Number of Articles: 184
26. A semantic-aware role-based access control model for pervasive computing environments

Volume 5, Issue 2, Summer and Autumn 2013, Pages 119-140

A. Javadi; M. Amini


27. Access control in ultra-large-scale systems using a data-centric middleware

Volume 6, Issue 1, Winter and Spring 2014, Pages 3-22

S. Shokrollahi; F. Shams; J. Esmaeili


28. A risk model for cloud processes

Volume 6, Issue 2, Summer and Autumn 2014, Pages 99-123

E. Damiani; S. Cimato; G. Gianini


29. A TESLA-based mutual authentication protocol for GSM networks

Volume 1, Issue 1, Winter and Spring 2009, Pages 3-15

A. Fanian; M. Berenjkoub; T. A. Gulliver


30. Moving dispersion method for statistical anomaly detection in intrusion detection systems

Volume 1, Issue 2, Summer and Autumn 2009, Pages 71-90

J. Dj. Golic'


31. Stream ciphers and the eSTREAM project

Volume 2, Issue 1, Winter and Spring 2010, Pages 3-11

V. Rijmen


32. Authorization models for secure information sharing: a survey and research agenda

Volume 2, Issue 2, Summer and Autumn 2010, Pages 69-87

F. Salim; J. Reid; E. Dawson


33. Computer security in the future

Volume 3, Issue 1, Winter and Spring 2011, Pages 3-27

M. Bishop


34. Constructing cryptographic definitions

Volume 3, Issue 2, Summer and Autumn 2011, Pages 69-76

P. Rogaway


35. Improving the Rao-Nam secret key cryptosystem using regular EDF-QC-LDPC codes

Volume 4, Issue 1, Winter and Spring 2012, Pages 3-14

R. Hooshmand; T. Eghlidos; M. R. Aref


36. A traceable optimistic fair exchange protocol in the standard model

Volume 7, Issue 1, Winter and Spring 2015, Pages 3-14

R. Ganjavi; M. Rajabzadeh Asaar; M. Salmasizadeh


40. An efficient certificateless signcryption scheme in the standard model

Volume 9, Issue 1, Winter and Spring 2017, Pages 3-16

P. Rastegari; M. Berenjkoub


41. On the computational complexity of finding a minimal basis for the guess and determine attack

Volume 9, Issue 2, Summer and Autumn 2017, Pages 101-110

Sh. Khazaei; F. Moazami


42. Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher (Extended Version)

Volume 10, Issue 1, Winter and Spring 2018, Pages 3-13

A. Rezaei Shahmirzdi; A. Azimi; M. Salmasizadeh; J. Mohajeri; M. R. Aref


43. A Survey of Anomaly Detection Approaches in Internet of Things

Volume 10, Issue 2, Summer and Autumn 2018, Pages 79-92

M. Behniafar; A.R. Nowroozi; H.R. Shahriari


44. A Trust Based Probabilistic Method for Efficient Correctness Verification in Database Outsourcing

Volume 11, Issue 1, Winter and Spring 2019, Pages 3-14

Simin Ghasemi; Mohammad Ali Hadavi; Mina Niknafs


45. Algebraic Matching of Vulnerabilities in a Low-Level Code

Volume 11, Issue 3, Summer and Autumn 2019, Pages 1-7

Oleksandr Letychevskyi; Yaroslav Hryniuk; Viktor Yakovlev; Volodymyr Peschanenko; Viktor Radchenko


46. Interdependent Security Game Design over Constrained Linear Influence Networks

Volume 11, Issue 2, Summer and Autumn 2019, Pages 95-111

Seyed Alireza Hasheminasab; Behrouz Tork Ladani; Tansu Alpcan


47. Cryptanalysis of GSM encryption algorithm A5/1

Volume 4, Issue 2, Summer and Autumn 2012, Pages 107-114

V. Amin Ghafari; A. Vardasbi; J. Mohajeri


48. Design and formal verification of DZMBE+

Volume 5, Issue 1, Winter and Spring 2013, Pages 37-53

M. Soodkhah Mohammadi; A. Ghaemi Bafghi


49. A computational model and convergence theorem for rumor dissemination in social networks

Volume 5, Issue 2, Summer and Autumn 2013, Pages 141-154

M. Amoozgar; R. Ramezanian


50. Total break of Zorro using linear and differential attacks

Volume 6, Issue 1, Winter and Spring 2014, Pages 23-34

Sh. Rasoolzadeh; Z. Ahmadian; M. Salmasizadeh; M. R. Aref