


default search action
ISC International Journal of Information Security, Volume 11
Volume 11, Number 1, January 2019
- Mohammad Reza Aref:

Editorial. 1-2
- Simin Ghasemi

, Mohammad Ali Hadavi, Mina Niknafs:
A Trust Based Probabilistic Method for Efficient Correctness Verification in Database Outsourcing. 3-14 - Javad Ghareh Chamani, Mohammad Sadeq Dousti, Rasool Jalili, Dimitrios Papadopoulos:

SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing. 15-34 - Akbar Mahmoodi Rishakani, Mohammad Reza Mirzaee Shamsabad, Seyed Mojtaba Dehnavi, Mohammad Amin Amiri, Hamidreza Maimani, Nasour Bagheri:

Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives. 35-46 - Mansoureh Labbafniya, Roghayeh Saeidi:

Secure FPGA Design by Filling Unused Spaces. 47-56 - Siavash Ahmadi, Zahra Ahmadian, Javad Mohajeri, Mohammad Reza Aref:

Biclique Cryptanalysis of Block Ciphers LBlock and TWINE-80 with Practical Data Complexity. 57-74 - Reza Ebrahimi Atani, Shahabaddin Ebrahimi Atani, Amir Hassani Karbasi:

A New Ring-Based SPHF and PAKE Protocol On Ideal Lattices. 75-86
- Persian Abstract. 87-92

Volume 11, Number 2, July 2019
- Mohammad Reza Aref:

Editorial. 93-94
- Seyed Alireza Hasheminasab, Behrouz Tork Ladani, Tansu Alpcan:

Interdependent Security Game Design over Constrained Linear Influence Networks. 95-111 - Majid Bayat

, Zahra Zare Jousheghani, Ashok Kumar Das, Pitam Singh
, Saru Kumari, Mohammad Reza Aref:
A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications. 113-128 - S. Ehsan Hosiny Nezhad, Masoumeh Safkhani, Nasour Bagheri:

Relaxed Differential Fault Analysis of SHA-3. 129-143 - Siavash Ahmadi, Mohammad Reza Aref:

New Fixed Point Attacks on GOST2 Block Cipher. 145-158 - Elham Serkani, Hossein Gharaee Garakani, Naser Mohammadzadeh:

Anomaly Detection Using SVM as Classifier and Decision Tree for Optimizing Feature Vectors. 159-171 - Mohammadreza Mohammadrezaei, Mohammad Ebrahim Shiri, Amir Masoud Rahmani:

Detection of Fake Accounts in Social Networks Based on One Class Classification. 173-183
- Persian Abstract. 185-190

Volume 11, Number 3, August 2019
Editorial
- Mohammad Reza Aref:

Editorial.
- Oleksandr A. Letychevskyi

, Yaroslav Hryniuk, Viktor Yakovlev, Volodymyr Peschanenko, Viktor Radchenko:
Algebraic Matching of Vulnerabilities in a Low-Level Code. 1-7 - Hadjer Saadi, Mustapha C. E. Yagoub, Rachida Touhami:

Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns. 9-17 - Ibrahim Soran, Qing Tan:

A Sudy on Information Privacy Issue on Social Networks. 19-27 - Dalia A. Shaaban, Mohamed H. Saad, Ahmed H. Madian, Hesham N. Elmahdy:

Medical Image Compression Based on Region of Interest. 29-34 - Rawan Flifel

:
The Role of Packet Tracer in Learning Wireless Networks and Managing IoT Devices. 35-38 - Omed Hassan Ahmed, Joan Lu, Qiang Xu, Muzhir Shaban Al-Ani:

Face Recognition Based Rank Reduction SVD Approach. 39-50 - Areej Fatima, Muhammad Adnan Khan, Sagheer Abbas

, Muhammad Waqas, Leena Anum, Muhammad Asif:
Evaluation of Planet Factors of Smart City through Multi-layer Fuzzy Logic (MFL). 51-58 - Fairouz Zendaoui

, Walid-Khaled Hidouci:
Considering Uncertainty in Modeling Historical Knowledge. 59-65 - Ehab Khatter, Dina M. Ibrahim

:
Proposed ST-Slotted-CS-ALOHA Protocol for Time Saving and Collision Avoidance. 67-72 - Felisa M. Córdova, Claudia A. Durán

, Fredi Edgardo Palominos:
Cognitive Strategic Model applied to a Port System. 73-78 - Ahmed BaniMustafa

:
Enhancing Learning from Imbalanced Classes via Data Preprocessing: A Data-Driven Application in Metabolomics Data Mining. 79-89 - Ayman Atia

, Nada Shorim:
Hand Gestures Classification with Multi-Core DTW. 91-96 - Muhammad Ali Memon, Zaira Hassan, Kamran Dahri, Asadullah Shaikh, Muhammad Ali Nizamani:

Aspect Oriented UML to ECORE Model Transformation. 97-103 - Evelina Pencheva, Ivaylo Atanasov, Ivaylo Asenov:

Access and Mobility Policy Control at the Network Edge. 105-111 - Mohammed J. F. Alenazi

:
Evaluating Multipath TCP Resilience against Link Failures. 113-122 - Joel E. Cordeiro Junior, Marcelo S. Alencar, José Valentim Dos Santos Filho, Karcius D. R. Assis:

A Fair Power Allocation for Non-Orthogonal Multiple Access in the Power Domain. 123-130 - Matthias Gottlieb, Marwin Shraideh, Isabel Fuhrmann, Markus Böhm, Helmut Krcmar:

Critical Success Factors for Data Virtualization: A Literature Review. 131-137 - Saad Ali Alahmari

:
Using Machine Learning ARIMA to Predict the Price of Cryptocurrencies. 139-144 - Anwar Saeed, Muhammad Yousif

, Areej Fatima, Sagheer Abbas, Muhammad Adnan Khan, Leena Anum, Ali Akram:
An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling. 145-151 - Tahir Alyas

, Gulzar Ahmad
, Yousaf Saeed, Muhammad Asif, Umer Farooq
, Asma Kanwal:
Cloud and IoT based Smart Car Parking System by using Mamdani Fuzzy Inference System (MFIS). 153-160 - Wajdi Al Jedaibi, Sufian Khamis:

Towards Measuring the Project Management Process During Large Scale Software System Implementation Phase. 161-172 - Istabraq M. Al-Joboury, Emad H. Al-Hemiary:

IoT Protocols Based Fog/Cloud over High Traffic. 173-180 - Oula L. Abdulsattar, Emad H. Al-Hemiary:

Virtualized Network Management Laboratory for Educational Purposes. 181-186

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














