Number of Articles: 188
51. A computational model and convergence theorem for rumor dissemination in social networks

Volume 5, Issue 2, Summer and Autumn 2013, Pages 141-154

M. Amoozgar; R. Ramezanian

52. Total break of Zorro using linear and differential attacks

Volume 6, Issue 1, Winter and Spring 2014, Pages 23-34

Sh. Rasoolzadeh; Z. Ahmadian; M. Salmasizadeh; M. R. Aref

53. Artemia: a family of provably secure authenticated encryption schemes

Volume 6, Issue 2, Summer and Autumn 2014, Pages 125-139

J. Alizadeh; M. R. Aref; N. Bagheri

54. Steganalysis of embedding in difference of image pixel pairs by neural network

Volume 1, Issue 1, Winter and Spring 2009, Pages 17-26

V. Sabeti; Sh. Samavi; M. Mahdavi; Sh. Shirani

55. Security testing of session initiation protocol implementations

Volume 1, Issue 2, Summer and Autumn 2009, Pages 91-103

I. G. Harris; T. Alrahem; A. Chen; N. DiGiuseppe; J. Gee; Sh. P. Hsiao; S. Mattox; T. Park; S. Selvaraj; A. Tam; M. Carlsson

56. A particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs

Volume 2, Issue 1, Winter and Spring 2010, Pages 13-32

M. Abadi; S. Jalili

57. An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks

Volume 2, Issue 2, Summer and Autumn 2010, Pages 89-105

A. Fanian; M. Berenjkoub; H. Saidi; T. A. Gulliver

58. QTRU: quaternionic version of the NTRU public-key cryptosystems

Volume 3, Issue 1, Winter and Spring 2011, Pages 29-42

E. Malekian; A. Zakerolhosseini; A. Mashatan

59. Alert correlation and prediction using data mining and HMM

Volume 3, Issue 2, Summer and Autumn 2011, Pages 77-101

H. Farhadi; M. AmirHaeri; M. Khansari

60. On the multi _ chi-square tests and their data complexity

Volume 4, Issue 1, Winter and Spring 2012, Pages 15-24

A. Vardasbi; M. Salmasizadeh; J. Mohajeri

61. A novel local search method for microaggregation

Volume 7, Issue 1, Winter and Spring 2015, Pages 15-26

R. Mortazavi; S. Jalili

62. Efficient implementation of low time complexity and pipelined bit-parallel polynomial basis multiplier over binary finite fields

Volume 7, Issue 2, Summer and Autumn 2015, Pages 101-114

B. Rashidi; R. Rezaeian Farashahi; S. M. Sayedi

63. On the design and security of a lattice-based threshold secret sharing scheme

Volume 8, Issue 1, Winter and Spring 2016, Pages 25-38

H. R. Amini Khorasgani; S. Asaad; H. Pilaram; T. Eghlidos; M. R. Aref

64. Traceability improvements of a new RFID protocol based on EPC C1 G2

Volume 8, Issue 2, Summer and Autumn 2016, Pages 105-114

S. Sajjadi Ghaemmaghami; A. Haghbin; M. Mirmohseni

65. Side channel parameter characteristics of code injection attacks

Volume 9, Issue 1, Winter and Spring 2017, Pages 17-26

E. Aerabi; M. Kaykha; M. Fazeli; A. Patooghy; A. Akbari

66. An efficient secure channel coding scheme based on polar codes

Volume 9, Issue 2, Summer and Autumn 2017, Pages 111-118

B. Mafakheri; T. Eghlidos; H. Pilaram

67. An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks

Volume 10, Issue 1, Winter and Spring 2018, Pages 15-27

A. Mohseni-Ejiyeh; M. Ashouri-Talouki; M. Mahdavi

68. Impossible Differential Cryptanalysis on Deoxys-BC-256

Volume 10, Issue 2, Summer and Autumn 2018, Pages 93-105

F. Moazami; A.R. Mehrdad; H. Soleimany

69. SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing

Volume 11, Issue 1, Winter and Spring 2019, Pages 15-34

Javad Ghareh Chamani; Mohammad Sadeq Dousti; Rasool Jalili; Dimitrios Papadopoulos

70. Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns

Volume 11, Issue 3, Summer and Autumn 2019, Pages 9-17

Saadi Hadjer; Yagoub Mustapha C.E.; Rachida TOUHAMI

71. A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications

Volume 11, Issue 2, Summer and Autumn 2019, Pages 113-128

Majid Bayat; Zahra Zare Jousheghani; Ashok Kumar Das; Pitam Singh; Saru Kumari; Mohammad Reza Aref

72. Investigation of some attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) variants

Articles in Press, Accepted Manuscript, Available Online from 08 January 2020

Majid Mahmoudzadeh Niknam; Sadegh Sadeghi; Mohammad Reza Aref; Nasour Bagheri

73. Improving security of double random phase encoding with chaos theory using fractal images

Volume 4, Issue 2, Summer and Autumn 2012, Pages 115-124

M. Taheri; S. Mozaffari

74. Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC

Volume 5, Issue 1, Winter and Spring 2013, Pages 55-70

M. Sabzinejad Farash; M. Ahmadian Attari

75. GTrust: a group based trust model

Volume 5, Issue 2, Summer and Autumn 2013, Pages 155-170

M. Ezhei; B. Tork Ladani