Volume 16 (2024)
Volume 14 (2022)
Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
Research Article
Analysis of IOTA Tangle Stability in High Transaction Rates

Habibullah Yajam; Mohammad Ali Akhaee

Volume 15, Issue 2 , July 2023, Pages 152-162

https://doi.org/10.22042/isecure.2023.380480.904

Abstract
  The future of the IoT requires new methods of payment that can handle millions of transactions per second. IOTA cryptocurrency aims at providing such a solution. It uses a consensus algorithm based on directed acyclic graphs (DAG) that is called Tangle. A tip selection algorithm (TSA) is a part of Tangle ...  Read More

Research Article
MISC: Multi-Input Secure Two-Party Computation

Farhad Taheri Ardakani; Siavash Bayat Sarmadi

Volume 15, Issue 2 , July 2023, Pages 163-177

https://doi.org/10.22042/isecure.2023.323624.745

Abstract
  Secure multi-party computation (MPC) allows a group of parties to compute a function on their private inputs securely. Classic MPC protocols for two parties use either Yao's garbled circuit (GC) or the Goldreich-Micali-Wigderson (GMW) protocol. In this paper, we propose MISC, a multi-input secure computation ...  Read More

Research Article
Towards Event Aggregation for Reducing the Volume of Logged Events During IKC Stages of APT Attacks

Ali Ahmadian Ramaki; Abbas Ghaemi-Bafghi; Abbas Rasoolzadegan

Volume 15, Issue 2 , July 2023, Pages 178-215

https://doi.org/10.22042/isecure.2023.319798.730

Abstract
  Nowadays, targeted attacks like Advanced Persistent Threats (APTs) has become one of the major concern of many enterprise networks. As a common approach to counter these attacks, security staff deploy a variety of heterogeneous security and non-security sensors at different lines of defense (Network, ...  Read More

Research Article
Secure Outsourcing of Two Standard Identity-Based Cryptosystems

Hamid Mala; Mohammad Reza Saeidi

Volume 15, Issue 2 , July 2023, Pages 216-229

https://doi.org/10.22042/isecure.2023.320345.734

Abstract
  In the last two decades bilinear pairings have found many applications in cryptography. Meanwhile identity-based cryptosystems based on bilinear pairings have received particular attention. The IEEE, IETF, and ISO organizations have been working on standardization of pairing-based cryptographic schemes. ...  Read More

Research Article
A Fragile Watermarking by Hamming Code on Distributed Pixels with Perfect Recovery for Small Tampers

Faeze Rasouli; Mohammad Taheri; Reza Rohani Sarvestani

Volume 15, Issue 2 , July 2023, Pages 230-239

https://doi.org/10.22042/isecure.2023.321411.740

Abstract
  Fragile watermarking is the task of embedding a watermark in a media (an image in this paper) such that even small changes, called tamper, can be detected or even recovered to prevent unauthorized alteration. A well-known category of spatial fragile watermarking methods is based on embedding the watermark ...  Read More

Research Article
An Auto-Encoder based Membership Inference Attack against Generative Adversarial Network

Maryam Azadmanesh; Behrouz Shahgholi Ghahfarokhi; Maede Ashouri-Talouki

Volume 15, Issue 2 , July 2023, Pages 240-253

https://doi.org/10.22042/isecure.2022.320282.735

Abstract
  Using generative models to produce unlimited synthetic samples is a popular replacement for database sharing. Generative Adversarial Network (GAN) is a popular class of generative models which generates synthetic data samples very similar to real training datasets. However, GAN models do not necessarily ...  Read More

Research Article
Reverse Engineering of Authentication Protocol in DesFire

Mansoureh Labbafniya; Hamed Yusefi; Akram Khalesi

Volume 15, Issue 2 , July 2023, Pages 254-259

https://doi.org/10.22042/isecure.2023.371284.889

Abstract
  Nowadays contactless smart cards are extensively used in applications that need strong authentication and security feature protection. Among different cards from different companies, MIFARE DESFire cards are one of the most used cases. The hardware and software design in addition to implementation details ...  Read More

Research Article
Oblivious Transfer Using Generalized Jacobian of Elliptic Curves

Maryam Rezaei Kashi; Mojtaba Bahramian

Volume 15, Issue 2 , July 2023, Pages 260-273

https://doi.org/10.22042/isecure.2023.336301.779

Abstract
  ‎Oblivious transfer is one of the important tools in cryptography‎, ‎in which a sender sends a message to a receiver with a probability between 0 and 1‎, ‎while the sender remains oblivious that the receiver has received the message‎.‎A flavor of $OT$ schemes is chosen $t$-out-of-$k$ ...  Read More