Search dblp for Publications

export results for "toc:db/journals/isecure/isecure14.bht:"

 download as .bib file

@article{DBLP:journals/isecure/000322,
  author       = {Mohammad Ali},
  title        = {Attribute-Based Remote Data Auditing and User Authentication for Cloud
                  Storage Systems},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {43--49},
  year         = {2022},
  url          = {https://doi.org/10.22042/isecure.2022.0.0.0},
  doi          = {10.22042/ISECURE.2022.0.0.0},
  timestamp    = {Fri, 13 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isecure/000322.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/AbazarMT22,
  author       = {Mahdieh Abazar and
                  Peyman Masjedi and
                  Mohammad Taheri},
  title        = {A Binary Relevance Adaptive Model-Selection for Ensemble Steganalysis},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {14},
  number       = {1},
  pages        = {105--113},
  year         = {2022},
  url          = {https://doi.org/10.22042/isecure.2021.262990.596},
  doi          = {10.22042/ISECURE.2021.262990.596},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isecure/AbazarMT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/AghaeeA22,
  author       = {Hadi Aghaee and
                  Bahareh Akhbari},
  title        = {One-Shot Achievable Secrecy Rate Regions for Quantum Interference
                  Wiretap Channel},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {71--80},
  year         = {2022},
  url          = {https://doi.org/10.22042/isecure.2022.14.3.8},
  doi          = {10.22042/ISECURE.2022.14.3.8},
  timestamp    = {Fri, 13 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isecure/AghaeeA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/AlidoostiNN22,
  author       = {Mitra Alidoosti and
                  Alireza Nowroozi and
                  Ahmad Nickabadi},
  title        = {Business-Layer Session Puzzling Racer: Dynamic Security Testing Against
                  Session Puzzling Race Conditions in Business Layer},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {14},
  number       = {1},
  pages        = {83--104},
  year         = {2022},
  url          = {https://doi.org/10.22042/isecure.2021.272808.637},
  doi          = {10.22042/ISECURE.2021.272808.637},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/AlidoostiNN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/AmiryousefiA22,
  author       = {Hamid Amiryousefi and
                  Zahra Ahmadian},
  title        = {Revisiting the Security and Efficiency of SP2DAS, 3PDA, and {EPPA}
                  Smart Grid Security Protocols},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {157--165},
  year         = {2022},
  url          = {https://doi.org/10.22042/isecure.2022.275064.645},
  doi          = {10.22042/ISECURE.2022.275064.645},
  timestamp    = {Tue, 25 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/AmiryousefiA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/AndarzianL22,
  author       = {Seyed Behnam Andarzian and
                  Behrouz Tork Ladani},
  title        = {{SANT:} Static Analysis of Native Threads for Security Vetting of
                  Android Applications},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {14},
  number       = {1},
  pages        = {13--25},
  year         = {2022},
  url          = {https://doi.org/10.22042/isecure.2021.247906.572},
  doi          = {10.22042/ISECURE.2021.247906.572},
  timestamp    = {Tue, 25 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/AndarzianL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/AshtariSA22,
  author       = {Amir Ashtari and
                  Ahmad Shabani and
                  Bijan Alizadeh},
  title        = {Mutual Lightweight PUF-Based Authentication Scheme Using Random Key
                  Management Mechanism for Resource-Constrained IoT Devices},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {1--8},
  year         = {2022},
  url          = {https://doi.org/10.22042/isecure.2022.14.3.1},
  doi          = {10.22042/ISECURE.2022.14.3.1},
  timestamp    = {Fri, 13 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isecure/AshtariSA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/DamavandiN22,
  author       = {Sepehr Damavandi and
                  Sadegh Dorri Nogoorani},
  title        = {An Electronic Voting Scheme Based on Blockchain Technology and Zero-Knowledge
                  Proofs},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {123--133},
  year         = {2022},
  url          = {https://doi.org/10.22042/isecure.2022.14.3.13},
  doi          = {10.22042/ISECURE.2022.14.3.13},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/DamavandiN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/DastanpourF22,
  author       = {Hajar Dastanpour and
                  Ali Fanian},
  title        = {A Graph-based Online Feature Selection to Improve Detection of New
                  Attacks},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {115--130},
  year         = {2022},
  url          = {https://doi.org/10.22042/isecure.2022.14.2.1},
  doi          = {10.22042/ISECURE.2022.14.2.1},
  timestamp    = {Tue, 25 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/DastanpourF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/DeldarAE22,
  author       = {Fatemeh Deldar and
                  Mahdi Abadi and
                  Mohammad Ebrahimifard},
  title        = {Android Malware Detection Using One-Class Graph Neural Networks},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {51--60},
  year         = {2022},
  url          = {https://doi.org/10.22042/isecure.2022.14.3.6},
  doi          = {10.22042/ISECURE.2022.14.3.6},
  timestamp    = {Fri, 13 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isecure/DeldarAE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/EbrahimiBZ22,
