Number of Articles: 188
101. A hybrid approach for database intrusion detection at transaction and inter-transaction levels

Volume 6, Issue 2, Summer and Autumn 2014, Pages 155-167

M. Doroudian; H. R. Shahriari


102. CAMAC: a context-aware mandatory access control model

Volume 1, Issue 1, Winter and Spring 2009, Pages 35-54

J. H. Jafarian; M. Amini


103. An efficient blind signature scheme based on the elliptic curve discrete logarithm problem

Volume 1, Issue 2, Summer and Autumn 2009, Pages 125-131

M. Nikooghadam; A. Zakerolhosseini


104. A context-sensitive dynamic role-based access control model for pervasive computing environments

Volume 2, Issue 1, Winter and Spring 2010, Pages 47-66

S. Sadat Emami; S. Zokaei


105. Detection of perturbed quantization (PQ) steganography based on empirical matrix

Volume 2, Issue 2, Summer and Autumn 2010, Pages 119-128

M. Abolghasemi; H. Aghaeinia; K. Faez


106. Intelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms

Volume 3, Issue 1, Winter and Spring 2011, Pages 51-66

M. Deljavan Amiri; H. Danyali; B. Zahir-Azami


107. Separating indexes from data: a distributed scheme for secure database outsourcing

Volume 3, Issue 2, Summer and Autumn 2011, Pages 121-133

S. Soltani; M. A. Hadavi; R. Jalili


108. Private Key based query on encrypted data

Volume 4, Issue 1, Winter and Spring 2012, Pages 41-50

H. Afzali; H. Nemati; R. Azmi


109. Optimizing image steganography by combining the GA and ICA

Volume 7, Issue 1, Winter and Spring 2015, Pages 47-58

F. Sadeghi; F. Zarisfi Kermani; M. Kuchaki Rafsanjani


110. Cryptanalysis of some first round CAESAR candidates

Volume 7, Issue 2, Summer and Autumn 2015, Pages 127-134

J. Alizadeh; M. R. Aref; N. Bagheri; H. Sadeghi


111. Self authentication path insertion in FPGA-based design flow for tamper-resistant purpose

Volume 8, Issue 1, Winter and Spring 2016, Pages 53-60

Sh. Zamanzadeh; A. Jahanian


112. Optimum decoder for multiplicative spread spectrum image watermarking with Laplacian modeling

Volume 8, Issue 2, Summer and Autumn 2016, Pages 131-139

N. Zarmehi; M. R. Aref


113. A new security proof for FMNV continuous non-malleable encoding scheme

Volume 9, Issue 1, Winter and Spring 2017, Pages 41-51

A. Mortazavi; M. Salmasizadeh; A. Daneshgar


114. Cipher text only attack on speech time scrambling systems using correction of audio spectrogram

Volume 9, Issue 2, Summer and Autumn 2017, Pages 131-145

H. Ghasemzadeh; M. Tajik Khasss; H. Mehrara


115. NETRU: A Non-commutative and Secure Variant of CTRU Cryptosystem

Volume 10, Issue 1, Winter and Spring 2018, Pages 45-53

Reza Ebrahimi Atani; Shahabaddin Ebrahimi Atani; A. Hassani Karbasi


116. On the Security of O-PSI: A Delegated Private Set Intersection on Outsourced Datasets (Extended Version)

Volume 10, Issue 2, Summer and Autumn 2018, Pages 117-127

M. Mahdavi Oliaee; M. Delavar; M.H. Ameri; J. Mohajeri; M.R. Aref


117. Secure FPGA Design by Filling Unused Spaces

Volume 11, Issue 1, Winter and Spring 2019, Pages 47-56

Mansoureh Labbafniya; Roghaye Saeidi


118. New Fixed Point Attacks on GOST2 Block Cipher

Volume 11, Issue 2, Summer and Autumn 2019, Pages 145-158

Siavash Ahmadi; Mohammad Reza Aref


119. Medical Image Compression Based on Region of Interest

Volume 11, Issue 3, Summer and Autumn 2019, Pages 29-34

Dalia Shaaban; Mohamed Saad; Ahmed Madian; Hesham Elmahdy


120. Analyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications

Volume 4, Issue 2, Summer and Autumn 2012, Pages 137-150

E. K. Mabuto; H. S. Venter


121. Robust multiplicative video watermarking using statistical modeling

Volume 5, Issue 1, Winter and Spring 2013, Pages 83-95

A. Diyanat; M. A. Akhaee; Sh. Ghaemmaghami


122. Convertible limited (multi-) verifier signature: new constructions and applications

Volume 5, Issue 2, Summer and Autumn 2013, Pages 189-208

S. Avizheh; M. Rajabzadeh Asaar; M. Salmasizadeh


123. Improving Tor security against timing and traffic analysis attacks with fair randomization

Volume 6, Issue 1, Winter and Spring 2014, Pages 67-76

A. Tavakoly; R. Ebrahimi Atani


124. An extended feature set for blind image steganalysis in contourlet domain

Volume 6, Issue 2, Summer and Autumn 2014, Pages 169-181

E. Shakeri; Sh. Ghaemmaghami