مرور The ISC International Journal of Information Security بر اساس تاریخ انتشار

در حال نمایش موارد 1 - 20 از 304

  • A TESLA-based mutual authentication protocol for GSM networks 

    Fanian, A.؛ Berenjkoub, M.؛ Gulliver, T. A. (Iranian Society of Cryptology, 2009-01-01)
    The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol ...

  • CAMAC: a context-aware mandatory access control model 

    Jafarian, J. H.؛ Amini, M. (Iranian Society of Cryptology, 2009-01-01)
    Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated ...

  • Steganalysis of embedding in difference of image pixel pairs by neural network 

    Sabeti, V.؛ Samavi, Sh.؛ Mahdavi, M.؛ Shirani, Sh. (Iranian Society of Cryptology, 2009-01-01)
    In this paper a steganalysis method is proposed for pixel value differencing method. This steganographic method, which has been immune against conventional attacks, performs the embedding in the difference of the values ...

  • Process algebraic modeling of authentication protocols for analysis of parallel multi-session executions 

    Ramezanian, R. (Iranian Society of Cryptology, 2009-01-01)
    Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions ...

  • Editorial 

    Aref, M.؛ Jalili, R. (Iranian Society of Cryptology, 2009-01-01)
    From the Editor-in-Chief

  • A collusion attack on the fuzzy vault scheme 

    Poon, H.؛ Miri, A. (Iranian Society of Cryptology, 2009-01-01)
    The Fuzzy Vault scheme is an encryption scheme, which can tolerate errors in the keys. This leads to the possibility of enhancing the security in environments where these errors can be common, such as biometrics storage ...

  • Moving dispersion method for statistical anomaly detection in intrusion detection systems 

    Golic', J. (Iranian Society of Cryptology, 2009-07-01)
    A unified method for statistical anomaly detection in intrusion detection systems is theoretically introduced. It is based on estimating a dispersion measure of numerical or symbolic data on successive moving windows in ...

  • An efficient blind signature scheme based on the elliptic curve discrete logarithm problem 

    Nikooghadam, M.؛ Zakerolhosseini, A. (Iranian Society of Cryptology, 2009-07-01)
    Elliptic Curve Cryptosystems (ECC) have recently received significant attention by researchers due to their high performance such as low computational cost and small key size. In this paper a novel untraceable blind signature ...

  • Security testing of session initiation protocol implementations 

    Harris, I.؛ Alrahem, T.؛ Chen, A.؛ DiGiuseppe, N.؛ Gee, J.؛ Hsiao, Sh.؛ Mattox, S.؛ Park, T.؛ Selvaraj, S.؛ Tam, A.؛ Carlsson, M. (Iranian Society of Cryptology, 2009-07-01)
    The mechanisms which enable the vast majority of computer attacks are based on design and programming errors in networked applications. The growing use of voice over IP (VOIP) phone technology makes these phone applications ...

  • Image flip CAPTCHA 

    Tariq Banday, M.؛ A. Shah, N. (Iranian Society of Cryptology, 2009-07-01)
    The massive and automated access to Web resources through robots has made it essential for Web service providers to make some conclusion about whether the "user" is a human or a robot. A Human Interaction Proof (HIP) like ...

  • Editorial 

    Jalili, R. (Iranian Society of Cryptology, 2009-07-01)
    From the Editor-in-Chief

  • Editorial 

    Jalili, R. (Iranian Society of Cryptology, 2010-01-01)
    From the Editor-in-Chief

  • A context-sensitive dynamic role-based access control model for pervasive computing environments 

    Sadat Emami, S.؛ Zokaei, S. (Iranian Society of Cryptology, 2010-01-01)
    Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able ...

  • A particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs 

    Abadi, M.؛ Jalili, S. (Iranian Society of Cryptology, 2010-01-01)
    To prevent an exploit, the security analyst must implement a suitable countermeasure. In this paper, we consider cost-sensitive attack graphs (CAGs) for network vulnerability analysis. In these attack graphs, a weight is ...

  • A hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection 

    Saniee Abadeh, M.؛ Habibi, J. (Iranian Society of Cryptology, 2010-01-01)
    A hybrid approach for intrusion detection in computer networks is presented in this paper. The proposed approach combines an evolutionary-based fuzzy system with an Ant Colony Optimization procedure to generate high-quality ...

  • Stream ciphers and the eSTREAM project 

    Rijmen, V. (Iranian Society of Cryptology, 2010-01-01)
    Stream ciphers are an important class of symmetric cryptographic algorithms. The eSTREAM project contributed significantly to the recent increase of activity in this field. In this paper, we present a survey of the eSTREAM ...

  • Authorization models for secure information sharing: a survey and research agenda 

    Salim, F.؛ Reid, J.؛ Dawson, E. (Iranian Society of Cryptology, 2010-07-01)
    This article presents a survey of authorization models and considers their 'fitness-for-purpose' in facilitating information sharing. Network-supported information sharing is an important technical capability that underpins ...

  • An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks 

    Fanian, A.؛ Berenjkoub, M.؛ Saidi, H.؛ Gulliver, T. (Iranian Society of Cryptology, 2010-07-01)
    An essential requirement for providing secure services in wireless sensor networks is the ability to establish pairwise keys among sensors. Due to resource constraints on the sensors, the key establishment scheme should ...

  • Detection of perturbed quantization (PQ) steganography based on empirical matrix 

    Abolghasemi, M.؛ Aghaeinia, H.؛ Faez, K. (Iranian Society of Cryptology, 2010-07-01)
    Perturbed Quantization (PQ) steganography scheme is almost undetectable with the current steganalysis methods. We present a new steganalysis method for detection of this data hiding algorithm. We show that the PQ method ...

  • High capacity steganography tool for Arabic text using 'Kashida' 

    Gutub, A.؛ Al-Nazer, A. (Iranian Society of Cryptology, 2010-07-01)
    Steganography is the ability to hide secret information in a cover-media such as sound, pictures and text. A new approach is proposed to hide a secret into Arabic text cover media using "Kashida", an Arabic extension ...