Volume 16 (2024)
Volume 14 (2022)
Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
Research Article
Designated-Server Hierarchical Searchable Encryption in Identity-Based Setting

Danial Shiraly; Nasrollah Pakniat; Ziba Eslami

Volume 15, Issue 3 , October 2023, Pages 1-17

https://doi.org/10.22042/isecure.2023.416676.1014

Abstract
  Public key encryption with keyword search (PEKS) is a cryptographic primitive designed for performing secure search operations over encrypted data stored on untrusted cloud servers. However, in some applications of cloud computing, there is a hierarchical access-privilege setup among users so that upper-level ...  Read More

Research Article
Quantum Multiple Access Wiretap Channel: On the One-Shot Achievable Secrecy Rate Regions

Hadi Aghaee; Bahareh Akhbari

Volume 15, Issue 3 , October 2023, Pages 19-34

https://doi.org/10.22042/isecure.2023.180848

Abstract
  In this paper, we want to investigate classical-quantum multiple access wiretap channels (CQ-MA-WTC) under one-shot setting. In this regard, we analyze the CQ-MA-WTC using a simultaneous position-based decoder for reliable decoding and using a newly introduced technique to decode securely. Also, for ...  Read More

Research Article
Security Analysis and Improvement of an Access Control Scheme for Wireless Body Area Networks

Parichehr Dadkhah; Mohammad Dakhilalian; Parvin Rastegari

Volume 15, Issue 3 , October 2023, Pages 35-42

https://doi.org/10.22042/isecure.2023.180857

Abstract
  Wireless Body Area Networks (WBANs) have attracted a lot of attention in recent researches as they play a vital role in diagnosing, controlling and treating diseases. These networks can improve the quality of medical services by following the health status of people and providing online medical advice ...  Read More

Research Article
A Semi-Supervised IDS for Cyber-Physical Systems Using a Deep Learning Approach

Amirhosein Salehi; Siavash Ahmadi; Mohammad Reza Aref

Volume 15, Issue 3 , October 2023, Pages 43-50

https://doi.org/10.22042/isecure.2023.181544

Abstract
  Industrial control systems are widely used in industrial sectors and critical infrastructures to monitor and control industrial processes. Recently, the security of industrial control systems has attracted a lot of attention, because these systems are now increasingly interacting with the Internet. Classic ...  Read More

Research Article
Using ChatGPT as a Static Application Security Testing Tool

Atieh Bakhshandeh; Abdalsamad Keramatfar; Amir Norouzi; Mohammad M. Chekidehkhoun

Volume 15, Issue 3 , October 2023, Pages 51-58

https://doi.org/10.22042/isecure.2023.182082

Abstract
  In recent years, artificial intelligence has had a conspicuous growth in almost every aspect of life. One of the most applicable areas is security code review, in which a lot of AI-based tools and approaches have been proposed. Recently, ChatGPT has caught a huge amount of attention with its remarkable ...  Read More

Research Article
An Efficient Scheme for Secure Medical Data Sharing in the Cloud

Iman Jafarian; Siavash Khorsandi

Volume 15, Issue 3 , October 2023, Pages 59-66

https://doi.org/10.22042/isecure.2023.182206

Abstract
  The Internet of Things has significantly improved healthcare with its promise of transforming technological, social, and economic perspectives. Medical devices with wireless internet access enable remote monitoring of patients, and collectively, these increasingly smart and connected medical devices ...  Read More

Research Article
Private Federated Learning: An Adversarial Sanitizing Perspective

Mojtaba Shirinjani; Siavash Ahmadi; Taraneh Eghlidos; Mohammad Reza Aref

Volume 15, Issue 3 , October 2023, Pages 67-76

https://doi.org/10.22042/isecure.2023.182211

Abstract
  Large-scale data collection is challenging in alternative centralized learning as privacy concerns or prohibitive policies may rise. As a solution, Federated Learning (FL) is proposed wherein data owners, called participants, can train a common model collaboratively while their privacy is preserved. ...  Read More

Research Article
A Lightweight Mutual Authentication Scheme for VANETs Between Vehicles and RSUs

