani

Volume 14, Issue 3 , October 2022, Pages 101-112

https://doi.org/10.22042/isecure.2022.14.3.11

Abstract
  Smart grids using information technology (IT) and communication networks control smart home appliances to reduce costs and increase reliability and transparency. Preserving the privacy of the user data is one of the biggest challenges in smart grid research; by disclosing user-related data, an internal ...  Read More

Research Article
SecureKV: Secure Searchable Outsourcing of Key-Value Databases to the Public Cloud

Maryam Saeedi Sadr; Mohammad Ali Hadavi

Volume 14, Issue 3 , October 2022, Pages 113-121

https://doi.org/10.22042/isecure.2022.14.3.12

Abstract
  The use of NoSQL data and its storage in the Cloud is growing rapidly. Due to the accumulation of data in the Cloud, data security against untrusted service providers as well as external attackers becomes a more serious problem. Over the past few years, there are some efforts to secure the outsourcing ...  Read More

Research Article
An Electronic Voting Scheme Based on Blockchain Technology and Zero-Knowledge Proofs

Sepehr Damavandi; Sadegh Dorri Nogoorani

Volume 14, Issue 3 , October 2022, Pages 123-133

https://doi.org/10.22042/isecure.2022.14.3.13

Abstract
  Voting is a fundamental mechanism used by many human societies, organizations and nations to make collective decisions. There has been a tremendous effort on making this mechanism fairer, error-free and secure. Electronic voting aims to be a solution to some deficiencies of existing paper-based voting ...  Read More

Research Article
Attribute-Based Encryption with Efficient Attribute Revocation, Decryption Outsourcing, and Multi-Keyword Searching in Cloud Storage

Sajjad Palanki; Alireza Shafieinejad

Volume 14, Issue 3 , October 2022, Pages 135-149

https://doi.org/10.22042/isecure.2022.14.3.14

Abstract
  Reliable access control is a major challenge of cloud storage services. This paper presents a cloud-based file-sharing architecture with ciphertext-policy attribute-based encryption (CP-ABE) access control mechanism. In CP-ABE, the data owner can specify the ciphertext access structure, and if the user ...  Read More