Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/isecure/isecure14.bht:"
@article{DBLP:journals/isecure/000322, author = {Mohammad Ali}, title = {Attribute-Based Remote Data Auditing and User Authentication for Cloud Storage Systems}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {14}, number = {3}, pages = {43--49}, year = {2022}, url = {https://doi.org/10.22042/isecure.2022.0.0.0}, doi = {10.22042/ISECURE.2022.0.0.0}, timestamp = {Fri, 13 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isecure/000322.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/AbazarMT22, author = {Mahdieh Abazar and Peyman Masjedi and Mohammad Taheri}, title = {A Binary Relevance Adaptive Model-Selection for Ensemble Steganalysis}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {14}, number = {1}, pages = {105--113}, year = {2022}, url = {https://doi.org/10.22042/isecure.2021.262990.596}, doi = {10.22042/ISECURE.2021.262990.596}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isecure/AbazarMT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/AghaeeA22, author = {Hadi Aghaee and Bahareh Akhbari}, title = {One-Shot Achievable Secrecy Rate Regions for Quantum Interference Wiretap Channel}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {14}, number = {3}, pages = {71--80}, year = {2022}, url = {https://doi.org/10.22042/isecure.2022.14.3.8}, doi = {10.22042/ISECURE.2022.14.3.8}, timestamp = {Fri, 13 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isecure/AghaeeA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/AlidoostiNN22, author = {Mitra Alidoosti and Alireza Nowroozi and Ahmad Nickabadi}, title = {Business-Layer Session Puzzling Racer: Dynamic Security Testing Against Session Puzzling Race Conditions in Business Layer}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {14}, number = {1}, pages = {83--104}, year = {2022}, url = {https://doi.org/10.22042/isecure.2021.272808.637}, doi = {10.22042/ISECURE.2021.272808.637}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/AlidoostiNN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/AmiryousefiA22, author = {Hamid Amiryousefi and Zahra Ahmadian}, title = {Revisiting the Security and Efficiency of SP2DAS, 3PDA, and {EPPA} Smart Grid Security Protocols}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {14}, number = {2}, pages = {157--165}, year = {2022}, url = {https://doi.org/10.22042/isecure.2022.275064.645}, doi = {10.22042/ISECURE.2022.275064.645}, timestamp = {Tue, 25 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/AmiryousefiA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/AndarzianL22, author = {Seyed Behnam Andarzian and Behrouz Tork Ladani}, title = {{SANT:} Static Analysis of Native Threads for Security Vetting of Android Applications}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {14}, number = {1}, pages = {13--25}, year = {2022}, url = {https://doi.org/10.22042/isecure.2021.247906.572}, doi = {10.22042/ISECURE.2021.247906.572}, timestamp = {Tue, 25 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/AndarzianL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/AshtariSA22, author = {Amir Ashtari and Ahmad Shabani and Bijan Alizadeh}, title = {Mutual Lightweight PUF-Based Authentication Scheme Using Random Key Management Mechanism for Resource-Constrained IoT Devices}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {14}, number = {3}, pages = {1--8}, year = {2022}, url = {https://doi.org/10.22042/isecure.2022.14.3.1}, doi = {10.22042/ISECURE.2022.14.3.1}, timestamp = {Fri, 13 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isecure/AshtariSA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/DamavandiN22, author = {Sepehr Damavandi and Sadegh Dorri Nogoorani}, title = {An Electronic Voting Scheme Based on Blockchain Technology and Zero-Knowledge Proofs}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {14}, number = {3}, pages = {123--133}, year = {2022}, url = {https://doi.org/10.22042/isecure.2022.14.3.13}, doi = {10.22042/ISECURE.2022.14.3.13}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/DamavandiN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/DastanpourF22, author = {Hajar Dastanpour and Ali Fanian}, title = {A Graph-based Online Feature Selection to Improve Detection of New Attacks}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {14}, number = {2}, pages = {115--130}, year = {2022}, url = {https://doi.org/10.22042/isecure.2022.14.2.1}, doi = {10.22042/ISECURE.2022.14.2.1}, timestamp = {Tue, 25 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/DastanpourF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/DeldarAE22, author = {Fatemeh Deldar and Mahdi Abadi and Mohammad Ebrahimifard}, title = {Android Malware Detection Using One-Class Graph Neural Networks}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {14}, number = {3}, pages = {51--60}, year = {2022}, url = {https://doi.org/10.22042/isecure.2022.14.3.6}, doi = {10.22042/ISECURE.2022.14.3.6}, timestamp = {Fri, 13 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isecure/DeldarAE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/EbrahimiBZ22, author = {Mahdieh Ebrahimi and Majid Bayat and Behnam Zahednejad}, title = {A Privacy Preserving Mutual Authentication Scheme Suitable for IoT-Based Medical Systems}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {14}, number = {1}, pages = {57--68}, year = {2022}, url = {https://doi.org/10.22042/isecure.2021.183936.463}, doi = {10.22042/ISECURE.2021.183936.463}, timestamp = {Tue, 25 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/EbrahimiBZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/FarA22, author = {Saeed Banaeian Far and Maryam Rajabzadeh Assar}, title = {An Efficient Pairing-Free Identity-Based Certificateless Signcryption}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {14}, number = {1}, pages = {69--82}, year = {2022}, url = {https://doi.org/10.22042/isecure.2021.261788.587}, doi = {10.22042/ISECURE.2021.261788.587}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isecure/FarA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/GhaziAM22, author = {Seyed Salar Ghazi and Haleh Amintoosi and Sahar Pilevar Moakhar}, title = {On the Suitability of Improved TrustChain for Smartphones}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {14}, number = {3}, pages = {33--42}, year = {2022}, url = {https://doi.org/10.22042/isecure.2022.14.3.4}, doi = {10.22042/ISECURE.2022.14.3.4}, timestamp = {Fri, 13 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isecure/GhaziAM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/HajisoltaniSS22, author = {Muhamadali Hajisoltani and Raziyeh Salarifard and Hadi Soleimany}, title = {Secure and Low-Area Implementation of the {AES} Using {FPGA}}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {14}, number = {3}, pages = {93--99}, year = {2022}, url = {https://doi.org/10.22042/isecure.2022.14.3.0}, doi = {10.22042/ISECURE.2022.14.3.0}, timestamp = {Fri, 13 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isecure/HajisoltaniSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/HemmatiH22, author = {Mojtaba Hemmati and Mohammad Ali Hadavi}, title = {Bypassing Web Application Firewalls Using Deep Reinforcement Learning}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {14}, number = {2}, pages = {131--145}, year = {2022}, url = {https://doi.org/10.22042/isecure.2022.323140.744}, doi = {10.22042/ISECURE.2022.323140.744}, timestamp = {Tue, 25 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/HemmatiH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/KarampourAL22, author = {Afshin Karampour and Maede Ashouri{-}Talouki and Behrouz Tork Ladani}, title = {Light-Weight Privacy-Preserving Data Aggregation Protocols in Smart Grid Metering Networks}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {14}, number = {3}, pages = {101--112}, year = {2022}, url = {https://doi.org/10.22042/isecure.2022.14.3.11}, doi = {10.22042/ISECURE.2022.14.3.11}, timestamp = {Fri, 13 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isecure/KarampourAL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/KordiH022, author = {Farshideh Kordi and Hamed Hossein{-}Talaee and Ali Jahanian}, title = {A Time Randomization-Based Countermeasure Against the Template Side-Channel Attack}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {14}, number = {1}, pages = {47--55}, year = {2022}, url = {https://doi.org/10.22042/isecure.2021.262658.592}, doi = {10.22042/ISECURE.2021.262658.592}, timestamp = {Tue, 25 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/KordiH022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/ManaviH22, author = {Farnoush Manavi and Ali Hamzeh}, title = {Ransomware Detection Based on {PE} Header Using Convolutional Neural Networks}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {14}, number = {2}, pages = {181--192}, year = {2022}, url = {https://doi.org/10.22042/isecure.2021.262846.595}, doi = {10.22042/ISECURE.2021.262846.595}, timestamp = {Tue, 25 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/ManaviH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/MazaheriSA22, author = {Mohammad Erfan Mazaheri and Siavash Bayat Sarmadi and Farhad Taheri Ardakani}, title = {A Study of Timing Side-Channel Attacks and Countermeasures on JavaScript and WebAssembly}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {14}, number = {1}, pages = {27--46}, year = {2022}, url = {https://doi.org/10.22042/isecure.2021.263565.599}, doi = {10.22042/ISECURE.2021.263565.599}, timestamp = {Tue, 25 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/MazaheriSA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/MozafariB22, author = {Somayeh Mozafari and Amir Jalaly Bidgoly}, title = {Lightweight Identification of Android Malware with Knowledge Distillation and Deep Learning Approach}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {14}, number = {3}, pages = {81--92}, year = {2022}, url = {https://doi.org/10.22042/isecure.2022.14.3.9}, doi = {10.22042/ISECURE.2022.14.3.9}, timestamp = {Fri, 13 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isecure/MozafariB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/OraeiD22, author = {Hossein Oraei and Massoud Hadian