Number of Articles: 184
101. Detection of perturbed quantization (PQ) steganography based on empirical matrix

Volume 2, Issue 2, Summer and Autumn 2010, Pages 119-128

M. Abolghasemi; H. Aghaeinia; K. Faez


102. Intelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms

Volume 3, Issue 1, Winter and Spring 2011, Pages 51-66

M. Deljavan Amiri; H. Danyali; B. Zahir-Azami


103. Separating indexes from data: a distributed scheme for secure database outsourcing

Volume 3, Issue 2, Summer and Autumn 2011, Pages 121-133

S. Soltani; M. A. Hadavi; R. Jalili


104. Private Key based query on encrypted data

Volume 4, Issue 1, Winter and Spring 2012, Pages 41-50

H. Afzali; H. Nemati; R. Azmi


105. Optimizing image steganography by combining the GA and ICA

Volume 7, Issue 1, Winter and Spring 2015, Pages 47-58

F. Sadeghi; F. Zarisfi Kermani; M. Kuchaki Rafsanjani


106. Cryptanalysis of some first round CAESAR candidates

Volume 7, Issue 2, Summer and Autumn 2015, Pages 127-134

J. Alizadeh; M. R. Aref; N. Bagheri; H. Sadeghi


107. Self authentication path insertion in FPGA-based design flow for tamper-resistant purpose

Volume 8, Issue 1, Winter and Spring 2016, Pages 53-60

Sh. Zamanzadeh; A. Jahanian


108. Optimum decoder for multiplicative spread spectrum image watermarking with Laplacian modeling

Volume 8, Issue 2, Summer and Autumn 2016, Pages 131-139

N. Zarmehi; M. R. Aref


109. A new security proof for FMNV continuous non-malleable encoding scheme

Volume 9, Issue 1, Winter and Spring 2017, Pages 41-51

A. Mortazavi; M. Salmasizadeh; A. Daneshgar


110. Cipher text only attack on speech time scrambling systems using correction of audio spectrogram

Volume 9, Issue 2, Summer and Autumn 2017, Pages 131-145

H. Ghasemzadeh; M. Tajik Khasss; H. Mehrara


111. NETRU: A Non-commutative and Secure Variant of CTRU Cryptosystem

Volume 10, Issue 1, Winter and Spring 2018, Pages 45-53

Reza Ebrahimi Atani; Shahabaddin Ebrahimi Atani; A. Hassani Karbasi


112. On the Security of O-PSI: A Delegated Private Set Intersection on Outsourced Datasets (Extended Version)

Volume 10, Issue 2, Summer and Autumn 2018, Pages 117-127

M. Mahdavi Oliaee; M. Delavar; M.H. Ameri; J. Mohajeri; M.R. Aref


113. Secure FPGA Design by Filling Unused Spaces

Volume 11, Issue 1, Winter and Spring 2019, Pages 47-56

Mansoureh Labbafniya; Roghaye Saeidi


114. New Fixed Point Attacks on GOST2 Block Cipher

Volume 11, Issue 2, Summer and Autumn 2019, Pages 145-158

Siavash Ahmadi; Mohammad Reza Aref


115. Medical Image Compression Based on Region of Interest

Volume 11, Issue 3, Summer and Autumn 2019, Pages 29-34

Dalia Shaaban; Mohamed Saad; Ahmed Madian; Hesham Elmahdy


116. Analyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications

Volume 4, Issue 2, Summer and Autumn 2012, Pages 137-150

E. K. Mabuto; H. S. Venter


117. Robust multiplicative video watermarking using statistical modeling

Volume 5, Issue 1, Winter and Spring 2013, Pages 83-95

A. Diyanat; M. A. Akhaee; Sh. Ghaemmaghami


118. Convertible limited (multi-) verifier signature: new constructions and applications

Volume 5, Issue 2, Summer and Autumn 2013, Pages 189-208

S. Avizheh; M. Rajabzadeh Asaar; M. Salmasizadeh


119. Improving Tor security against timing and traffic analysis attacks with fair randomization

Volume 6, Issue 1, Winter and Spring 2014, Pages 67-76

A. Tavakoly; R. Ebrahimi Atani


120. An extended feature set for blind image steganalysis in contourlet domain

Volume 6, Issue 2, Summer and Autumn 2014, Pages 169-181

E. Shakeri; Sh. Ghaemmaghami


122. BotOnus: an online unsupervised method for Botnet detection

Volume 4, Issue 1, Winter and Spring 2012, Pages 51-62

M. Yahyazadeh; M. Abadi


123. GGRA: a grouped gossip-based reputation aggregation algorithm

Volume 7, Issue 1, Winter and Spring 2015, Pages 59-74

S. Ghasemi Falavarjani; Behrouz Tork Ladani; S. Ghasemi


124. Enhancing privacy of recent authentication schemes for low-cost RFID systems

Volume 7, Issue 2, Summer and Autumn 2015, Pages 135-149

K. Baghery; B. Abdolmaleki; B. Akhbari; M. R. Aref


125. Unauthenticated event detection in wireless sensor networks using sensors co-coverage

Volume 8, Issue 1, Winter and Spring 2016, Pages 61-71

M. Kamarei; A. Patooghy; M. Fazeli