The ISC International Journal of Information Security: Recent submissions

در حال نمایش موارد 1 - 20 از 304

  • HUAP: Practical Attribute-Based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices 

    Chegenizadeh, Mostafa؛ Ali, Mohammad؛ Mohajeri, Javad؛ Aref, Mohammad Reza (Iranian Society of Cryptology, 2024-01-01)
    Attribute-based encryption (ABE) is a promising cryptographic mechanism for providing confidentiality and fine-grained access control in the cloud-based area.However, due to high computational overhead, common ABE schemes ...

  • Slowloris Attack Detection Using Adaptive Timeout-Based Approach 

    Talukdar, Kangkan؛ Boro, Debojit (Iranian Society of Cryptology, 2024-01-01)
    Distributed Denial of Service (DDoS) attacks have become a critical threat to the Web with the increase in web-based transactions and application services offered by the Internet. With the vast resources and techniques ...

  • Artificial Intelligence and Dynamic Analysis-Based Web Application Vulnerability Scanner 

    Yalçınkaya, Mehmet؛ Küçüksille, Ecir (Iranian Society of Cryptology, 2024-01-01)
    The widespread use of web applications and running on sensitive data has made them one of the most significant targets of cyber attackers. One of the most crucial security measures that can be taken is the detection and ...

  • Safety Guards for Ethereum Smart Contracts 

    Amirmohseni, Morteza؛ Dorri Nogoorani, Sadegh (Iranian Society of Cryptology, 2024-01-01)
    Smart contracts are applications that are deployed on a blockchain and can be executed through transactions. The code and the state of the smart contracts are persisted on the ledger, and their execution is validated by ...

  • An Overview of Security Attacks in 5G Enabled Technologies: Applications and Use Case Scenarios 

    Kalhoro, Shadab؛ Shaikh, Farhan؛ Kalhoro, Anam؛ Abbasi, Junaid ur Rehman؛ Ayyasamy, Ramesh (Iranian Society of Cryptology, 2024-01-01)
    With the advancement of ICTs, the fifth generation has developed into an emergent communication platform that supports high speed, low latency, and excellent connectivity to numerous devices with modern radio technology, ...

  • Modified Parse-Tree Based Pattern Extraction Approach for Detecting SQLIA Using Neural Network Model. 

    A, Meharaj Begum؛ Arock, Michael (Iranian Society of Cryptology, 2024-01-01)
    Whatever malware protection is upcoming, still the data are prone to cyber-attacks. The most threatening Structured Query Language Injection Attack (SQLIA) happens at the database layer of web applications leading to ...

  • Cross-Device Deep Learning Side-Channel Attacks using Filter and Autoencoder 

    Tabaeifard, Maryam؛ Jahanian, Ali (Iranian Society of Cryptology, 2023-10-01)
    Side-channel Analysis (SCA) attacks are effective methods for extracting encryption keys, and with deep learning (DL) techniques, much stronger attacks have been carried out on victim devices. However, carrying out this ...

  • Integral Cryptanalysis of Reduced-Round SAND-64 Based on Bit-Based Division Property 

    Mirzaie, Atiyeh؛ Ahmadi, Siavash؛ Aref, Mohammad Reza (Iranian Society of Cryptology, 2023-10-01)
    Conventional Bit-based Division Property (CBDP), as a generalization of integral property, has been a powerful tool for integral cryptanalysis of many block ciphers. Exploiting a Mixed Integral Linear Programming (MILP) ...

  • New Directions in the Design of Binary Matrices for SPN Block Ciphers 

    Sajadieh, Mahdi؛ Mirzaei, Arash (Iranian Society of Cryptology, 2023-10-01)
    The diffusion layer plays an important role in a block cipher. Some block ciphers, such as ARIA, Camellia, and Skinny use binary matrices as diffusion layers which can be efficiently implemented in hardware and software. ...

  • A Lightweight RFID Grouping Proof Protocol With Forward Secrecy and Resistant to Reader Compromised Attack 

    Borjal Bayatiani, Fateme؛ Mala, Hamid (Iranian Society of Cryptology, 2023-10-01)
    Today, passive RFID tags have many applications in various fields such as healthcare, transportation, asset management, and supply chain management. In some of these applications, a group of tags need to prove they are ...

