1. Artemia: a family of provably secure authenticated encryption schemes

Volume 6, Issue 2, Summer and Autumn 2014, Page 125-139

J. Alizadeh; M. R. Aref; N. Bagheri


2. Steganalysis of embedding in difference of image pixel pairs by neural network

Volume 1, Issue 1, Winter and Spring 2009, Page 17-26

V. Sabeti; Sh. Samavi; M. Mahdavi; Sh. Shirani


3. Security testing of session initiation protocol implementations

Volume 1, Issue 2, Summer and Autumn 2009, Page 91-103

I. G. Harris; T. Alrahem; A. Chen; N. DiGiuseppe; J. Gee; Sh. P. Hsiao; S. Mattox; T. Park; S. Selvaraj; A. Tam; M. Carlsson


5. An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks

Volume 2, Issue 2, Summer and Autumn 2010, Page 89-105

A. Fanian; M. Berenjkoub; H. Saidi; T. A. Gulliver


6. QTRU: quaternionic version of the NTRU public-key cryptosystems

Volume 3, Issue 1, Winter and Spring 2011, Page 29-42

E. Malekian; A. Zakerolhosseini; A. Mashatan


7. Alert correlation and prediction using data mining and HMM

Volume 3, Issue 2, Summer and Autumn 2011, Page 77-101

H. Farhadi; M. AmirHaeri; M. Khansari


8. On the multi _ chi-square tests and their data complexity

Volume 4, Issue 1, Winter and Spring 2012, Page 15-24

A. Vardasbi; M. Salmasizadeh; J. Mohajeri


9. A novel local search method for microaggregation

Volume 7, Issue 1, Winter and Spring 2015, Page 15-26

R. Mortazavi; S. Jalili


10. Efficient implementation of low time complexity and pipelined bit-parallel polynomial basis multiplier over binary finite fields

Volume 7, Issue 2, Summer and Autumn 2015, Page 101-114

B. Rashidi; R. Rezaeian Farashahi; S. M. Sayedi


11. On the design and security of a lattice-based threshold secret sharing scheme

Volume 8, Issue 1, Winter and Spring 2016, Page 25-38

H. R. Amini Khorasgani; S. Asaad; H. Pilaram; T. Eghlidos; M. R. Aref


12. Traceability improvements of a new RFID protocol based on EPC C1 G2

Volume 8, Issue 2, Summer and Autumn 2016, Page 105-114

S. Sajjadi Ghaemmaghami; A. Haghbin; M. Mirmohseni


13. Side channel parameter characteristics of code injection attacks

Volume 9, Issue 1, Winter and Spring 2017, Page 17-26

E. Aerabi; M. Kaykha; M. Fazeli; A. Patooghy; A. Akbari


14. An efficient secure channel coding scheme based on polar codes

Volume 9, Issue 2, Summer and Autumn 2017, Page 111-118

B. Mafakheri; T. Eghlidos; H. Pilaram


15. An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks

Volume 10, Issue 1, Winter and Spring 2018, Page 15-27

A. Mohseni-Ejiyeh; M. Ashouri-Talouki; M. Mahdavi


16. Impossible Differential Cryptanalysis on Deoxys-BC-256

Volume 10, Issue 2, Summer and Autumn 2018, Page 93-105

F. Moazami; A.R. Mehrdad; H. Soleimany


17. SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing

Volume 11, Issue 1, Winter and Spring 2019, Page 15-34

Javad Ghareh Chamani; Mohammad Sadeq Dousti; Rasool Jalili; Dimitrios Papadopoulos


18. A Sudy on Information Privacy Issue on Social Networks

Volume 11, Special Issue, Summer and Autumn 2019, Page 19-27

Soran Ibrahim; Qing Tan


19. Anomaly Detection Using SVM as Classifier and Decision Tree for Optimizing Feature Vectors

Articles in Press, Accepted Manuscript, Available Online from 03 August 2019

Hossein Gharaee Garakani


20. Improving security of double random phase encoding with chaos theory using fractal images

Volume 4, Issue 2, Summer and Autumn 2012, Page 115-124

M. Taheri; S. Mozaffari


21. Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC

Volume 5, Issue 1, Winter and Spring 2013, Page 55-70

M. Sabzinejad Farash; M. Ahmadian Attari


22. GTrust: a group based trust model

Volume 5, Issue 2, Summer and Autumn 2013, Page 155-170

M. Ezhei; B. Tork Ladani


23. A centralized privacy-preserving framework for online social networks

Volume 6, Issue 1, Winter and Spring 2014, Page 35-52

F. Raji; A. Miri; M. Davarpanah Jazi


24. An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks

Volume 6, Issue 2, Summer and Autumn 2014, Page 141-153

A. fanian; F. Alamifar; M. Berenjkoub


25. A collusion attack on the fuzzy vault scheme

Volume 1, Issue 1, Winter and Spring 2009, Page 27-34

H. T. Poon; A. Miri