1. A semantic-aware role-based access control model for pervasive computing environments

Volume 5, Issue 2, Summer and Autumn 2013, Page 119-140

A. Javadi; M. Amini


2. Access control in ultra-large-scale systems using a data-centric middleware

Volume 6, Issue 1, Winter and Spring 2014, Page 3-22

S. Shokrollahi; F. Shams; J. Esmaeili


3. A risk model for cloud processes

Volume 6, Issue 2, Summer and Autumn 2014, Page 99-123

E. Damiani; S. Cimato; G. Gianini


4. A TESLA-based mutual authentication protocol for GSM networks

Volume 1, Issue 1, Winter and Spring 2009, Page 3-15

A. Fanian; M. Berenjkoub; T. A. Gulliver


6. Stream ciphers and the eSTREAM project

Volume 2, Issue 1, Winter and Spring 2010, Page 3-11

V. Rijmen


7. Authorization models for secure information sharing: a survey and research agenda

Volume 2, Issue 2, Summer and Autumn 2010, Page 69-87

F. Salim; J. Reid; E. Dawson


8. Computer security in the future

Volume 3, Issue 1, Winter and Spring 2011, Page 3-27

M. Bishop


9. Constructing cryptographic definitions

Volume 3, Issue 2, Summer and Autumn 2011, Page 69-76

P. Rogaway


10. Improving the Rao-Nam secret key cryptosystem using regular EDF-QC-LDPC codes

Volume 4, Issue 1, Winter and Spring 2012, Page 3-14

R. Hooshmand; T. Eghlidos; M. R. Aref


11. A traceable optimistic fair exchange protocol in the standard model

Volume 7, Issue 1, Winter and Spring 2015, Page 3-14

R. Ganjavi; M. Rajabzadeh Asaar; M. Salmasizadeh


15. An efficient certificateless signcryption scheme in the standard model

Volume 9, Issue 1, Winter and Spring 2017, Page 3-16

P. Rastegari; M. Berenjkoub


16. On the computational complexity of finding a minimal basis for the guess and determine attack

Volume 9, Issue 2, Summer and Autumn 2017, Page 101-110

Sh. Khazaei; F. Moazami


17. Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher (Extended Version)

Volume 10, Issue 1, Winter and Spring 2018, Page 3-13

A. Rezaei Shahmirzdi; A. Azimi; M. Salmasizadeh; J. Mohajeri; M. R. Aref


18. A Survey of Anomaly Detection Approaches in Internet of Things

Volume 10, Issue 2, Summer and Autumn 2018, Page 79-92

M. Behniafar; A.R. Nowroozi; H.R. Shahriari


19. A Trust Based Probabilistic Method for Efficient Correctness Verification in Database Outsourcing

Volume 11, Issue 1, Winter and Spring 2019, Page 3-14

Simin Ghasemi; Mohammad Ali Hadavi; Mina Niknafs


20. Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns

Volume 11, Special Issue, Summer and Autumn 2019, Page 9-17

Saadi Hadjer; Yagoub Mustapha C.E.; Rachida TOUHAMI


21. Detection of fake accounts in social networks based on One Class Classification

Articles in Press, Accepted Manuscript, Available Online from 29 July 2019

Mohammad Ebrahim shiri; mohammadreza mohammadrezaei; Amir Masoud Rahmani


22. Cryptanalysis of GSM encryption algorithm A5/1

Volume 4, Issue 2, Summer and Autumn 2012, Page 107-114

V. Amin Ghafari; A. Vardasbi; J. Mohajeri


23. Design and formal verification of DZMBE+

Volume 5, Issue 1, Winter and Spring 2013, Page 37-53

M. Soodkhah Mohammadi; A. Ghaemi Bafghi


24. A computational model and convergence theorem for rumor dissemination in social networks

Volume 5, Issue 2, Summer and Autumn 2013, Page 141-154

M. Amoozgar; R. Ramezanian


25. Total break of Zorro using linear and differential attacks

Volume 6, Issue 1, Winter and Spring 2014, Page 23-34

Sh. Rasoolzadeh; Z. Ahmadian; M. Salmasizadeh; M. R. Aref