Volume 16 (2024)
Volume 15 (2023)
Volume 14 (2022)
Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
A computational model and convergence theorem for rumor dissemination in social networks

M. Amoozgar; R. Ramezanian

Volume 5, Issue 2 , July 2013, , Pages 141-154

https://doi.org/10.22042/isecure.2014.5.2.3

Abstract
  The spread of rumors, which are known as unverified statements of uncertain origin, may threaten the society and it's controlling, is important for national security councils of countries. If it would be possible to identify factors affecting spreading a rumor (such as agents’ desires, trust network, ...  Read More

Process algebraic modeling of authentication protocols for analysis of parallel multi-session executions

R. Ramezanian

Volume 1, Issue 1 , January 2009, , Pages 55-67

https://doi.org/10.22042/isecure.2015.1.1.6

Abstract
  Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role ...  Read More