A

  • Abadi, M. A particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs [Volume 2, Issue 1, 2010, Pages 13-32]

  • Abadi, M. BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms [Volume 4, Issue 1, 2012, Pages 25-39]

  • Abadi, M. BotOnus: an online unsupervised method for Botnet detection [Volume 4, Issue 1, 2012, Pages 51-62]

  • Abbas, Sagheer Evaluation of Planet Factors of Smart City through Multi-layer Fuzzy Logic (MFL) [Volume 11, Issue 3, 2019, Pages 51-58]

  • Abbas, Sagheer An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling [Volume 11, Issue 3, 2019, Pages 145-151]

  • Abdollahi Azgomi, M. Quantitative evaluation of software security: an approach based on UML/SecAM and evidence theory [Volume 8, Issue 2, 2016, Pages 141-153]

  • Abdolmaleki, B. Enhancing privacy of recent authentication schemes for low-cost RFID systems [Volume 7, Issue 2, 2015, Pages 135-149]

  • Abolghasemi, M. Detection of perturbed quantization (PQ) steganography based on empirical matrix [Volume 2, Issue 2, 2010, Pages 119-128]

  • Abolghasemi, M. S. A novel key management scheme for heterogeneous sensor networks based on the position of nodes [Volume 8, Issue 2, 2016, Pages 115-130]

  • Adnan Khan, Muhammad Evaluation of Planet Factors of Smart City through Multi-layer Fuzzy Logic (MFL) [Volume 11, Issue 3, 2019, Pages 51-58]

  • Adnan Khan, Muhammad An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling [Volume 11, Issue 3, 2019, Pages 145-151]

  • Aerabi, E. Side channel parameter characteristics of code injection attacks [Volume 9, Issue 1, 2017, Pages 17-26]

  • Afzali, H. Private Key based query on encrypted data [Volume 4, Issue 1, 2012, Pages 41-50]

  • Aghaeinia, H. Detection of perturbed quantization (PQ) steganography based on empirical matrix [Volume 2, Issue 2, 2010, Pages 119-128]

  • Ahadipour, A. R. LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring [Volume 9, Issue 1, 2017, Pages 27-39]

  • Ahmad, Gulzar Cloud and IoT based Smart Car Parking System by using Mamdani Fuzzy Inference System (MFIS) [Volume 11, Issue 3, 2019, Pages 153-160]

  • Ahmadi, Siavash Biclique Cryptanalysis of Block Ciphers LBlock and TWINE-80 with Practical Data Complexity [Volume 11, Issue 1, 2019, Pages 57-74]

  • Ahmadi, Siavash New Fixed Point Attacks on GOST2 Block Cipher [Volume 11, Issue 2, 2019, Pages 145-158]

  • Ahmadian, Z. Total break of Zorro using linear and differential attacks [Volume 6, Issue 1, 2014, Pages 23-34]

  • Ahmadian, Zahra Biclique Cryptanalysis of Block Ciphers LBlock and TWINE-80 with Practical Data Complexity [Volume 11, Issue 1, 2019, Pages 57-74]

  • Ahmadian Attari, M. Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC [Volume 5, Issue 1, 2013, Pages 55-70]

  • Akbari, A. Side channel parameter characteristics of code injection attacks [Volume 9, Issue 1, 2017, Pages 17-26]

  • Akhaee, M. A. A survey on digital data hiding schemes: principals, algorithms, and applications [Volume 5, Issue 1, 2013, Pages 5-36]

  • Akhaee, M. A. Robust multiplicative video watermarking using statistical modeling [Volume 5, Issue 1, 2013, Pages 83-95]

  • Akhbari, B. Enhancing privacy of recent authentication schemes for low-cost RFID systems [Volume 7, Issue 2, 2015, Pages 135-149]

  • Akram, Ali An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling [Volume 11, Issue 3, 2019, Pages 145-151]

  • Alahmari, Saad Ali Using Machine Learning ARIMA to Predict the Price of Cryptocurrencies [Volume 11, Issue 3, 2019, Pages 139-144]

  • Alamifar, F. An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks [Volume 6, Issue 2, 2014, Pages 141-153]

  • Alizadeh, J. Artemia: a family of provably secure authenticated encryption schemes [Volume 6, Issue 2, 2014, Pages 125-139]

  • Alizadeh, J. Cryptanalysis of some first round CAESAR candidates [Volume 7, Issue 2, 2015, Pages 127-134]

  • Aljedaibi, Wajdi Towards Measuring the Project Management Process During Large Scale Software System Implementation Phase [Volume 11, Issue 3, 2019, Pages 161-172]

