Number of Articles: 188
76. A centralized privacy-preserving framework for online social networks

Volume 6, Issue 1, Winter and Spring 2014, Pages 35-52

F. Raji; A. Miri; M. Davarpanah Jazi


77. An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks

Volume 6, Issue 2, Summer and Autumn 2014, Pages 141-153

A. fanian; F. Alamifar; M. Berenjkoub


78. A collusion attack on the fuzzy vault scheme

Volume 1, Issue 1, Winter and Spring 2009, Pages 27-34

H. T. Poon; A. Miri


79. Image flip CAPTCHA

Volume 1, Issue 2, Summer and Autumn 2009, Pages 105-123

M. Tariq Banday; N. A. Shah


80. A hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection

Volume 2, Issue 1, Winter and Spring 2010, Pages 33-46

M. Saniee Abadeh; J. Habibi


81. High capacity steganography tool for Arabic text using 'Kashida'

Volume 2, Issue 2, Summer and Autumn 2010, Pages 107-118

A. Abdul-Aziz Gutub; A. A. Al-Nazer


82. Double voter perceptible blind signature based electronic voting protocol

Volume 3, Issue 1, Winter and Spring 2011, Pages 43-50

Y. Baseri; A. Mortazavi; M. Rajabzadeh Asaar; M. Pourpouneh; J. Mohajeri


83. A model for specification, composition and verification of access control policies and its application to web services

Volume 3, Issue 2, Summer and Autumn 2011, Pages 103-120

Z. Derakhshandeh; B. Tork Ladani


85. A combination of semantic and attribute-based access control model for virtual organizations

Volume 7, Issue 1, Winter and Spring 2015, Pages 27-45

M. Amini; M. Arasteh


86. EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations

Volume 7, Issue 2, Summer and Autumn 2015, Pages 115-126

R. Ebrahimi Atani; Sh. Ebrahimi Atani; A. Hassani Karbasi


87. Aggrandizing the beast's limbs: patulous code reuse attack on ARM architecture

Volume 8, Issue 1, Winter and Spring 2016, Pages 39-52

F. Aminmansour; H. R. Shahriari


88. A novel key management scheme for heterogeneous sensor networks based on the position of nodes

Volume 8, Issue 2, Summer and Autumn 2016, Pages 115-130

T. Y. Rezapour; R. Ebrahimi Atani; M. S. Abolghasemi


89. LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring

Volume 9, Issue 1, Winter and Spring 2017, Pages 27-39

A. R. Ahadipour; A. R. Keshavarz-Haddad


90. A new CPA resistant software implementation for symmetric ciphers with smoothed power consumption: SIMON case study

Volume 9, Issue 2, Summer and Autumn 2017, Pages 119-130

M. Safaei Pour; M. Salmasizadeh


91. Classification of encrypted traffic for applications based on statistical features

Volume 10, Issue 1, Winter and Spring 2018, Pages 29-43

A. fanian; E. Mahdavi; H. Hassannejad


92. Distributed Contingency Logic and Security

Volume 10, Issue 2, Summer and Autumn 2018, Pages 107-115

R. Ramezanian


93. Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives

Volume 11, Issue 1, Winter and Spring 2019, Pages 35-46

Akbar Mahmoodi Rishakani; Mohammad Reza Mirzaee Shamsabad; S. M. Dehnavi; Mohammad Amin Amiri; Hamidreza Maimani; Nasour Bagheri


94. A Sudy on Information Privacy Issue on Social Networks

Volume 11, Issue 3, Summer and Autumn 2019, Pages 19-27

Soran Ibrahim; Qing Tan


95. Relaxed Differential Fault Analysis of SHA-3

Volume 11, Issue 2, Summer and Autumn 2019, Pages 129-143

S.Ehsan Hosiny Nezhad; Masoumeh Safkhani; Nasour Bagheri


96. Anomaly-based web attack detection: The application of deep neural network seq2seq with attention mechanism

Articles in Press, Accepted Manuscript, Available Online from 21 January 2020

Shahriar Mohammadi; Amin Namadchian


98. DyVSoR: dynamic malware detection based on extracting patterns from value sets of registers

Volume 5, Issue 1, Winter and Spring 2013, Pages 71-82

M. Ghiasi; A. Sami; Z. Salehi


99. Prediction of user's trustworthiness in web-based social networks via text mining

Volume 5, Issue 2, Summer and Autumn 2013, Pages 171-187

H. Mohammadhassanzadeh; H. R. Shahriari


100. Toward an energy efficient PKC-based key management system for wireless sensor networks

Volume 6, Issue 1, Winter and Spring 2014, Pages 53-66

H. Ghasemzadeh; A. Payandeh; M. R. Aref