


default search action
ISC International Journal of Information Security, Volume 15
Volume 15, Number 1, January 2023
- Suryateja S. Pericherla

:
Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art. 1-58 - Hayyan Hasan

, Hasan Deeb, Behrouz Tork Ladani:
A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware. 59-71 - Omid Torki, Maede Ashouri-Talouki, Mojtaba Mahdavi:

Hierarchical Deterministic Wallets for Secure Steganography in Blockchain. 73-81 - Ali Khosravi, Taraneh Eghlidos:

Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon's Algorithm. 83-95 - Sina Abdollahi, Javad Mohajeri, Mahmoud Salmasizadeh:

Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT. 97-110 - Mahdi Sajadieh, Arash Mirzaei:

4n × 4n Diffusion Layers Based on Multiple 4 × 4 MDS Matrices. 111-124 - Mohammad Ebrahim Ebrahimi Kiasari, Nasrollah Pakniat, Abdolrasoul Mirghadri, Mojtaba Nazari:

A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem. 125-135 - Bahram Rashidi:

Lightweight Cryptographic S-Boxes Based on Efficient Hardware Structures for Block Ciphers. 137-151
Volume 15, Number 2, July 2023
- Habib Allah Yajam

, Mohammad Ali Akhaee:
Analysis of IOTA Tangle Stability in High Transaction Rates. - Farhad Taheri Ardakani, Siavash Bayat Sarmadi:

MISC: Multi-Input Secure Two-Party Computation. - Ali Ahmadian Ramaki

, Abbas Ghaemi Bafghi, Abbas Rasoolzadegan:
Towards Event Aggregation for Reducing the Volume of Logged Events During IKC Stages of APT Attacks. - Hamid Mala

, Mohammad Reza Saeidi:
Secure Outsourcing of Two Standard Identity-Based Cryptosystems. - Faeze Rasouli, Mohammad Taheri

, Reza Rohani Sarvestani:
A Fragile Watermarking by Hamming Code on Distributed Pixels with Perfect Recovery for Small Tampers. - Maryam Azadmanesh, Behrouz Shahgholi Ghahfarokhi

, Maede Ashouri-Talouki:
An Auto-Encoder based Membership Inference Attack against Generative Adversarial Network. - Mansoureh Labbafniya, Hamed Yusefi, Akram Khalesi:

Reverse Engineering of Authentication Protocol in DesFire. - Maryam Rezaei Kashi, Mojtaba Bahramian:

Oblivious Transfer Using Generalized Jacobian of Elliptic Curves.
Volume 15, Number 3, October 2023
- Danial Shiraly, Nasrollah Pakniat, Ziba Eslami:

Designated-Server Hierarchical Searchable Encryption in Identity-Based Setting. 1-16 - Hadi Aghaee, Bahareh Akhbari:

Quantum Multiple Access Wiretap Channel: On the One-Shot Achievable Secrecy Rate Regions. - Parichehr Dadkhah, Mohammad Dakhilalian

, Parvin Rastegari:
Security Analysis and Improvement of an Access Control Scheme for Wireless Body Area Networks. - Amirhosein Salehi, Siavash Ahmadi, Mohammad Reza Aref:

A Semi-Supervised IDS for Cyber-Physical Systems Using a Deep Learning Approach.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














