Number of Articles: 188
51. A computational model and convergence theorem for rumor dissemination in social networks

Volume 5, Issue 2, Summer and Autumn 2013, Pages 141-154

M. Amoozgar; R. Ramezanian


52. Total break of Zorro using linear and differential attacks

Volume 6, Issue 1, Winter and Spring 2014, Pages 23-34

Sh. Rasoolzadeh; Z. Ahmadian; M. Salmasizadeh; M. R. Aref


53. Artemia: a family of provably secure authenticated encryption schemes

Volume 6, Issue 2, Summer and Autumn 2014, Pages 125-139

J. Alizadeh; M. R. Aref; N. Bagheri


54. Steganalysis of embedding in difference of image pixel pairs by neural network

Volume 1, Issue 1, Winter and Spring 2009, Pages 17-26

V. Sabeti; Sh. Samavi; M. Mahdavi; Sh. Shirani


55. Security testing of session initiation protocol implementations

Volume 1, Issue 2, Summer and Autumn 2009, Pages 91-103

I. G. Harris; T. Alrahem; A. Chen; N. DiGiuseppe; J. Gee; Sh. P. Hsiao; S. Mattox; T. Park; S. Selvaraj; A. Tam; M. Carlsson


56. A particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs

Volume 2, Issue 1, Winter and Spring 2010, Pages 13-32

M. Abadi; S. Jalili


57. An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks

Volume 2, Issue 2, Summer and Autumn 2010, Pages 89-105

A. Fanian; M. Berenjkoub; H. Saidi; T. A. Gulliver


58. QTRU: quaternionic version of the NTRU public-key cryptosystems

Volume 3, Issue 1, Winter and Spring 2011, Pages 29-42

E. Malekian; A. Zakerolhosseini; A. Mashatan


59. Alert correlation and prediction using data mining and HMM

Volume 3, Issue 2, Summer and Autumn 2011, Pages 77-101

H. Farhadi; M. AmirHaeri; M. Khansari


60. On the multi _ chi-square tests and their data complexity

Volume 4, Issue 1, Winter and Spring 2012, Pages 15-24

A. Vardasbi; M. Salmasizadeh; J. Mohajeri


61. A novel local search method for microaggregation

Volume 7, Issue 1, Winter and Spring 2015, Pages 15-26

R. Mortazavi; S. Jalili


62. Efficient implementation of low time complexity and pipelined bit-parallel polynomial basis multiplier over binary finite fields

Volume 7, Issue 2, Summer and Autumn 2015, Pages 101-114

B. Rashidi; R. Rezaeian Farashahi; S. M. Sayedi


63. On the design and security of a lattice-based threshold secret sharing scheme

Volume 8, Issue 1, Winter and Spring 2016, Pages 25-38

H. R. Amini Khorasgani; S. Asaad; H. Pilaram; T. Eghlidos; M. R. Aref


64. Traceability improvements of a new RFID protocol based on EPC C1 G2

Volume 8, Issue 2, Summer and Autumn 2016, Pages 105-114

S. Sajjadi Ghaemmaghami; A. Haghbin; M. Mirmohseni


65. Side channel parameter characteristics of code injection attacks

Volume 9, Issue 1, Winter and Spring 2017, Pages 17-26

E. Aerabi; M. Kaykha; M. Fazeli; A. Patooghy; A. Akbari


66. An efficient secure channel coding scheme based on polar codes

Volume 9, Issue 2, Summer and Autumn 2017, Pages 111-118

B. Mafakheri; T. Eghlidos; H. Pilaram


67. An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks

Volume 10, Issue 1, Winter and Spring 2018, Pages 15-27

A. Mohseni-Ejiyeh; M. Ashouri-Talouki; M. Mahdavi


68. Impossible Differential Cryptanalysis on Deoxys-BC-256

Volume 10, Issue 2, Summer and Autumn 2018, Pages 93-105

F. Moazami; A.R. Mehrdad; H. Soleimany


69. SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing

Volume 11, Issue 1, Winter and Spring 2019, Pages 15-34

Javad Ghareh Chamani; Mohammad Sadeq Dousti; Rasool Jalili; Dimitrios Papadopoulos


70. Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns

Volume 11, Issue 3, Summer and Autumn 2019, Pages 9-17

Saadi Hadjer; Yagoub Mustapha C.E.; Rachida TOUHAMI


71. A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications

Volume 11, Issue 2, Summer and Autumn 2019, Pages 113-128

Majid Bayat; Zahra Zare Jousheghani; Ashok Kumar Das; Pitam Singh; Saru Kumari; Mohammad Reza Aref


72. Investigation of some attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) variants

Articles in Press, Accepted Manuscript, Available Online from 08 January 2020

Majid Mahmoudzadeh Niknam; Sadegh Sadeghi; Mohammad Reza Aref; Nasour Bagheri


73. Improving security of double random phase encoding with chaos theory using fractal images

Volume 4, Issue 2, Summer and Autumn 2012, Pages 115-124

M. Taheri; S. Mozaffari


74. Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC

Volume 5, Issue 1, Winter and Spring 2013, Pages 55-70

M. Sabzinejad Farash; M. Ahmadian Attari


75. GTrust: a group based trust model

Volume 5, Issue 2, Summer and Autumn 2013, Pages 155-170

M. Ezhei; B. Tork Ladani