Number of Articles: 188
26. A survey on digital data hiding schemes: principals, algorithms, and applications

Volume 5, Issue 1, Winter and Spring 2013, Pages 5-36

M. A. Akhaee; F. Marvasti


27. A semantic-aware role-based access control model for pervasive computing environments

Volume 5, Issue 2, Summer and Autumn 2013, Pages 119-140

A. Javadi; M. Amini


28. Access control in ultra-large-scale systems using a data-centric middleware

Volume 6, Issue 1, Winter and Spring 2014, Pages 3-22

S. Shokrollahi; F. Shams; J. Esmaeili


29. A risk model for cloud processes

Volume 6, Issue 2, Summer and Autumn 2014, Pages 99-123

E. Damiani; S. Cimato; G. Gianini


30. A TESLA-based mutual authentication protocol for GSM networks

Volume 1, Issue 1, Winter and Spring 2009, Pages 3-15

A. Fanian; M. Berenjkoub; T. A. Gulliver


31. Moving dispersion method for statistical anomaly detection in intrusion detection systems

Volume 1, Issue 2, Summer and Autumn 2009, Pages 71-90

J. Dj. Golic'


32. Stream ciphers and the eSTREAM project

Volume 2, Issue 1, Winter and Spring 2010, Pages 3-11

V. Rijmen


33. Authorization models for secure information sharing: a survey and research agenda

Volume 2, Issue 2, Summer and Autumn 2010, Pages 69-87

F. Salim; J. Reid; E. Dawson


34. Computer security in the future

Volume 3, Issue 1, Winter and Spring 2011, Pages 3-27

M. Bishop


35. Constructing cryptographic definitions

Volume 3, Issue 2, Summer and Autumn 2011, Pages 69-76

P. Rogaway


36. Improving the Rao-Nam secret key cryptosystem using regular EDF-QC-LDPC codes

Volume 4, Issue 1, Winter and Spring 2012, Pages 3-14

R. Hooshmand; T. Eghlidos; M. R. Aref


37. A traceable optimistic fair exchange protocol in the standard model

Volume 7, Issue 1, Winter and Spring 2015, Pages 3-14

R. Ganjavi; M. Rajabzadeh Asaar; M. Salmasizadeh


41. An efficient certificateless signcryption scheme in the standard model

Volume 9, Issue 1, Winter and Spring 2017, Pages 3-16

P. Rastegari; M. Berenjkoub


42. On the computational complexity of finding a minimal basis for the guess and determine attack

Volume 9, Issue 2, Summer and Autumn 2017, Pages 101-110

Sh. Khazaei; F. Moazami


43. Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher (Extended Version)

Volume 10, Issue 1, Winter and Spring 2018, Pages 3-13

A. Rezaei Shahmirzdi; A. Azimi; M. Salmasizadeh; J. Mohajeri; M. R. Aref


44. A Survey of Anomaly Detection Approaches in Internet of Things

Volume 10, Issue 2, Summer and Autumn 2018, Pages 79-92

M. Behniafar; A.R. Nowroozi; H.R. Shahriari


45. A Trust Based Probabilistic Method for Efficient Correctness Verification in Database Outsourcing

Volume 11, Issue 1, Winter and Spring 2019, Pages 3-14

Simin Ghasemi; Mohammad Ali Hadavi; Mina Niknafs


46. Algebraic Matching of Vulnerabilities in a Low-Level Code

Volume 11, Issue 3, Summer and Autumn 2019, Pages 1-7

Oleksandr Letychevskyi; Yaroslav Hryniuk; Viktor Yakovlev; Volodymyr Peschanenko; Viktor Radchenko


47. Interdependent Security Game Design over Constrained Linear Influence Networks

Volume 11, Issue 2, Summer and Autumn 2019, Pages 95-111

Seyed Alireza Hasheminasab; Behrouz Tork Ladani; Tansu Alpcan


48. Improved univariate microaggregation for integer values

Articles in Press, Accepted Manuscript, Available Online from 22 December 2019

Reza Mortazavi


49. Cryptanalysis of GSM encryption algorithm A5/1

Volume 4, Issue 2, Summer and Autumn 2012, Pages 107-114

V. Amin Ghafari; A. Vardasbi; J. Mohajeri


50. Design and formal verification of DZMBE+

Volume 5, Issue 1, Winter and Spring 2013, Pages 37-53

M. Soodkhah Mohammadi; A. Ghaemi Bafghi