1. Editorial

Volume 5, Issue 1, Winter and Spring 2013, Page 1-3

R. Jalili


2. Editorial

Volume 5, Issue 2, Summer and Autumn 2013, Page 117-118

R. Jalili


3. Editorial

Volume 6, Issue 1, Winter and Spring 2014, Page 1-2

R. Jalili


4. Editorial

Volume 6, Issue 2, Summer and Autumn 2014, Page 97-98

R. Jalili


5. Editorial

Volume 1, Issue 1, Winter and Spring 2009, Page 1-2

M. R. Aref; R. Jalili


6. Editorial

Volume 1, Issue 2, Summer and Autumn 2009, Page 69-70

R. Jalili


7. Editorial

Volume 2, Issue 1, Winter and Spring 2010, Page 1-2

R. Jalili


8. Editorial

Volume 2, Issue 2, Summer and Autumn 2010, Page 67-68

R. Jalili


9. Editorial

Volume 3, Issue 1, Winter and Spring 2011, Page 1-2

R. Jalili


10. Editorial

Volume 3, Issue 2, Summer and Autumn 2011, Page 67-68

R. Jalili


11. Editorial

Volume 4, Issue 1, Winter and Spring 2012, Page 1-2

R. Jalili


12. Editorial

Volume 7, Issue 1, Winter and Spring 2015, Page 1-2

R. Jalili


13. Editorial

Volume 7, Issue 2, Summer and Autumn 2015, Page 89-90

R. Jalili


14. Editorial

Volume 8, Issue 1, Winter and Spring 2016, Page 1-2

M. R. Aref


15. Editorial

Volume 8, Issue 2, Summer and Autumn 2016, Page 91-92

M. R. Aref


16. Editorial

Volume 4, Issue 2, Summer and Autumn 2012, Page 95-96

R. Jalili


17. Editorial

Volume 9, Issue 1, Winter and Spring 2017, Page 1-2

M. R. Aref


18. Editorial

Volume 9, Issue 2, Summer and Autumn 2017, Page 99-100

M. R. Aref


19. Editorial

Volume 10, Issue 1, Winter and Spring 2018, Page 1-2


20. Editorial

Volume 10, Issue 2, Summer and Autumn 2018, Page 77-78

M.R. Aref


21. Editorial

Volume 11, Issue 1, Winter and Spring 2019, Page 1-2

Mohammad Reza Aref


22. New Fixed Point Attacks on GOST2 Block Cipher

Articles in Press, Accepted Manuscript, Available Online from 26 June 2019

Siavash Ahmadi; Mohammad Reza Aref


23. Algebraic Matching of Vulnerabilities in a Low-Level Code

Volume 11, Special Issue, Summer and Autumn 2019, Page 1-7

Oleksandr Letychevskyi; Yaroslav Hryniuk; Viktor Yakovlev; Volodymyr Peschanenko; Viktor Radchenko


24. Eigenvalues-based LSB steganalysis

Volume 4, Issue 2, Summer and Autumn 2012, Page 97-106

F. Farhat; A. Diyanat; Sh. Ghaemmaghami; M. R. Aref


25. A survey on digital data hiding schemes: principals, algorithms, and applications

Volume 5, Issue 1, Winter and Spring 2013, Page 5-36

M. A. Akhaee; F. Marvasti