default search action
ISC International Journal of Information Security, Volume 11
Volume 11, Number 1, January 2019
- Mohammad Reza Aref:
Editorial. 1-2
- Simin Ghasemi, Mohammad Ali Hadavi, Mina Niknafs:
A Trust Based Probabilistic Method for Efficient Correctness Verification in Database Outsourcing. 3-14 - Javad Ghareh Chamani, Mohammad Sadeq Dousti, Rasool Jalili, Dimitrios Papadopoulos:
SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing. 15-34 - Akbar Mahmoodi Rishakani, Mohammad Reza Mirzaee Shamsabad, Seyed Mojtaba Dehnavi, Mohammad Amin Amiri, Hamidreza Maimani, Nasour Bagheri:
Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives. 35-46 - Mansoureh Labbafniya, Roghayeh Saeidi:
Secure FPGA Design by Filling Unused Spaces. 47-56 - Siavash Ahmadi, Zahra Ahmadian, Javad Mohajeri, Mohammad Reza Aref:
Biclique Cryptanalysis of Block Ciphers LBlock and TWINE-80 with Practical Data Complexity. 57-74 - Reza Ebrahimi Atani, Shahabaddin Ebrahimi Atani, Amir Hassani Karbasi:
A New Ring-Based SPHF and PAKE Protocol On Ideal Lattices. 75-86
- Persian Abstract. 87-92
Volume 11, Number 2, July 2019
- Mohammad Reza Aref:
Editorial. 93-94
- Seyed Alireza Hasheminasab, Behrouz Tork Ladani, Tansu Alpcan:
Interdependent Security Game Design over Constrained Linear Influence Networks. 95-111 - Majid Bayat, Zahra Zare Jousheghani, Ashok Kumar Das, Pitam Singh, Saru Kumari, Mohammad Reza Aref:
A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications. 113-128 - S. Ehsan Hosiny Nezhad, Masoumeh Safkhani, Nasour Bagheri:
Relaxed Differential Fault Analysis of SHA-3. 129-143 - Siavash Ahmadi, Mohammad Reza Aref:
New Fixed Point Attacks on GOST2 Block Cipher. 145-158 - Elham Serkani, Hossein Gharaee Garakani, Naser Mohammadzadeh:
Anomaly Detection Using SVM as Classifier and Decision Tree for Optimizing Feature Vectors. 159-171 - Mohammadreza Mohammadrezaei, Mohammad Ebrahim Shiri, Amir Masoud Rahmani:
Detection of Fake Accounts in Social Networks Based on One Class Classification. 173-183
- Persian Abstract. 185-190
Volume 11, Number 3, August 2019
Editorial
- Mohammad Reza Aref:
Editorial.
- Oleksandr A. Letychevskyi, Yaroslav Hryniuk, Viktor Yakovlev, Volodymyr Peschanenko, Viktor Radchenko:
Algebraic Matching of Vulnerabilities in a Low-Level Code. 1-7 - Hadjer Saadi, Mustapha C. E. Yagoub, Rachida Touhami:
Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns. 9-17 - Ibrahim Soran, Qing Tan:
A Sudy on Information Privacy Issue on Social Networks. 19-27 - Dalia A. Shaaban, Mohamed H. Saad, Ahmed H. Madian, Hesham N. Elmahdy:
Medical Image Compression Based on Region of Interest. 29-34 - Rawan Flifel:
The Role of Packet Tracer in Learning Wireless Networks and Managing IoT Devices. 35-38 - Omed Hassan Ahmed, Joan Lu, Qiang Xu, Muzhir Shaban Al-Ani:
Face Recognition Based Rank Reduction SVD Approach. 39-50 - Areej Fatima, Muhammad Adnan Khan, Sagheer Abbas, Muhammad Waqas, Leena Anum, Muhammad Asif:
Evaluation of Planet Factors of Smart City through Multi-layer Fuzzy Logic (MFL). 51-58 - Fairouz Zendaoui, Walid-Khaled Hidouci:
Considering Uncertainty in Modeling Historical Knowledge. 59-65 - Ehab Khatter, Dina M. Ibrahim:
Proposed ST-Slotted-CS-ALOHA Protocol for Time Saving and Collision Avoidance. 67-72 - Felisa M. Córdova, Claudia A. Durán, Fredi Edgardo Palominos:
Cognitive Strategic Model applied to a Port System. 73-78 - Ahmed BaniMustafa:
Enhancing Learning from Imbalanced Classes via Data Preprocessing: A Data-Driven Application in Metabolomics Data Mining. 79-89 - Ayman Atia, Nada Shorim:
Hand Gestures Classification with Multi-Core DTW. 91-96 - Muhammad Ali Memon, Zaira Hassan, Kamran Dahri, Asadullah Shaikh, Muhammad Ali Nizamani:
Aspect Oriented UML to ECORE Model Transformation. 97-103 - Evelina Pencheva, Ivaylo Atanasov, Ivaylo Asenov:
Access and Mobility Policy Control at the Network Edge. 105-111 - Mohammed J. F. Alenazi:
Evaluating Multipath TCP Resilience against Link Failures. 113-122 - Joel E. Cordeiro Junior, Marcelo S. Alencar, José Valentim Dos Santos Filho, Karcius D. R. Assis:
A Fair Power Allocation for Non-Orthogonal Multiple Access in the Power Domain. 123-130 - Matthias Gottlieb, Marwin Shraideh, Isabel Fuhrmann, Markus Böhm, Helmut Krcmar:
Critical Success Factors for Data Virtualization: A Literature Review. 131-137 - Saad Ali Alahmari:
Using Machine Learning ARIMA to Predict the Price of Cryptocurrencies. 139-144 - Anwar Saeed, Muhammad Yousif, Areej Fatima, Sagheer Abbas, Muhammad Adnan Khan, Leena Anum, Ali Akram:
An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling. 145-151 - Tahir Alyas, Gulzar Ahmad, Yousaf Saeed, Muhammad Asif, Umer Farooq, Asma Kanwal:
Cloud and IoT based Smart Car Parking System by using Mamdani Fuzzy Inference System (MFIS). 153-160 - Wajdi Al Jedaibi, Sufian Khamis:
Towards Measuring the Project Management Process During Large Scale Software System Implementation Phase. 161-172 - Istabraq M. Al-Joboury, Emad H. Al-Hemiary:
IoT Protocols Based Fog/Cloud over High Traffic. 173-180 - Oula L. Abdulsattar, Emad H. Al-Hemiary:
Virtualized Network Management Laboratory for Educational Purposes. 181-186
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.