Volume 16 (2024)
Volume 14 (2022)
Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
Research Article
Designated-Server Hierarchical Searchable Encryption in Identity-Based Setting

Danial Shiraly; Nasrollah Pakniat; Ziba Eslami

Volume 15, Issue 3 , October 2023, Pages 1-16

https://doi.org/10.22042/isecure.2023.416676.1014

Abstract
  Public key encryption with keyword search (PEKS) is a cryptographic primitive designed for performing secure search operations over encrypted data stored on untrusted cloud servers. However, in some applications of cloud computing, there is a hierarchical access-privilege setup among users so that upper-level ...  Read More

Research Article
Quantum Multiple Access Wiretap Channel: On the One-Shot Achievable Secrecy Rate Regions

Hadi Aghaee; Bahareh Akhbari

Volume 15, Issue 3 , October 2023

https://doi.org/10.22042/isecure.2023.180848

Abstract
  In this paper, we want to investigate classical-quantum multiple access wiretap channels (CQ-MA-WTC) under one-shot setting. In this regard, we analyze the CQ-MA-WTC using a simultaneous position-based decoder for reliable decoding and using a newly introduced technique to decode securely. Also, for ...  Read More

Research Article
Security Analysis and Improvement of an Access Control Scheme for Wireless Body Area Networks

Parichehr Dadkhah; Mohammad Dakhilalian; Parvin Rastegari

Volume 15, Issue 3 , October 2023

https://doi.org/10.22042/isecure.2023.180857

Abstract
  Wireless Body Area Networks (WBANs) have attracted a lot of attention in recent researches as they play a vital role in diagnosing, controlling and treating diseases. These networks can improve the quality of medical services by following the health status of people and providing online medical advice ...  Read More

Research Article
A Semi-Supervised IDS for Cyber-Physical Systems Using a Deep Learning Approach

Amirhosein Salehi; Siavash Ahmadi; Mohammad Reza Aref

Volume 15, Issue 3 , October 2023

https://doi.org/10.22042/isecure.2023.181544

Abstract
  Industrial control systems are widely used in industrial sectors and critical infrastructures to monitor and control industrial processes. Recently, the security of industrial control systems has attracted a lot of attention, because these systems are now increasingly interacting with the Internet. Classic ...  Read More

Research Article
Using ChatGPT as a Static Application Security Testing Tool

Atieh Bakhshandeh; Abdalsamad Keramatfar; Amir Norouzi; Mohammad M. Chekidehkhoun

Volume 15, Issue 3 , October 2023

https://doi.org/10.22042/isecure.2023.182082

Abstract
  In recent years, artificial intelligence has had a conspicuous growth in almost every aspect of life. One of the most applicable areas is security code review, in which a lot of AI-based tools and approaches have been proposed. Recently, ChatGPT has caught a huge amount of attention with its remarkable ...  Read More

Research Article
An Efficient Scheme for Secure Medical Data Sharing in the Cloud

Iman Jafarian; Siavash Khorsandi

Volume 15, Issue 3 , October 2023

https://doi.org/10.22042/isecure.2023.182206

Abstract
  The Internet of Things has significantly improved healthcare with its promise of transforming technological, social, and economic perspectives. Medical devices with wireless internet access enable remote monitoring of patients, and collectively, these increasingly smart and connected medical devices ...  Read More

Research Article
Private Federated Learning: An Adversarial Sanitizing Perspective

Mojtaba Shirinjani; Siavash Ahmadi; Taraneh Eghlidos; Mohammad Reza Aref

Volume 15, Issue 3 , October 2023

https://doi.org/10.22042/isecure.2023.182211

Abstract
  Large-scale data collection is challenging in alternative centralized learning as privacy concerns or prohibitive policies may rise. As a solution, Federated Learning (FL) is proposed wherein data owners, called participants, can train a common model collaboratively while their privacy is preserved. ...  Read More