The ISC International Journal of Information Security
مرور بر اساس
مجموعههای این پایگاه
ارسال های اخیر
-
Private Federated Learning: An Adversarial Sanitizing Perspective
(Iranian Society of Cryptology, 2023-10-01)Large-scale data collection is challenging in alternative centralized learning as privacy concerns or prohibitive policies may rise. As a solution, Federated Learning (FL) is proposed wherein data owners, called participants, ...
-
An Efficient Scheme for Secure Medical Data Sharing in the Cloud
(Iranian Society of Cryptology, 2023-10-01)The Internet of Things has significantly improved healthcare with its promise of transforming technological, social, and economic perspectives. Medical devices with wireless internet access enable remote monitoring of ...
-
Using ChatGPT as a Static Application Security Testing Tool
(Iranian Society of Cryptology, 2023-10-01)In recent years, artificial intelligence has had a conspicuous growth in almost every aspect of life. One of the most applicable areas is security code review, in which a lot of AI-based tools and approaches have been ...
-
A Semi-Supervised IDS for Cyber-Physical Systems Using a Deep Learning Approach
(Iranian Society of Cryptology, 2023-10-01)Industrial control systems are widely used in industrial sectors and critical infrastructures to monitor and control industrial processes. Recently, the security of industrial control systems has attracted a lot of attention, ...
-
Security Analysis and Improvement of an Access Control Scheme for Wireless Body Area Networks
(Iranian Society of Cryptology, 2023-10-01)Wireless Body Area Networks (WBANs) have attracted a lot of attention in recent researches as they play a vital role in diagnosing, controlling and treating diseases. These networks can improve the quality of medical ...
-
Designated-Server Hierarchical Searchable Encryption in Identity-Based Setting
(Iranian Society of Cryptology, 2023-10-01)Public key encryption with keyword search (PEKS) is a cryptographic primitive designed for performing secure search operations over encrypted data stored on untrusted cloud servers. However, in some applications of cloud ...
-
Quantum Multiple Access Wiretap Channel: On the One-Shot Achievable Secrecy Rate Regions
(Iranian Society of Cryptology, 2023-10-01)In this paper, we want to investigate classical-quantum multiple access wiretap channels (CQ-MA-WTC) under one-shot setting. In this regard, we analyze the CQ-MA-WTC using a simultaneous position-based decoder for reliable ...
-
Oblivious Transfer Using Generalized Jacobian of Elliptic Curves
(Iranian Society of Cryptology, 2023-07-01)Oblivious transfer is one of the important tools in cryptography, in which a sender sends a message to a receiver with a probability between 0 and 1, while the sender remains oblivious that the receiver has received ...
-
Reverse Engineering of Authentication Protocol in DesFire
(Iranian Society of Cryptology, 2023-07-01)Nowadays contactless smart cards are extensively used in applications that need strong authentication and security feature protection. Among different cards from different companies, MIFARE DESFire cards are one of the ...
-
An Auto-Encoder based Membership Inference Attack against Generative Adversarial Network
(Iranian Society of Cryptology, 2023-07-01)Using generative models to produce unlimited synthetic samples is a popular replacement for database sharing. Generative Adversarial Network (GAN) is a popular class of generative models which generates synthetic data ...
-
A Fragile Watermarking by Hamming Code on Distributed Pixels with Perfect Recovery for Small Tampers
(Iranian Society of Cryptology, 2023-07-01)Fragile watermarking is the task of embedding a watermark in a media (an image in this paper) such that even small changes, called tamper, can be detected or even recovered to prevent unauthorized alteration. A well-known ...
-
Secure Outsourcing of Two Standard Identity-Based Cryptosystems
(Iranian Society of Cryptology, 2023-07-01)In the last two decades bilinear pairings have found many applications in cryptography. Meanwhile identity-based cryptosystems based on bilinear pairings have received particular attention. The IEEE, IETF, and ISO organizations ...
-
Towards Event Aggregation for Reducing the Volume of Logged Events During IKC Stages of APT Attacks
(Iranian Society of Cryptology, 2023-07-01)Nowadays, targeted attacks like Advanced Persistent Threats (APTs) has become one of the major concern of many enterprise networks. As a common approach to counter these attacks, security staff deploy a variety of heterogeneous ...
-
MISC: Multi-Input Secure Two-Party Computation
(Iranian Society of Cryptology, 2023-07-01)Secure multi-party computation (MPC) allows a group of parties to compute a function on their private inputs securely. Classic MPC protocols for two parties use either Yao's garbled circuit (GC) or the Goldreich-Micali-Wigderson ...
-
Analysis of IOTA Tangle Stability in High Transaction Rates
(Iranian Society of Cryptology, 2023-07-01)The future of the IoT requires new methods of payment that can handle millions of transactions per second. IOTA cryptocurrency aims at providing such a solution. It uses a consensus algorithm based on directed acyclic ...
-
Attribute-Based Encryption with Efficient Attribute Revocation, Decryption Outsourcing, and Multi-Keyword Searching in Cloud Storage
(Iranian Society of Cryptology, 2022-10-01)Reliable access control is a major challenge of cloud storage services. This paper presents a cloud-based file-sharing architecture with ciphertext-policy attribute-based encryption (CP-ABE) access control mechanism. In ...
-
An Electronic Voting Scheme Based on Blockchain Technology and Zero-Knowledge Proofs
(Iranian Society of Cryptology, 2022-10-01)Voting is a fundamental mechanism used by many human societies, organizations and nations to make collective decisions. There has been a tremendous effort on making this mechanism fairer, error-free and secure. Electronic ...
-
SecureKV: Secure Searchable Outsourcing of Key-Value Databases to the Public Cloud
(Iranian Society of Cryptology, 2022-10-01)The use of NoSQL data and its storage in the Cloud is growing rapidly. Due to the accumulation of data in the Cloud, data security against untrusted service providers as well as external attackers becomes a more serious ...
-
Light-Weight Privacy-Preserving Data Aggregation Protocols in Smart Grid Metering Networks
(Iranian Society of Cryptology, 2022-10-01)Smart grids using information technology (IT) and communication networks control smart home appliances to reduce costs and increase reliability and transparency. Preserving the privacy of the user data is one of the biggest ...
-
Secure and Low-Area Implementation of the AES Using FPGA
(Iranian Society of Cryptology, 2022-10-01)Masking techniques are used to protect the hardware implementation of cryptographic algorithms against side-channel attacks. Reconfigurable hardware, such as FPGA, is an ideal target for the secure implementation of ...