  author       = {Mahdieh Ebrahimi and
                  Majid Bayat and
                  Behnam Zahednejad},
  title        = {A Privacy Preserving Mutual Authentication Scheme Suitable for IoT-Based
                  Medical Systems},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {14},
  number       = {1},
  pages        = {57--68},
  year         = {2022},
  url          = {https://doi.org/10.22042/isecure.2021.183936.463},
  doi          = {10.22042/ISECURE.2021.183936.463},
  timestamp    = {Tue, 25 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/EbrahimiBZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/FarA22,
  author       = {Saeed Banaeian Far and
                  Maryam Rajabzadeh Assar},
  title        = {An Efficient Pairing-Free Identity-Based Certificateless Signcryption},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {14},
  number       = {1},
  pages        = {69--82},
  year         = {2022},
  url          = {https://doi.org/10.22042/isecure.2021.261788.587},
  doi          = {10.22042/ISECURE.2021.261788.587},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isecure/FarA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/GhaziAM22,
  author       = {Seyed Salar Ghazi and
                  Haleh Amintoosi and
                  Sahar Pilevar Moakhar},
  title        = {On the Suitability of Improved TrustChain for Smartphones},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {33--42},
  year         = {2022},
  url          = {https://doi.org/10.22042/isecure.2022.14.3.4},
  doi          = {10.22042/ISECURE.2022.14.3.4},
  timestamp    = {Fri, 13 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isecure/GhaziAM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/HajisoltaniSS22,
  author       = {Muhamadali Hajisoltani and
                  Raziyeh Salarifard and
                  Hadi Soleimany},
  title        = {Secure and Low-Area Implementation of the {AES} Using {FPGA}},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {93--99},
  year         = {2022},
  url          = {https://doi.org/10.22042/isecure.2022.14.3.0},
  doi          = {10.22042/ISECURE.2022.14.3.0},
  timestamp    = {Fri, 13 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isecure/HajisoltaniSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/HemmatiH22,
  author       = {Mojtaba Hemmati and
                  Mohammad Ali Hadavi},
  title        = {Bypassing Web Application Firewalls Using Deep Reinforcement Learning},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {131--145},
  year         = {2022},
  url          = {https://doi.org/10.22042/isecure.2022.323140.744},
  doi          = {10.22042/ISECURE.2022.323140.744},
  timestamp    = {Tue, 25 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/HemmatiH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/KarampourAL22,
  author       = {Afshin Karampour and
                  Maede Ashouri{-}Talouki and
                  Behrouz Tork Ladani},
  title        = {Light-Weight Privacy-Preserving Data Aggregation Protocols in Smart
                  Grid Metering Networks},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {101--112},
  year         = {2022},
  url          = {https://doi.org/10.22042/isecure.2022.14.3.11},
  doi          = {10.22042/ISECURE.2022.14.3.11},
  timestamp    = {Fri, 13 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isecure/KarampourAL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/KordiH022,
  author       = {Farshideh Kordi and
                  Hamed Hossein{-}Talaee and
                  Ali Jahanian},
  title        = {A Time Randomization-Based Countermeasure Against the Template Side-Channel
                  Attack},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {14},
  number       = {1},
  pages        = {47--55},
  year         = {2022},
  url          = {https://doi.org/10.22042/isecure.2021.262658.592},
  doi          = {10.22042/ISECURE.2021.262658.592},
  timestamp    = {Tue, 25 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/KordiH022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/ManaviH22,
  author       = {Farnoush Manavi and
                  Ali Hamzeh},
  title        = {Ransomware Detection Based on {PE} Header Using Convolutional Neural
                  Networks},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {181--192},
  year         = {2022},
  url          = {https://doi.org/10.22042/isecure.2021.262846.595},
  doi          = {10.22042/ISECURE.2021.262846.595},
  timestamp    = {Tue, 25 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/ManaviH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/MazaheriSA22,
  author       = {Mohammad Erfan Mazaheri and
                  Siavash Bayat Sarmadi and
                  Farhad Taheri Ardakani},
  title        = {A Study of Timing Side-Channel Attacks and Countermeasures on JavaScript
                  and WebAssembly},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {14},
  number       = {1},
  pages        = {27--46},
  year         = {2022},
  url          = {https://doi.org/10.22042/isecure.2021.263565.599},
  doi          = {10.22042/ISECURE.2021.263565.599},
  timestamp    = {Tue, 25 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/MazaheriSA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/MozafariB22,
  author       = {Somayeh Mozafari and
                  Amir Jalaly Bidgoly},
  title        = {Lightweight Identification of Android Malware with Knowledge Distillation
                  and Deep Learning Approach},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {81--92},
  year         = {2022},
  url          = {https://doi.org/10.22042/isecure.2022.14.3.9},
  doi          = {10.22042/ISECURE.2022.14.3.9},
  timestamp    = {Fri, 13 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isecure/MozafariB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/OraeiD22,
