Volume 15 (2023)
Volume 14 (2022)
Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
Number of Articles: 8
Editorial
Volume 8, Issue 2 , July 2016, Pages 91-92
Abstract
From the Editor-in-Chief Read MoreASIC design protection against reverse engineering during the fabrication process using automatic netlist obfuscation design flow
Volume 8, Issue 2 , July 2016, Pages 93-104
Abstract
Fab-less business model in semiconductor industry has led to serious concerns about trustworthy hardware. In untrusted foundries and manufacturing companies, submitted layout may be analyzed and reverse engineered to steal the information of a design or insert malicious Trojans. Understanding the netlist ... Read MoreTraceability improvements of a new RFID protocol based on EPC C1 G2
Volume 8, Issue 2 , July 2016, Pages 105-114
Abstract
Radio Frequency Identification (RFID) applications have spread all over the world. In order to provide their security and privacy, researchers proposed different kinds of protocols. In this paper, we analyze the privacy of a new protocol, proposed by Yu-Jehn in 2015 which is based on Electronic Product ... Read MoreA novel key management scheme for heterogeneous sensor networks based on the position of nodes
Volume 8, Issue 2 , July 2016, Pages 115-130
Abstract
Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless ... Read MoreOptimum decoder for multiplicative spread spectrum image watermarking with Laplacian modeling
Volume 8, Issue 2 , July 2016, Pages 131-139
Abstract
This paper investigates the multiplicative spread spectrum watermarking method for the image. The information bit is spreaded into middle-frequency Discrete Cosine Transform (DCT) coefficients of each block of an image using a generated pseudo-random sequence. Unlike the conventional signal modeling, ... Read MoreQuantitative evaluation of software security: an approach based on UML/SecAM and evidence theory
Volume 8, Issue 2 , July 2016, Pages 141-153
Abstract
Quantitative and model-based prediction of security in the architecture design stage facilitates early detection of design faults hence reducing modification costs in subsequent stages of software life cycle. However, an important question arises with respect to the accuracy of input parameters. In practice, ... Read MoreA note on the security of two improved RFID protocols
Volume 8, Issue 2 , July 2016, Pages 155-160
Abstract
Recently, Baghery et al. [1, 2] presented some attacks on two RFID protocols, namely Yoon and Jung et al. protocols, and proposed the improved version of them. However, in this note, we show that the improved version of the Jung et al. protocol suffers from desynchronization attack and the improved version ... Read MorePersian Abstract
Volume 8, Issue 2 , July 2016, Pages 161-166