Mohamadreza Amani; Javad Mohajeri; Mahmoud Salmasizadeh

Volume 15, Issue 3 , October 2023, Pages 77-89

https://doi.org/10.22042/isecure.2023.417758.1018

Abstract
  Vehicular Ad-hoc Networks (VANETs) have emerged as part of Intelligent Transportation Systems (ITS), offering the potential to enhance passenger and driver safety, as well as driving conditions. However, VANETs face significant security challenges and various attacks due to their wireless nature and ...  Read More

Research Article
New Variations of Discrete Logarithm Problem

Mahdi Mahdavi Oliaee; Sahar Khaleghifard; Zahra Ahmadian

Volume 15, Issue 3 , October 2023, Pages 91-100

https://doi.org/10.22042/isecure.2023.184477

Abstract
  The security of public key cryptography relies on the complexity of certain mathematical hard problems. It is vital to comprehend the intricacy of these problems to develop secure cryptographic schemes and security protocols. This paper provides an overview of some widely recognized hard problems associated ...  Read More

Research Article
Post Quantum Digital Signature Based on the McEliece Cryptosystems with Dual Inverse Matrix

Farshid Haidary Makoui; Thomas Aaron Gulliver; Mohammad Dakhilalian

Volume 15, Issue 3 , October 2023, Pages 101-108

https://doi.org/10.22042/isecure.2023.419559.1026

Abstract
  Digital signatures are used to ensure legitimate access through identity authentication. They are also used in blockchains and to authenticate transactions. Code-based digital signatures are not widely used due to their complexity. This paper presents a new code-based signature algorithm withlower complexity ...  Read More

Research Article
HyLock: Hybrid Logic Locking Based on Structural Fuzzing for Resisting Learning-based Attacks

Mohammad Moradi Shahmiri; Bijan Alizadeh

Volume 15, Issue 3 , October 2023, Pages 109-115

https://doi.org/10.22042/isecure.2023.417837.1019

Abstract
  The growing popularity of the fabless manufacturing model and the resulting threats have increased the importance of Logic locking as a key-based method for intellectual property (IP) protection. Recently, machine learning (ML)-based attacks have broken most existing locks by exploiting structural traces ...  Read More

Research Article
A Lightweight RFID Grouping Proof Protocol With Forward Secrecy and Resistant to Reader Compromised Attack

Fateme Borjal Bayatiani; Hamid Mala

Volume 15, Issue 3 , October 2023, Pages 117-128

https://doi.org/10.22042/isecure.2023.418765.1030

Abstract
  Today, passive RFID tags have many applications in various fields such as healthcare, transportation, asset management, and supply chain management. In some of these applications, a group of tags need to prove they are present in the same place at the same time. To solve this problem, many protocols ...  Read More

Research Article
New Directions in the Design of Binary Matrices for SPN Block Ciphers

Mahdi Sajadieh; Arash Mirzaei

Volume 15, Issue 3 , October 2023, Pages 129-138

https://doi.org/10.22042/isecure.2024.421696.1035

Abstract
  The diffusion layer plays an important role in a block cipher. Some block ciphers, such as ARIA, Camellia, and Skinny use binary matrices as diffusion layers which can be efficiently implemented in hardware and software. In this paper, the goal is to propose some new binary matrices with suitable values ...  Read More

Research Article
Integral Cryptanalysis of Reduced-Round SAND-64 Based on Bit-Based Division Property

Atiyeh Mirzaie; Siavash Ahmadi; Mohammad Reza Aref

Volume 15, Issue 3 , October 2023, Pages 139-147

https://doi.org/10.22042/isecure.2023.187449

Abstract
  Conventional Bit-based Division Property (CBDP), as a generalization of integral property, has been a powerful tool for integral cryptanalysis of many block ciphers. Exploiting a Mixed Integral Linear Programming (MILP) optimizer, an alternative approach to searching integral distinguishers was proposed, ...  Read More

Research Article
Cross-Device Deep Learning Side-Channel Attacks using Filter and Autoencoder

Maryam Tabaeifard; Ali Jahanian

Volume 15, Issue 3 , October 2023, Pages 149-158

https://doi.org/10.22042/isecure.2023.187517

Abstract
  Side-channel Analysis (SCA) attacks are effective methods for extracting encryption keys, and with deep learning (DL) techniques, much stronger attacks have been carried out on victim devices. However, carrying out this kind of attack is much more challenging in cross-device attacks when the profiling ...  Read More