Volume 16 (2024)
Volume 15 (2023)
Volume 14 (2022)
Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
Number of Articles: 305
STLR: a novel danger theory based structural TLR algorithm
Volume 5, Issue 2 , July 2013, , Pages 209-225
Abstract
Artificial Immune Systems (AIS) have long been used in the field of computer security and especially in Intrusion Detection systems. Intrusion detection based on AISs falls into two main categories. The first generation of AIS is inspired from adaptive immune reactions but, the second one which is called ... Read MoreReverse Engineering of Authentication Protocol in DesFire
Volume 15, Issue 2 , July 2023, , Pages 254-259
Abstract
Nowadays contactless smart cards are extensively used in applications that need strong authentication and security feature protection. Among different cards from different companies, MIFARE DESFire cards are one of the most used cases. The hardware and software design in addition to implementation details ... Read MoreEvaluation of Planet Factors of Smart City through Multi-layer Fuzzy Logic (MFL)
Volume 11, Issue 3 , August 2019, , Pages 51-58
Abstract
Internet of Things (IoT) approach is empowering smart city creativities all over the world. There is no specific tool or criteria for the evaluation of the services offered by the smart city. In this paper, a new Multilayer Fuzzy Inference System (MFIS) is proposed for the assessment of ... Read MorePersian Abstract
Volume 10, Issue 1 , January 2018, , Pages 71-76
Abstract
Persian Abstract of the online manuscripts Read MoreA Chaos-Based Video Watermarking Algorithm
Volume 4, Issue 1 , January 2012, , Pages 77-86
Abstract
The intriguing characteristics of chaotic maps have prompted researchers to use these sequences in watermarking systems to good effect. In this paper we aim to use a tent map to encrypt the binary logo to achieve a like-noise signal. This approach makes extraction of the watermark signal by potential ... Read MorePersian Abstract
Volume 7, Issue 1 , January 2015, , Pages 83-88
Abstract
Read MorePersian Abstract
Volume 8, Issue 1 , January 2016, , Pages 85-90
Abstract
Persian abstracts of the issue's article Read MorePersian Abstract
Volume 11, Issue 1 , January 2019, , Pages 87-92
Abstract
Persian abstracts of the issue''s article Read MorePersian Abstract
Volume 6, Issue 1 , January 2014, , Pages 91-96
Abstract
Read MorePersian Abstract
Volume 9, Issue 1 , January 2017, , Pages 93-98
Abstract
Persian abstracts of the issue's article Read MoreA Binary Relevance Adaptive Model-Selection for Ensemble Steganalysis
Volume 14, Issue 1 , January 2022, , Pages 105-113
Abstract
Steganalysis is an interesting classification problem to discriminate the images, including hidden messages from the clean ones. There are many methods, including deep CNN networks, to extract fine features for this classification task. Also, some researches have been conducted to improve the final classifier. ... Read MorePersian Abstract
Volume 5, Issue 1 , January 2013, , Pages 111-116
Abstract
Read MoreLightweight Cryptographic S-Boxes Based on Efficient Hardware Structures for Block Ciphers
Volume 15, Issue 1 , January 2023, , Pages 137-151
Abstract
In this paper, we present four low-cost substitution boxes (S-boxes) including two 4-bit S-boxes called S1 and S2 and two 8-bit S-boxes called SB1 and SB2, which are suitable for the development of lightweight block ciphers. The 8-bit SB1 S-box is constructed based on four 4-bit S-boxes, multiplication ... Read MorePersian Abstract
Volume 8, Issue 2 , July 2016, , Pages 161-166
Abstract
No abstract Read MorePersian Abstract
Volume 10, Issue 2 , July 2018, , Pages 163-168
Abstract
Persian abstracts of the issue's article Read MorePersian Abstract
Volume 4, Issue 2 , July 2012, , Pages 167-172
Abstract
Read MorePersian Abstract
Volume 7, Issue 2 , July 2015, , Pages 167-172
Abstract
Read MorePersian Abstract
Volume 9, Issue 2 , July 2017, , Pages 183-189
Abstract
Persian abstracts of the issue's article Read MorePersian Abstract
Volume 11, Issue 2 , July 2019, , Pages 185-190
Abstract
Persian abstracts of the issue''s article Read MorePersian Abstract
Volume 6, Issue 2 , July 2014, , Pages 193-198
Abstract
Read MoreLocation Privacy Preservation for Secondary Users in a Database-Driven Cognitive Radio Network
Volume 14, Issue 2 , July 2022, , Pages 215-227
Abstract
Since their introduction, cognitive radio networks, as a new solution to the problem of spectrum scarcity, have received great attention from the research society. An important field in database driven cognitive radio network studies is pivoted on their security issues. A critical issue in this context ... Read MorePersian Abstract
Volume 5, Issue 2 , July 2013, , Pages 227-232
Abstract
Read MoreOblivious Transfer Using Generalized Jacobian of Elliptic Curves
Volume 15, Issue 2 , July 2023, , Pages 260-273
Abstract
Oblivious transfer is one of the important tools in cryptography, in which a sender sends a message to a receiver with a probability between 0 and 1, while the sender remains oblivious that the receiver has received the message.A flavor of $OT$ schemes is chosen $t$-out-of-$k$ ... Read MoreConsidering Uncertainty in Modeling Historical Knowledge
Volume 11, Issue 3 , August 2019, , Pages 59-65
Abstract
Simplifying and structuring qualitatively complex knowledge, quantifying it in a certain way to make it reusable and easily accessible are all aspects that are not new to historians. Computer science is currently approaching a solution to some of these problems, or at least making it easier ... Read MorePersian Abstract
Volume 4, Issue 1 , January 2012, , Pages 87-93