default search action
ISC International Journal of Information Security, Volume 8
Volume 8, Number 1, January 2016
- Mohammad Reza Aref:
Editorial. 1-2
- Mohsen Pourpouneh, Rasoul Ramezanian:
A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving. 3-24 - Hamidreza Amini Khorasgani, Saba Asaad, Hossein Pilaram, Taraneh Eghlidos, Mohammad Reza Aref:
On the design and security of a lattice-based threshold secret sharing scheme. 25-38 - Farzane Aminmansour, Hamid Reza Shahriari:
Aggrandizing the beast's limbs: patulous code reuse attack on ARM architecture. 39-52 - Sharareh Zamanzadeh, Ali Jahanian:
Self authentication path insertion in FPGA-based design flow for tamper-resistant purpose. 53-60 - Meisam Kamarei, Ahmad Patooghy, Mahdi Fazeli:
Unauthenticated event detection in wireless sensor networks using sensors co-coverage. 61-71 - Akram Khalesi, Hossein Bahramgiri, Davod Mansuri:
A new method for accelerating impossible differential cryptanalysis and its application on LBlock. 73-84
Volume 8, Number 2, July 2016
- Mohammad Reza Aref:
Editorial. 91-92
- Sharareh Zamanzadeh, Ali Jahanian:
ASIC design protection against reverse engineering during the fabrication process using automatic netlist obfuscation design flow. 93-104 - Seyed Salman Sajjadi GhaemMaghami, Afrooz Haghbin, Mahtab Mirmohseni:
Traceability improvements of a new RFID protocol based on EPC C1 G2. 105-114 - Taha Yasin Rezapour, Reza Ebrahimi Atani, Meer Soheil Abolghasemi:
A novel key management scheme for heterogeneous sensor networks based on the position of nodes. 115-130 - Nematollah Zarmehi, Mohammad Reza Aref:
Optimum decoder for multiplicative spread spectrum image watermarking with Laplacian modeling. 131-139 - Ali Sedaghatbaf, Mohammad Abdollahi Azgomi:
Quantitative evaluation of software security: an approach based on UML/SecAM and evidence theory. 141-153 - Masoumeh Safkhani, Nasour Bagheri:
A note on the security of two improved RFID protocols. 155-160
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.