Volume 16 (2024)
Volume 15 (2023)
Volume 14 (2022)
Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
An Auto-Encoder based Membership Inference Attack against Generative Adversarial Network

Maryam Azadmanesh; Behrouz Shahgholi Ghahfarokhi; Maede Ashouri-Talouki

Volume 15, Issue 2 , July 2023, , Pages 240-253

https://doi.org/10.22042/isecure.2022.320282.735

Abstract
  Using generative models to produce unlimited synthetic samples is a popular replacement for database sharing. Generative Adversarial Network (GAN) is a popular class of generative models which generates synthetic data samples very similar to real training datasets. However, GAN models do not necessarily ...  Read More

Hierarchical Deterministic Wallets for Secure Steganography in Blockchain

Omid Torki; Maede Ashouri-Talouki; Mojtaba Mahdavi

Volume 15, Issue 1 , January 2023, , Pages 73-81

https://doi.org/10.22042/isecure.2022.319074.729

Abstract
  Steganography is a solution for covert communication and blockchain is a p2p network for data transmission, so the benefits of blockchain can be used in steganography. In this paper, we discuss the advantages of blockchain in steganography, which include the ability to embed hidden data without manual ...  Read More

Light-Weight Privacy-Preserving Data Aggregation Protocols in Smart Grid Metering Networks

Afshin Karampour; Maede Ashouri-Talouki; Behrouz Tork Ladani

Volume 14, Issue 3 , October 2022, , Pages 101-112

https://doi.org/10.22042/isecure.2022.14.3.11

Abstract
  Smart grids using information technology (IT) and communication networks control smart home appliances to reduce costs and increase reliability and transparency. Preserving the privacy of the user data is one of the biggest challenges in smart grid research; by disclosing user-related data, an internal ...  Read More

Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems

Maryam Zarezadeh; Maede Ashouri-Talouki; Mohammad Siavashi

Volume 12, Issue 2 , July 2020, , Pages 129-140

https://doi.org/10.22042/isecure.2020.174338.458

Abstract
  Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha ...  Read More

An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks

A. Mohseni-Ejiyeh; M. Ashouri-Talouki; M. Mahdavi

Volume 10, Issue 1 , January 2018, , Pages 15-27

https://doi.org/10.22042/isecure.2018.111195.401

Abstract
  Due to the explosion of smart devices, data traffic over cellular networks has seen an exponential rise in recent years. This increase in mobile data traffic has caused an immediate need for offloading traffic from operators. Device-to-Device(D2D) communication is a promising solution to boost the ...  Read More