  author       = {Hossein Oraei and
                  Massoud Hadian Dehkordi},
  title        = {A New Variant of the Winternitz One Time Signature Based on Graded
                  Encoding Schemes},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {14},
  number       = {1},
  pages        = {1--11},
  year         = {2022},
  url          = {https://doi.org/10.22042/isecure.2021.272908.639},
  doi          = {10.22042/ISECURE.2021.272908.639},
  timestamp    = {Tue, 25 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/OraeiD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/PalankiS22,
  author       = {Sajjad Palanki and
                  Alireza Shafieinejad},
  title        = {Attribute-Based Encryption with Efficient Attribute Revocation, Decryption
                  Outsourcing, and Multi-Keyword Searching in Cloud Storage},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {135--149},
  year         = {2022},
  url          = {https://doi.org/10.22042/isecure.2022.14.3.14},
  doi          = {10.22042/ISECURE.2022.14.3.14},
  timestamp    = {Fri, 13 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isecure/PalankiS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/RamzanipourVB22,
  author       = {Hamed Ramzanipour and
                  Navid Vafaei and
                  Nasour Bagheri},
  title        = {Practical Differential Fault Analysis on CRAFT, a Lightweight Block
                  Cipher},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {21--31},
  year         = {2022},
  url          = {https://doi.org/10.22042/isecure.2022.14.3.3},
  doi          = {10.22042/ISECURE.2022.14.3.3},
  timestamp    = {Fri, 13 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isecure/RamzanipourVB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/RasouliT22,
  author       = {Faeze Rasouli and
                  Mohammad Taheri},
  title        = {Perfect Recovery of Small Tampers Using a Novel Fragile Watermarking
                  Technique Based on Distributed Hamming Code},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {147--156},
  year         = {2022},
  url          = {https://doi.org/10.22042/isecure.2022.284952.670},
  doi          = {10.22042/ISECURE.2022.284952.670},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isecure/RasouliT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Rastegari22,
  author       = {Parvin Rastegari},
  title        = {Attacks to Some Recently Proposed {CL-SC} Schemes and Presenting a
                  Secure Scheme with {KSSTIS}},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {193--213},
  year         = {2022},
  url          = {https://doi.org/10.22042/isecure.2022.266258.602},
  doi          = {10.22042/ISECURE.2022.266258.602},
  timestamp    = {Tue, 25 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/Rastegari22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/SabetiA22,
  author       = {Vajiheh Sabeti and
                  Mahsa Amerehei},
  title        = {Secure and Imperceptible Image Steganography in Discrete Wavelet Transform
                  Using the {XOR} Logical Function and Genetic Algorithm},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {167--179},
  year         = {2022},
  url          = {https://doi.org/10.22042/isecure.2022.274305.641},
  doi          = {10.22042/ISECURE.2022.274305.641},
  timestamp    = {Tue, 06 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isecure/SabetiA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/SadrH22,
  author       = {Maryam Saeedi Sadr and
                  Mohammad Ali Hadavi},
  title        = {SecureKV: Secure Searchable Outsourcing of Key-Value Databases to
                  the Public Cloud},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {113--121},
  year         = {2022},
  url          = {https://doi.org/10.22042/isecure.2022.14.3.12},
  doi          = {10.22042/ISECURE.2022.14.3.12},
  timestamp    = {Fri, 13 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isecure/SadrH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/SalamiAAJ22,
  author       = {Zeinab Salami and
                  Mahmoud Ahmadian{-}Attari and
                  Mohammad Reza Aref and
                  Hoda Jannati},
  title        = {Location Privacy Preservation for Secondary Users in a Database-Driven
                  Cognitive Radio Network},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {215--227},
  year         = {2022},
  url          = {https://doi.org/10.22042/isecure.2022.243102.568},
  doi          = {10.22042/ISECURE.2022.243102.568},
  timestamp    = {Tue, 25 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/SalamiAAJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/SayyadabdiLZ22,
  author       = {Amirhosein Sayyadabdi and
                  Behrouz Tork Ladani and
                  Bahman Zamani},
  title        = {Towards a Formal Approach for Detection of Vulnerabilities in the
                  Android Permissions System},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {61--69},
  year         = {2022},
  url          = {https://doi.org/10.22042/isecure.2022.14.3.7},
  doi          = {10.22042/ISECURE.2022.14.3.7},
  timestamp    = {Fri, 13 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isecure/SayyadabdiLZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/VafaeiPRB22,
  author       = {Navid Vafaei and
                  Maryam Porkar and
                  Hamed Ramzanipour and
                  Nasour Bagheri},
  title        = {Practical Differential Fault Analysis on {SKINNY}},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {9--19},
  year         = {2022},
  url          = {https://doi.org/10.22042/isecure.2022.14.3.2},
  doi          = {10.22042/ISECURE.2022.14.3.2},
  timestamp    = {Fri, 13 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isecure/VafaeiPRB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics