Volume 16 (2024)
Volume 15 (2023)
Volume 14 (2022)
Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)

Research Article
ECKCI: An ECC-Based Authenticated Key Agreement Scheme Resistant to Key Compromise Impersonation Attack for TMIS

Fatemeh Pirmoradian; Mohammad Dakhilalian; Masoumeh Safkhani

Articles in Press, Accepted Manuscript, Available Online from 22 April 2024

https://doi.org/10.22042/isecure.2024.408640.989

Abstract
  Internet of things (IoT) is an innovation in the world of technology. Continuous technological advancements based on the IoT cloud and booming wireless technology have revolutionized the living of human and remote health monitoring of patients is no exclusion. The Telecare Medicine Information Systems ...  Read More

Research Article
Security Enhancement of an Authentication Scheme Based on DAC and Intel SGX in WSNs

Maryam Rajabzadeh Asaar; Mustafa Isam Ahmed Al-Baghdadi

Articles in Press, Accepted Manuscript, Available Online from 30 April 2024

https://doi.org/10.22042/isecure.2024.420100.1029

Abstract
  Designing authentication techniques suitable for wireless sensor networks (WSNs) with their dedicated consideration is critical due to the nature of public channel. In 2022, Liu et al. presented an authentication protocol which employs dynamic authentication credentials (DACs) and Intel software guard ...  Read More

Research Article
Boomerang Attacks on Reduced-Round Midori64

Mehmet Emin Gönen; Muhammed Said Gündoğan; Kamil Otal

Articles in Press, Accepted Manuscript, Available Online from 12 May 2024

https://doi.org/10.22042/isecure.2024.421023.1033

Abstract
  Midori64 is a lightweight SPN block cipher introduced by Banik et al. at ASIACRYPT 2015 which operates on 64-bit states through 16 rounds using a 128-bit key. In the last decade, Midori64 has been exposed to several attacks intensely. In this paper, we provide the first boomerang attack on Midori64 in ...  Read More

Research Article
Customizable Utility-Privacy Trade-Off: A Flexible Autoencoder-Based Obfuscator

Mohammad Ali Jamshidi; Mohammad Mahdi Mojahedian; Mohammad Reza Aref

Articles in Press, Accepted Manuscript, Available Online from 12 May 2024

https://doi.org/10.22042/isecure.2024.422044.1037

Abstract
  To enhance the accuracy of learning models‎, ‎it becomes imperative to train them on more extensive datasets‎. ‎Unfortunately‎, ‎access to such data is often restricted because data providers are hesitant to share their data due to privacy concerns‎. ‎Hence‎, ‎it ...  Read More