Stop the war!
Остановите войну!
for scientists:
default search action
ISC International Journal of Information Security, Volume 15
Volume 15, Number 1, January 2023
- Suryateja S. Pericherla:
Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art. 1-58 - Hayyan Hasan, Hasan Deeb, Behrouz Tork Ladani:
A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware. 59-71 - Omid Torki, Maede Ashouri-Talouki, Mojtaba Mahdavi:
Hierarchical Deterministic Wallets for Secure Steganography in Blockchain. 73-81 - Ali Khosravi, Taraneh Eghlidos:
Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon's Algorithm. 83-95 - Sina Abdollahi, Javad Mohajeri, Mahmoud Salmasizadeh:
Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT. 97-110 - Mahdi Sajadieh, Arash Mirzaei:
4n × 4n Diffusion Layers Based on Multiple 4 × 4 MDS Matrices. 111-124 - Mohammad Ebrahim Ebrahimi Kiasari, Nasrollah Pakniat, Abdolrasoul Mirghadri, Mojtaba Nazari:
A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem. 125-135 - Bahram Rashidi:
Lightweight Cryptographic S-Boxes Based on Efficient Hardware Structures for Block Ciphers. 137-151
Volume 15, Number 2, July 2023
- Habib Allah Yajam, Mohammad Ali Akhaee:
Analysis of IOTA Tangle Stability in High Transaction Rates. - Farhad Taheri Ardakani, Siavash Bayat Sarmadi:
MISC: Multi-Input Secure Two-Party Computation. - Ali Ahmadian Ramaki, Abbas Ghaemi Bafghi, Abbas Rasoolzadegan:
Towards Event Aggregation for Reducing the Volume of Logged Events During IKC Stages of APT Attacks. - Hamid Mala, Mohammad Reza Saeidi:
Secure Outsourcing of Two Standard Identity-Based Cryptosystems. - Faeze Rasouli, Mohammad Taheri, Reza Rohani Sarvestani:
A Fragile Watermarking by Hamming Code on Distributed Pixels with Perfect Recovery for Small Tampers. - Maryam Azadmanesh, Behrouz Shahgholi Ghahfarokhi, Maede Ashouri-Talouki:
An Auto-Encoder based Membership Inference Attack against Generative Adversarial Network. - Mansoureh Labbafniya, Hamed Yusefi, Akram Khalesi:
Reverse Engineering of Authentication Protocol in DesFire. - Maryam Rezaei Kashi, Mojtaba Bahramian:
Oblivious Transfer Using Generalized Jacobian of Elliptic Curves.
Volume 15, Number 3, October 2023
- Danial Shiraly, Nasrollah Pakniat, Ziba Eslami:
Designated-Server Hierarchical Searchable Encryption in Identity-Based Setting. 1-16 - Hadi Aghaee, Bahareh Akhbari:
Quantum Multiple Access Wiretap Channel: On the One-Shot Achievable Secrecy Rate Regions. - Parichehr Dadkhah, Mohammad Dakhilalian, Parvin Rastegari:
Security Analysis and Improvement of an Access Control Scheme for Wireless Body Area Networks. - Amirhosein Salehi, Siavash Ahmadi, Mohammad Reza Aref:
A Semi-Supervised IDS for Cyber-Physical Systems Using a Deep Learning Approach.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.