1. Image flip CAPTCHA

Volume 1, Issue 2, Summer and Autumn 2009, Page 105-123

M. Tariq Banday; N. A. Shah


2. A hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection

Volume 2, Issue 1, Winter and Spring 2010, Page 33-46

M. Saniee Abadeh; J. Habibi


3. High capacity steganography tool for Arabic text using 'Kashida'

Volume 2, Issue 2, Summer and Autumn 2010, Page 107-118

A. Abdul-Aziz Gutub; A. A. Al-Nazer


4. Double voter perceptible blind signature based electronic voting protocol

Volume 3, Issue 1, Winter and Spring 2011, Page 43-50

Y. Baseri; A. Mortazavi; M. Rajabzadeh Asaar; M. Pourpouneh; J. Mohajeri


7. A combination of semantic and attribute-based access control model for virtual organizations

Volume 7, Issue 1, Winter and Spring 2015, Page 27-45

M. Amini; M. Arasteh


8. EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations

Volume 7, Issue 2, Summer and Autumn 2015, Page 115-126

R. Ebrahimi Atani; Sh. Ebrahimi Atani; A. Hassani Karbasi


9. Aggrandizing the beast's limbs: patulous code reuse attack on ARM architecture

Volume 8, Issue 1, Winter and Spring 2016, Page 39-52

F. Aminmansour; H. R. Shahriari


10. A novel key management scheme for heterogeneous sensor networks based on the position of nodes

Volume 8, Issue 2, Summer and Autumn 2016, Page 115-130

T. Y. Rezapour; R. Ebrahimi Atani; M. S. Abolghasemi


11. LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring

Volume 9, Issue 1, Winter and Spring 2017, Page 27-39

A. R. Ahadipour; A. R. Keshavarz-Haddad


12. A new CPA resistant software implementation for symmetric ciphers with smoothed power consumption: SIMON case study

Volume 9, Issue 2, Summer and Autumn 2017, Page 119-130

M. Safaei Pour; M. Salmasizadeh


13. Classification of encrypted traffic for applications based on statistical features

Volume 10, Issue 1, Winter and Spring 2018, Page 29-43

A. fanian; E. Mahdavi; H. Hassannejad


14. Distributed Contingency Logic and Security

Volume 10, Issue 2, Summer and Autumn 2018, Page 107-115

R. Ramezanian


15. Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives

Volume 11, Issue 1, Winter and Spring 2019, Page 35-46

Akbar Mahmoodi Rishakani; Mohammad Reza Mirzaee Shamsabad; S. M. Dehnavi; Mohammad Amin Amiri; Hamidreza Maimani; Nasour Bagheri


16. Medical Image Compression Based on Region of Interest

Volume 11, Special Issue, Summer and Autumn 2019, Page 29-34

Dalia Shaaban; Mohamed Saad; Ahmed Madian; Hesham Elmahdy


17. Relaxed Differential Fault Analysis of SHA-3

Articles in Press, Accepted Manuscript, Available Online from 05 August 2019

S.Ehsan Hosiny Nezhad; Masoumeh Safkhani; Nasour Bagheri


19. DyVSoR: dynamic malware detection based on extracting patterns from value sets of registers

Volume 5, Issue 1, Winter and Spring 2013, Page 71-82

M. Ghiasi; A. Sami; Z. Salehi


20. Prediction of user's trustworthiness in web-based social networks via text mining

Volume 5, Issue 2, Summer and Autumn 2013, Page 171-187

H. Mohammadhassanzadeh; H. R. Shahriari


21. Toward an energy efficient PKC-based key management system for wireless sensor networks

Volume 6, Issue 1, Winter and Spring 2014, Page 53-66

H. Ghasemzadeh; A. Payandeh; M. R. Aref


22. A hybrid approach for database intrusion detection at transaction and inter-transaction levels

Volume 6, Issue 2, Summer and Autumn 2014, Page 155-167

M. Doroudian; H. R. Shahriari


23. CAMAC: a context-aware mandatory access control model

Volume 1, Issue 1, Winter and Spring 2009, Page 35-54

J. H. Jafarian; M. Amini


24. An efficient blind signature scheme based on the elliptic curve discrete logarithm problem

Volume 1, Issue 2, Summer and Autumn 2009, Page 125-131

M. Nikooghadam; A. Zakerolhosseini


25. A context-sensitive dynamic role-based access control model for pervasive computing environments

Volume 2, Issue 1, Winter and Spring 2010, Page 47-66

S. Sadat Emami; S. Zokaei