1. Detection of perturbed quantization (PQ) steganography based on empirical matrix

Volume 2, Issue 2, Summer and Autumn 2010, Page 119-128

M. Abolghasemi; H. Aghaeinia; K. Faez


2. Intelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms

Volume 3, Issue 1, Winter and Spring 2011, Page 51-66

M. Deljavan Amiri; H. Danyali; B. Zahir-Azami


3. Separating indexes from data: a distributed scheme for secure database outsourcing

Volume 3, Issue 2, Summer and Autumn 2011, Page 121-133

S. Soltani; M. A. Hadavi; R. Jalili


4. Private Key based query on encrypted data

Volume 4, Issue 1, Winter and Spring 2012, Page 41-50

H. Afzali; H. Nemati; R. Azmi


5. Optimizing image steganography by combining the GA and ICA

Volume 7, Issue 1, Winter and Spring 2015, Page 47-58

F. Sadeghi; F. Zarisfi Kermani; M. Kuchaki Rafsanjani


6. Cryptanalysis of some first round CAESAR candidates

Volume 7, Issue 2, Summer and Autumn 2015, Page 127-134

J. Alizadeh; M. R. Aref; N. Bagheri; H. Sadeghi


7. Self authentication path insertion in FPGA-based design flow for tamper-resistant purpose

Volume 8, Issue 1, Winter and Spring 2016, Page 53-60

Sh. Zamanzadeh; A. Jahanian


8. Optimum decoder for multiplicative spread spectrum image watermarking with Laplacian modeling

Volume 8, Issue 2, Summer and Autumn 2016, Page 131-139

N. Zarmehi; M. R. Aref


9. A new security proof for FMNV continuous non-malleable encoding scheme

Volume 9, Issue 1, Winter and Spring 2017, Page 41-51

A. Mortazavi; M. Salmasizadeh; A. Daneshgar


10. Cipher text only attack on speech time scrambling systems using correction of audio spectrogram

Volume 9, Issue 2, Summer and Autumn 2017, Page 131-145

H. Ghasemzadeh; M. Tajik Khasss; H. Mehrara


11. NETRU: A Non-commutative and Secure Variant of CTRU Cryptosystem

Volume 10, Issue 1, Winter and Spring 2018, Page 45-53

Reza Ebrahimi Atani; Shahabaddin Ebrahimi Atani; A. Hassani Karbasi


12. On the Security of O-PSI: A Delegated Private Set Intersection on Outsourced Datasets (Extended Version)

Volume 10, Issue 2, Summer and Autumn 2018, Page 117-127

M. Mahdavi Oliaee; M. Delavar; M.H. Ameri; J. Mohajeri; M.R. Aref


13. Secure FPGA Design by Filling Unused Spaces

Volume 11, Issue 1, Winter and Spring 2019, Page 47-56

Mansoureh Labbafniya; Roghaye Saeidi


14. The Role of Packet Tracer in Learning Wireless Networks and Managing IoT Devices

Volume 11, Special Issue, Summer and Autumn 2019, Page 35-38

Rawan Flifel


15. A lightweight privacy-preserving authenticated key exchange scheme for smart grid communications

Articles in Press, Accepted Manuscript, Available Online from 13 August 2019

Majid Bayat; Zahra Zare Jousheghani; Ashok Kumar Das; Pitam Singh; Saru Kumari; mohammadreza aref


16. Analyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications

Volume 4, Issue 2, Summer and Autumn 2012, Page 137-150

E. K. Mabuto; H. S. Venter


17. Robust multiplicative video watermarking using statistical modeling

Volume 5, Issue 1, Winter and Spring 2013, Page 83-95

A. Diyanat; M. A. Akhaee; Sh. Ghaemmaghami


18. Convertible limited (multi-) verifier signature: new constructions and applications

Volume 5, Issue 2, Summer and Autumn 2013, Page 189-208

S. Avizheh; M. Rajabzadeh Asaar; M. Salmasizadeh


19. Improving Tor security against timing and traffic analysis attacks with fair randomization

Volume 6, Issue 1, Winter and Spring 2014, Page 67-76

A. Tavakoly; R. Ebrahimi Atani


20. An extended feature set for blind image steganalysis in contourlet domain

Volume 6, Issue 2, Summer and Autumn 2014, Page 169-181

E. Shakeri; Sh. Ghaemmaghami


22. BotOnus: an online unsupervised method for Botnet detection

Volume 4, Issue 1, Winter and Spring 2012, Page 51-62

M. Yahyazadeh; M. Abadi


23. GGRA: a grouped gossip-based reputation aggregation algorithm

Volume 7, Issue 1, Winter and Spring 2015, Page 59-74

S. Ghasemi Falavarjani; Behrouz Tork Ladani; S. Ghasemi


24. Enhancing privacy of recent authentication schemes for low-cost RFID systems

Volume 7, Issue 2, Summer and Autumn 2015, Page 135-149

K. Baghery; B. Abdolmaleki; B. Akhbari; M. R. Aref


25. Unauthenticated event detection in wireless sensor networks using sensors co-coverage

Volume 8, Issue 1, Winter and Spring 2016, Page 61-71

M. Kamarei; A. Patooghy; M. Fazeli