Number of Articles: 184
51. Artemia: a family of provably secure authenticated encryption schemes

Volume 6, Issue 2, Summer and Autumn 2014, Pages 125-139

J. Alizadeh; M. R. Aref; N. Bagheri


52. Steganalysis of embedding in difference of image pixel pairs by neural network

Volume 1, Issue 1, Winter and Spring 2009, Pages 17-26

V. Sabeti; Sh. Samavi; M. Mahdavi; Sh. Shirani


53. Security testing of session initiation protocol implementations

Volume 1, Issue 2, Summer and Autumn 2009, Pages 91-103

I. G. Harris; T. Alrahem; A. Chen; N. DiGiuseppe; J. Gee; Sh. P. Hsiao; S. Mattox; T. Park; S. Selvaraj; A. Tam; M. Carlsson


54. A particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs

Volume 2, Issue 1, Winter and Spring 2010, Pages 13-32

M. Abadi; S. Jalili


55. An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks

Volume 2, Issue 2, Summer and Autumn 2010, Pages 89-105

A. Fanian; M. Berenjkoub; H. Saidi; T. A. Gulliver


56. QTRU: quaternionic version of the NTRU public-key cryptosystems

Volume 3, Issue 1, Winter and Spring 2011, Pages 29-42

E. Malekian; A. Zakerolhosseini; A. Mashatan


57. Alert correlation and prediction using data mining and HMM

Volume 3, Issue 2, Summer and Autumn 2011, Pages 77-101

H. Farhadi; M. AmirHaeri; M. Khansari


58. On the multi _ chi-square tests and their data complexity

Volume 4, Issue 1, Winter and Spring 2012, Pages 15-24

A. Vardasbi; M. Salmasizadeh; J. Mohajeri


59. A novel local search method for microaggregation

Volume 7, Issue 1, Winter and Spring 2015, Pages 15-26

R. Mortazavi; S. Jalili


60. Efficient implementation of low time complexity and pipelined bit-parallel polynomial basis multiplier over binary finite fields

Volume 7, Issue 2, Summer and Autumn 2015, Pages 101-114

B. Rashidi; R. Rezaeian Farashahi; S. M. Sayedi


61. On the design and security of a lattice-based threshold secret sharing scheme

Volume 8, Issue 1, Winter and Spring 2016, Pages 25-38

H. R. Amini Khorasgani; S. Asaad; H. Pilaram; T. Eghlidos; M. R. Aref


62. Traceability improvements of a new RFID protocol based on EPC C1 G2

Volume 8, Issue 2, Summer and Autumn 2016, Pages 105-114

S. Sajjadi Ghaemmaghami; A. Haghbin; M. Mirmohseni


63. Side channel parameter characteristics of code injection attacks

Volume 9, Issue 1, Winter and Spring 2017, Pages 17-26

E. Aerabi; M. Kaykha; M. Fazeli; A. Patooghy; A. Akbari


64. An efficient secure channel coding scheme based on polar codes

Volume 9, Issue 2, Summer and Autumn 2017, Pages 111-118

B. Mafakheri; T. Eghlidos; H. Pilaram


65. An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks

Volume 10, Issue 1, Winter and Spring 2018, Pages 15-27

A. Mohseni-Ejiyeh; M. Ashouri-Talouki; M. Mahdavi


66. Impossible Differential Cryptanalysis on Deoxys-BC-256

Volume 10, Issue 2, Summer and Autumn 2018, Pages 93-105

F. Moazami; A.R. Mehrdad; H. Soleimany


67. SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing

Volume 11, Issue 1, Winter and Spring 2019, Pages 15-34

Javad Ghareh Chamani; Mohammad Sadeq Dousti; Rasool Jalili; Dimitrios Papadopoulos


68. Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns

Volume 11, Issue 3, Summer and Autumn 2019, Pages 9-17

Saadi Hadjer; Yagoub Mustapha C.E.; Rachida TOUHAMI


69. A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications

Volume 11, Issue 2, Summer and Autumn 2019, Pages 113-128

Majid Bayat; Zahra Zare Jousheghani; Ashok Kumar Das; Pitam Singh; Saru Kumari; Mohammad Reza Aref


70. Improving security of double random phase encoding with chaos theory using fractal images

Volume 4, Issue 2, Summer and Autumn 2012, Pages 115-124

M. Taheri; S. Mozaffari


71. Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC

Volume 5, Issue 1, Winter and Spring 2013, Pages 55-70

M. Sabzinejad Farash; M. Ahmadian Attari


72. GTrust: a group based trust model

Volume 5, Issue 2, Summer and Autumn 2013, Pages 155-170

M. Ezhei; B. Tork Ladani


73. A centralized privacy-preserving framework for online social networks

Volume 6, Issue 1, Winter and Spring 2014, Pages 35-52

F. Raji; A. Miri; M. Davarpanah Jazi


74. An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks

Volume 6, Issue 2, Summer and Autumn 2014, Pages 141-153

A. fanian; F. Alamifar; M. Berenjkoub


75. A collusion attack on the fuzzy vault scheme

Volume 1, Issue 1, Winter and Spring 2009, Pages 27-34

H. T. Poon; A. Miri