Volume 15 (2023)
Volume 14 (2022)
Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
Review Article
A risk model for cloud processes

E. Damiani; S. Cimato; G. Gianini

Volume 6, Issue 2 , July 2014, Pages 99-123


  Traditionally, risk assessment consists of evaluating the probability of "feared events", corresponding to known threats and attacks, as well as these events' severity, corresponding to their impact on one or more stakeholders. Assessing risks of cloud-based processes is particularly difficult due to ...  Read More

Research Article
Artemia: a family of provably secure authenticated encryption schemes

J. Alizadeh; M. R. Aref; N. Bagheri

Volume 6, Issue 2 , July 2014, Pages 125-139


  Authenticated encryption schemes establish both privacy and authenticity. This paper specifies a family of the dedicated authenticated encryption schemes, Artemia. It is an online nonce-based authenticated encryption scheme which supports the associated data. Artemia uses the permutation based mode, ...  Read More

Research Article
An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks

A. fanian; F. Alamifar; M. Berenjkoub

Volume 6, Issue 2 , July 2014, Pages 141-153


  The wireless communication with delivering variety of services to users is growing rapidly in recent years. The third generation of cellular networks (3G), and local wireless networks (WLAN) are the two widely used technologies in wireless networks. 3G networks have the capability of covering a vast ...  Read More

Research Article
A hybrid approach for database intrusion detection at transaction and inter-transaction levels

M. Doroudian; H. R. Shahriari

Volume 6, Issue 2 , July 2014, Pages 155-167


  Nowadays, information plays an important role in organizations. Sensitive information is often stored in databases. Traditional mechanisms such as encryption, access control, and authentication cannot provide a high level of confidence. Therefore, the existence of Intrusion Detection Systems in databases ...  Read More

Research Article
An extended feature set for blind image steganalysis in contourlet domain

E. Shakeri; Sh. Ghaemmaghami

Volume 6, Issue 2 , July 2014, Pages 169-181


  The aim of image steganalysis is to detect the presence of hidden messages in stego images. We propose a blind image steganalysis method in Contourlet domain and then show that the embedding process changes statistics of Contourlet coefficients. The suspicious image is transformed into Contourlet space, ...  Read More

Research Article
A two-phase wormhole attack detection scheme in MANETs

Sh. Shamaei; A. Movaghar

Volume 6, Issue 2 , July 2014, Pages 183-191


  Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols ...  Read More