Volume 15 (2023)
Volume 14 (2022)
Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
Number of Articles: 8
Editorial
Volume 7, Issue 1 , January 2015, Pages 1-2
Abstract
From the Editor-in-Chief Read MoreA traceable optimistic fair exchange protocol in the standard model
Volume 7, Issue 1 , January 2015, Pages 3-14
Abstract
An Optimistic Fair Exchange (OFE) protocol is a good way for two parties to exchange their digital items in a fair way such that at the end of the protocol execution, both of them receive their items or none of them receive anything. In an OFE protocol there is a semi-trusted third party, named arbitrator, ... Read MoreA novel local search method for microaggregation
Volume 7, Issue 1 , January 2015, Pages 15-26
Abstract
In this paper, we propose an effective microaggregation algorithm to produce a more useful protected data for publishing. Microaggregation is mapped to a clustering problem with known minimum and maximum group size constraints. In this scheme, the goal is to cluster n records into groups of at least ... Read MoreA combination of semantic and attribute-based access control model for virtual organizations
Volume 7, Issue 1 , January 2015, Pages 27-45
Abstract
A Virtual Organization (VO) consists of some real organizations with common interests, which aims to provide inter organizational associations to reach some common goals by sharing their resources with each other. Providing security mechanisms, and especially a suitable access control mechanism, which ... Read MoreOptimizing image steganography by combining the GA and ICA
Volume 7, Issue 1 , January 2015, Pages 47-58
Abstract
In this study, a novel approach which uses combination of steganography and cryptography for hiding information into digital images as host media is proposed. In the process, secret data is first encrypted using the mono-alphabetic substitution cipher method and then the encrypted secret data is embedded ... Read MoreGGRA: a grouped gossip-based reputation aggregation algorithm
Volume 7, Issue 1 , January 2015, Pages 59-74
Abstract
An important issue in P2P networks is the existence of malicious nodes that decreases the performance of such networks. Reputation system in which nodes are ranked based on their behavior, is one of the proposed solutions to detect and isolate malicious (low ranked) nodes. Gossip Trust is an interesting ... Read MoreSecurity-aware register placement to hinder malicious hardware updating and improve Trojan detectability
Volume 7, Issue 1 , January 2015, Pages 75-81
Abstract
Nowadays, bulk of the designers prefer to outsource some parts of their design and fabrication process to the third-part companies due to the reliability problems, manufacturing cost and time-to-market limitations. In this situation, there are a lot of opportunities for malicious alterations by the off-shore ... Read MorePersian Abstract
Volume 7, Issue 1 , January 2015, Pages 83-88