Number of Articles: 184
76. Image flip CAPTCHA

Volume 1, Issue 2, Summer and Autumn 2009, Pages 105-123

M. Tariq Banday; N. A. Shah


77. A hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection

Volume 2, Issue 1, Winter and Spring 2010, Pages 33-46

M. Saniee Abadeh; J. Habibi


78. High capacity steganography tool for Arabic text using 'Kashida'

Volume 2, Issue 2, Summer and Autumn 2010, Pages 107-118

A. Abdul-Aziz Gutub; A. A. Al-Nazer


79. Double voter perceptible blind signature based electronic voting protocol

Volume 3, Issue 1, Winter and Spring 2011, Pages 43-50

Y. Baseri; A. Mortazavi; M. Rajabzadeh Asaar; M. Pourpouneh; J. Mohajeri


80. A model for specification, composition and verification of access control policies and its application to web services

Volume 3, Issue 2, Summer and Autumn 2011, Pages 103-120

Z. Derakhshandeh; B. Tork Ladani


82. A combination of semantic and attribute-based access control model for virtual organizations

Volume 7, Issue 1, Winter and Spring 2015, Pages 27-45

M. Amini; M. Arasteh


83. EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations

Volume 7, Issue 2, Summer and Autumn 2015, Pages 115-126

R. Ebrahimi Atani; Sh. Ebrahimi Atani; A. Hassani Karbasi


84. Aggrandizing the beast's limbs: patulous code reuse attack on ARM architecture

Volume 8, Issue 1, Winter and Spring 2016, Pages 39-52

F. Aminmansour; H. R. Shahriari


85. A novel key management scheme for heterogeneous sensor networks based on the position of nodes

Volume 8, Issue 2, Summer and Autumn 2016, Pages 115-130

T. Y. Rezapour; R. Ebrahimi Atani; M. S. Abolghasemi


86. LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring

Volume 9, Issue 1, Winter and Spring 2017, Pages 27-39

A. R. Ahadipour; A. R. Keshavarz-Haddad


87. A new CPA resistant software implementation for symmetric ciphers with smoothed power consumption: SIMON case study

Volume 9, Issue 2, Summer and Autumn 2017, Pages 119-130

M. Safaei Pour; M. Salmasizadeh


88. Classification of encrypted traffic for applications based on statistical features

Volume 10, Issue 1, Winter and Spring 2018, Pages 29-43

A. fanian; E. Mahdavi; H. Hassannejad


89. Distributed Contingency Logic and Security

Volume 10, Issue 2, Summer and Autumn 2018, Pages 107-115

R. Ramezanian


90. Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives

Volume 11, Issue 1, Winter and Spring 2019, Pages 35-46

Akbar Mahmoodi Rishakani; Mohammad Reza Mirzaee Shamsabad; S. M. Dehnavi; Mohammad Amin Amiri; Hamidreza Maimani; Nasour Bagheri


91. A Sudy on Information Privacy Issue on Social Networks

Volume 11, Issue 3, Summer and Autumn 2019, Pages 19-27

Soran Ibrahim; Qing Tan


92. Relaxed Differential Fault Analysis of SHA-3

Volume 11, Issue 2, Summer and Autumn 2019, Pages 129-143

S.Ehsan Hosiny Nezhad; Masoumeh Safkhani; Nasour Bagheri


94. DyVSoR: dynamic malware detection based on extracting patterns from value sets of registers

Volume 5, Issue 1, Winter and Spring 2013, Pages 71-82

M. Ghiasi; A. Sami; Z. Salehi


95. Prediction of user's trustworthiness in web-based social networks via text mining

Volume 5, Issue 2, Summer and Autumn 2013, Pages 171-187

H. Mohammadhassanzadeh; H. R. Shahriari


96. Toward an energy efficient PKC-based key management system for wireless sensor networks

Volume 6, Issue 1, Winter and Spring 2014, Pages 53-66

H. Ghasemzadeh; A. Payandeh; M. R. Aref


97. A hybrid approach for database intrusion detection at transaction and inter-transaction levels

Volume 6, Issue 2, Summer and Autumn 2014, Pages 155-167

M. Doroudian; H. R. Shahriari


98. CAMAC: a context-aware mandatory access control model

Volume 1, Issue 1, Winter and Spring 2009, Pages 35-54

J. H. Jafarian; M. Amini


99. An efficient blind signature scheme based on the elliptic curve discrete logarithm problem

Volume 1, Issue 2, Summer and Autumn 2009, Pages 125-131

M. Nikooghadam; A. Zakerolhosseini


100. A context-sensitive dynamic role-based access control model for pervasive computing environments

Volume 2, Issue 1, Winter and Spring 2010, Pages 47-66

S. Sadat Emami; S. Zokaei