Dehkordi}, title = {A New Variant of the Winternitz One Time Signature Based on Graded Encoding Schemes}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {14}, number = {1}, pages = {1--11}, year = {2022}, url = {https://doi.org/10.22042/isecure.2021.272908.639}, doi = {10.22042/ISECURE.2021.272908.639}, timestamp = {Tue, 25 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/OraeiD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/PalankiS22, author = {Sajjad Palanki and Alireza Shafieinejad}, title = {Attribute-Based Encryption with Efficient Attribute Revocation, Decryption Outsourcing, and Multi-Keyword Searching in Cloud Storage}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {14}, number = {3}, pages = {135--149}, year = {2022}, url = {https://doi.org/10.22042/isecure.2022.14.3.14}, doi = {10.22042/ISECURE.2022.14.3.14}, timestamp = {Fri, 13 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isecure/PalankiS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/RamzanipourVB22, author = {Hamed Ramzanipour and Navid Vafaei and Nasour Bagheri}, title = {Practical Differential Fault Analysis on CRAFT, a Lightweight Block Cipher}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {14}, number = {3}, pages = {21--31}, year = {2022}, url = {https://doi.org/10.22042/isecure.2022.14.3.3}, doi = {10.22042/ISECURE.2022.14.3.3}, timestamp = {Fri, 13 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isecure/RamzanipourVB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/RasouliT22, author = {Faeze Rasouli and Mohammad Taheri}, title = {Perfect Recovery of Small Tampers Using a Novel Fragile Watermarking Technique Based on Distributed Hamming Code}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {14}, number = {2}, pages = {147--156}, year = {2022}, url = {https://doi.org/10.22042/isecure.2022.284952.670}, doi = {10.22042/ISECURE.2022.284952.670}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isecure/RasouliT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/Rastegari22, author = {Parvin Rastegari}, title = {Attacks to Some Recently Proposed {CL-SC} Schemes and Presenting a Secure Scheme with {KSSTIS}}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {14}, number = {2}, pages = {193--213}, year = {2022}, url = {https://doi.org/10.22042/isecure.2022.266258.602}, doi = {10.22042/ISECURE.2022.266258.602}, timestamp = {Tue, 25 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/Rastegari22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/SabetiA22, author = {Vajiheh Sabeti and Mahsa Amerehei}, title = {Secure and Imperceptible Image Steganography in Discrete Wavelet Transform Using the {XOR} Logical Function and Genetic Algorithm}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {14}, number = {2}, pages = {167--179}, year = {2022}, url = {https://doi.org/10.22042/isecure.2022.274305.641}, doi = {10.22042/ISECURE.2022.274305.641}, timestamp = {Tue, 06 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isecure/SabetiA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/SadrH22, author = {Maryam Saeedi Sadr and Mohammad Ali Hadavi}, title = {SecureKV: Secure Searchable Outsourcing of Key-Value Databases to the Public Cloud}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {14}, number = {3}, pages = {113--121}, year = {2022}, url = {https://doi.org/10.22042/isecure.2022.14.3.12}, doi = {10.22042/ISECURE.2022.14.3.12}, timestamp = {Fri, 13 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isecure/SadrH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/SalamiAAJ22, author = {Zeinab Salami and Mahmoud Ahmadian{-}Attari and Mohammad Reza Aref and Hoda Jannati}, title = {Location Privacy Preservation for Secondary Users in a Database-Driven Cognitive Radio Network}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {14}, number = {2}, pages = {215--227}, year = {2022}, url = {https://doi.org/10.22042/isecure.2022.243102.568}, doi = {10.22042/ISECURE.2022.243102.568}, timestamp = {Tue, 25 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/SalamiAAJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/SayyadabdiLZ22, author = {Amirhosein Sayyadabdi and Behrouz Tork Ladani and Bahman Zamani}, title = {Towards a Formal Approach for Detection of Vulnerabilities in the Android Permissions System}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {14}, number = {3}, pages = {61--69}, year = {2022}, url = {https://doi.org/10.22042/isecure.2022.14.3.7}, doi = {10.22042/ISECURE.2022.14.3.7}, timestamp = {Fri, 13 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isecure/SayyadabdiLZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/VafaeiPRB22, author = {Navid Vafaei and Maryam Porkar and Hamed Ramzanipour and Nasour Bagheri}, title = {Practical Differential Fault Analysis on {SKINNY}}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {14}, number = {3}, pages = {9--19}, year = {2022}, url = {https://doi.org/10.22042/isecure.2022.14.3.2}, doi = {10.22042/ISECURE.2022.14.3.2}, timestamp = {Fri, 13 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isecure/VafaeiPRB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.