  • HyLock: Hybrid Logic Locking Based on Structural Fuzzing for Resisting Learning-based Attacks 

    Moradi Shahmiri, Mohammad؛ Alizadeh, Bijan (Iranian Society of Cryptology, 2023-10-01)
    The growing popularity of the fabless manufacturing model and the resulting threats have increased the importance of Logic locking as a key-based method for intellectual property (IP) protection. Recently, machine learning ...

  • Post Quantum Digital Signature Based on the McEliece Cryptosystems with Dual Inverse Matrix 

    Haidary Makoui, Farshid؛ Gulliver, Thomas Aaron؛ Dakhilalian, Mohammad (Iranian Society of Cryptology, 2023-10-01)
    Digital signatures are used to ensure legitimate access through identity authentication. They are also used in blockchains and to authenticate transactions. Code-based digital signatures are not widely used due to their ...

  • New Variations of Discrete Logarithm Problem 

    Mahdavi Oliaee, Mahdi؛ Khaleghifard, Sahar؛ Ahmadian, Zahra (Iranian Society of Cryptology, 2023-10-01)
    The security of public key cryptography relies on the complexity of certain mathematical hard problems. It is vital to comprehend the intricacy of these problems to develop secure cryptographic schemes and security protocols. ...

  • A Lightweight Mutual Authentication Scheme for VANETs Between Vehicles and RSUs 

    Amani, Mohamadreza؛ Mohajeri, Javad؛ Salmasizadeh, Mahmoud (Iranian Society of Cryptology, 2023-10-01)
    Vehicular Ad-hoc Networks (VANETs) have emerged as part of Intelligent Transportation Systems (ITS), offering the potential to enhance passenger and driver safety, as well as driving conditions. However, VANETs face ...

  • Private Federated Learning: An Adversarial Sanitizing Perspective 

    Shirinjani, Mojtaba؛ Ahmadi, Siavash؛ Eghlidos, Taraneh؛ Aref, Mohammad Reza (Iranian Society of Cryptology, 2023-10-01)
    Large-scale data collection is challenging in alternative centralized learning as privacy concerns or prohibitive policies may rise. As a solution, Federated Learning (FL) is proposed wherein data owners, called participants, ...

  • An Efficient Scheme for Secure Medical Data Sharing in the Cloud 

    Jafarian, Iman؛ Khorsandi, Siavash (Iranian Society of Cryptology, 2023-10-01)
    The Internet of Things has significantly improved healthcare with its promise of transforming technological, social, and economic perspectives. Medical devices with wireless internet access enable remote monitoring of ...

  • Using ChatGPT as a Static Application Security Testing Tool 

    Bakhshandeh, Atieh؛ Keramatfar, Abdalsamad؛ Norouzi, Amir؛ M. Chekidehkhoun, Mohammad (Iranian Society of Cryptology, 2023-10-01)
    In recent years, artificial intelligence has had a conspicuous growth in almost every aspect of life. One of the most applicable areas is security code review, in which a lot of AI-based tools and approaches have been ...

  • A Semi-Supervised IDS for Cyber-Physical Systems Using a Deep Learning Approach 

    Salehi, Amirhosein؛ Ahmadi, Siavash؛ Aref, Mohammad Reza (Iranian Society of Cryptology, 2023-10-01)
    Industrial control systems are widely used in industrial sectors and critical infrastructures to monitor and control industrial processes. Recently, the security of industrial control systems has attracted a lot of attention, ...

  • Security Analysis and Improvement of an Access Control Scheme for Wireless Body Area Networks 

    Dadkhah, Parichehr؛ Dakhilalian, Mohammad؛ Rastegari, Parvin (Iranian Society of Cryptology, 2023-10-01)
    Wireless Body Area Networks (WBANs) have attracted a lot of attention in recent researches as they play a vital role in diagnosing, controlling and treating diseases. These networks can improve the quality of medical ...

  • Designated-Server Hierarchical Searchable Encryption in Identity-Based Setting 

    Shiraly, Danial؛ Pakniat, Nasrollah؛ Eslami, Ziba (Iranian Society of Cryptology, 2023-10-01)
    Public key encryption with keyword search (PEKS) is a cryptographic primitive designed for performing secure search operations over encrypted data stored on untrusted cloud servers. However, in some applications of cloud ...