ISECURE Journal
Editor at ISECURE Journal
Tehran Province, Iran
15 followers
1 connection
Tehran Province, Iran
15 followers
1 connection
ISECURE Journal
Activity
-
Designated-Server Hierarchical Searchable Encryption in Identity-Based Setting Document Type : Research Article Authors: Danial Shiraly 1, Nasrollah…
Designated-Server Hierarchical Searchable Encryption in Identity-Based Setting Document Type : Research Article Authors: Danial Shiraly 1, Nasrollah…
Shared by ISECURE Journal
-
Quantum Multiple Access Wiretap Channel: On the One-Shot Achievable Secrecy Rate Regions Document Type : Research Article Authors: Hadi Aghaee…
Quantum Multiple Access Wiretap Channel: On the One-Shot Achievable Secrecy Rate Regions Document Type : Research Article Authors: Hadi Aghaee…
Shared by ISECURE Journal
-
Security Analysis and Improvement of an Access Control Scheme for Wireless Body Area Networks Document Type : Research Article Authors: Parichehr…
Security Analysis and Improvement of an Access Control Scheme for Wireless Body Area Networks Document Type : Research Article Authors: Parichehr…
Shared by ISECURE Journal
Experience
-
Editor
ISECURE Journal
More activity by ISECURE
-
A Semi-Supervised IDS for Cyber-Physical Systems Using a Deep Learning Approach Document Type : Research Article Authors:Amirhosein Salehi 1…
A Semi-Supervised IDS for Cyber-Physical Systems Using a Deep Learning Approach Document Type : Research Article Authors:Amirhosein Salehi 1…
Shared by ISECURE Journal
-
Using ChatGPT as a Static Application Security Testing Tool Document Type : Research Article Authors: Atieh Bakhshandeh, Abdalsamad Keramatfar, Amir…
Using ChatGPT as a Static Application Security Testing Tool Document Type : Research Article Authors: Atieh Bakhshandeh, Abdalsamad Keramatfar, Amir…
Shared by ISECURE Journal
-
An Efficient Scheme for Secure Medical Data Sharing in the Cloud Document Type : Research Article Authors: Iman Jafarian, Siavash Khorsandi Faculty…
An Efficient Scheme for Secure Medical Data Sharing in the Cloud Document Type : Research Article Authors: Iman Jafarian, Siavash Khorsandi Faculty…
Shared by ISECURE Journal
-
Private Federated Learning: An Adversarial Sanitizing Perspective Document Type : Research Article Authors:Mojtaba Shirinjani 1, Siavash Ahmadi 2…
Private Federated Learning: An Adversarial Sanitizing Perspective Document Type : Research Article Authors:Mojtaba Shirinjani 1, Siavash Ahmadi 2…
Shared by ISECURE Journal
-
A Lightweight Mutual Authentication Scheme for VANETs Between Vehicles and RSUs Document Type : Research Article Authors:Mohamadreza Amani 1…
A Lightweight Mutual Authentication Scheme for VANETs Between Vehicles and RSUs Document Type : Research Article Authors:Mohamadreza Amani 1…
Shared by ISECURE Journal
-
New Variations of Discrete Logarithm Problem Document Type : Research Article Authors: Mahdi Mahdavi Oliaee, Sahar Khaleghifard, Zahra Ahmadian…
New Variations of Discrete Logarithm Problem Document Type : Research Article Authors: Mahdi Mahdavi Oliaee, Sahar Khaleghifard, Zahra Ahmadian…
Shared by ISECURE Journal
-
Post Quantum Digital Signature Based on the McEliece Cryptosystems with Dual Inverse Matrix Document Type : Research Article Authors: Farshid…
Post Quantum Digital Signature Based on the McEliece Cryptosystems with Dual Inverse Matrix Document Type : Research Article Authors: Farshid…
Shared by ISECURE Journal
-
HyLock: Hybrid Logic Locking Based on Structural Fuzzing for Resisting Learning-based Attacks Document Type : Research Article Authors: Mohammad…
HyLock: Hybrid Logic Locking Based on Structural Fuzzing for Resisting Learning-based Attacks Document Type : Research Article Authors: Mohammad…
Shared by ISECURE Journal
-
A Lightweight RFID Grouping Proof Protocol With Forward Secrecy and Resistant to Reader Compromised Attack Document Type : Research Article Authors:…
A Lightweight RFID Grouping Proof Protocol With Forward Secrecy and Resistant to Reader Compromised Attack Document Type : Research Article Authors:…
Shared by ISECURE Journal
-
New Directions in the Design of Binary Matrices for SPN Block Ciphers Document Type : Research Article Authors: Mahdi Sajadieh 1, Arash Mirzaei…
New Directions in the Design of Binary Matrices for SPN Block Ciphers Document Type : Research Article Authors: Mahdi Sajadieh 1, Arash Mirzaei…
Shared by ISECURE Journal
-
Integral Cryptanalysis of Reduced-Round SAND-64 Based on Bit-Based Division Property Document Type : Research Article Authors Atiyeh Mirzaie…
Integral Cryptanalysis of Reduced-Round SAND-64 Based on Bit-Based Division Property Document Type : Research Article Authors Atiyeh Mirzaie…
Shared by ISECURE Journal
-
Cross-Device Deep Learning Side-Channel Attacks using Filter and Autoencoder Document Type : Research Article Authors Maryam Tabaeifard ,Ali Jahanian…
Cross-Device Deep Learning Side-Channel Attacks using Filter and Autoencoder Document Type : Research Article Authors Maryam Tabaeifard ,Ali Jahanian…
Shared by ISECURE Journal
-
The Impact of The Biometric System on Election Fraud Elimination: Case of The North of IRAQ Document Type : Research Article Authors Musbah Aqel…
The Impact of The Biometric System on Election Fraud Elimination: Case of The North of IRAQ Document Type : Research Article Authors Musbah Aqel…
Shared by ISECURE Journal
-
A Comparison Study between Intelligent Decision Support Systems and Decision Support Systems Authors Mosleh Zeebaree 1 Musbah Aqel 2 1 Department…
A Comparison Study between Intelligent Decision Support Systems and Decision Support Systems Authors Mosleh Zeebaree 1 Musbah Aqel 2 1 Department…
Shared by ISECURE Journal
-
Virtualized Network Management Laboratory for Educational Purposes Document Type : Research Article Authors Oula L. Abdulsattar Emad H…
Virtualized Network Management Laboratory for Educational Purposes Document Type : Research Article Authors Oula L. Abdulsattar Emad H…
Shared by ISECURE Journal
-
IoT Protocols Based Fog/Cloud over High Traffic Document Type : Research Article Authors Istabraq M. Al-Joboury Emad H. Al-Hemiary Networks…
IoT Protocols Based Fog/Cloud over High Traffic Document Type : Research Article Authors Istabraq M. Al-Joboury Emad H. Al-Hemiary Networks…
Shared by ISECURE Journal
People also viewed
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named ISECURE Journal
2 others named ISECURE Journal are on LinkedIn
See others named ISECURE Journal