  • Al-Nazer, A. A. High capacity steganography tool for Arabic text using 'Kashida' [Volume 2, Issue 2, 2010, Pages 107-118]

  • Alpcan, Tansu Interdependent Security Game Design over Constrained Linear Influence Networks [Volume 11, Issue 2, 2019, Pages 95-111]

  • Alrahem, T. Security testing of session initiation protocol implementations [Volume 1, Issue 2, 2009, Pages 91-103]

  • Alyas, Tahir Cloud and IoT based Smart Car Parking System by using Mamdani Fuzzy Inference System (MFIS) [Volume 11, Issue 3, 2019, Pages 153-160]

  • Ameri, M.H. On the Security of O-PSI: A Delegated Private Set Intersection on Outsourced Datasets (Extended Version) [Volume 10, Issue 2, 2018, Pages 117-127]

  • Amin Ghafari, V. Cryptanalysis of GSM encryption algorithm A5/1 [Volume 4, Issue 2, 2012, Pages 107-114]

  • Amini, M. A semantic-aware role-based access control model for pervasive computing environments [Volume 5, Issue 2, 2013, Pages 119-140]

  • Amini, M. CAMAC: a context-aware mandatory access control model [Volume 1, Issue 1, 2009, Pages 35-54]

  • Amini, M. A combination of semantic and attribute-based access control model for virtual organizations [Volume 7, Issue 1, 2015, Pages 27-45]

  • Amini Khorasgani, H. R. On the design and security of a lattice-based threshold secret sharing scheme [Volume 8, Issue 1, 2016, Pages 25-38]

  • Aminmansour, F. Aggrandizing the beast's limbs: patulous code reuse attack on ARM architecture [Volume 8, Issue 1, 2016, Pages 39-52]

  • Aminmansour, F. Dwarf Frankenstein is still in your memory: tiny code reuse attacks [Volume 9, Issue 1, 2017, Pages 53-72]

  • AmirHaeri, M. Alert correlation and prediction using data mining and HMM [Volume 3, Issue 2, 2011, Pages 77-101]

  • Amiri, Mohammad Amin Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives [Volume 11, Issue 1, 2019, Pages 35-46]

  • Amoozgar, M. A computational model and convergence theorem for rumor dissemination in social networks [Volume 5, Issue 2, 2013, Pages 141-154]

  • Anum, Leena Evaluation of Planet Factors of Smart City through Multi-layer Fuzzy Logic (MFL) [Volume 11, Issue 3, 2019, Pages 51-58]

  • Anum, Leena An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling [Volume 11, Issue 3, 2019, Pages 145-151]

  • Aqel, Musbah A Comparison Study between Intelligent Decision Support Systems and Decision Support Systems [Volume 11, Issue 3, 2019, Pages 187-194]

  • Aqel, Musbah The Impact of The Biometric System on Election Fraud Elimination: Case of The North of IRAQ [Volume 11, Issue 3, 2019, Pages 195-207]

  • Arasteh, M. A combination of semantic and attribute-based access control model for virtual organizations [Volume 7, Issue 1, 2015, Pages 27-45]

  • Aref, M. R. Editorial [Volume 1, Issue 1, 2009, Pages 1-2]

  • Aref, M. R. Editorial [Volume 8, Issue 1, 2016, Pages 1-2]

  • Aref, Mohammad Reza Biclique Cryptanalysis of Block Ciphers LBlock and TWINE-80 with Practical Data Complexity [Volume 11, Issue 1, 2019, Pages 57-74]

  • Aref, Mohammad Reza Editorial [Volume 11, Issue 1, 2019, Pages 1-2]

  • Aref, Mohammad Reza New Fixed Point Attacks on GOST2 Block Cipher [Volume 11, Issue 2, 2019, Pages 145-158]

  • Aref, Mohammad Reza A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications [Volume 11, Issue 2, 2019, Pages 113-128]

  • Aref, Mohammad Reza Editorial [Volume 11, Issue 2, 2019, Pages 93-94]

  • Aref, Mohammad Reza Editorial [Volume 11, Issue 3, 2019]

  • Aref, Mohammad Reza Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants [Volume 12, Issue 1, 2020, Pages 13-23]

  • Aref, M. R. Eigenvalues-based LSB steganalysis [Volume 4, Issue 2, 2012, Pages 97-106]

  • Aref, M. R. Total break of Zorro using linear and differential attacks [Volume 6, Issue 1, 2014, Pages 23-34]

  • Aref, M. R. Toward an energy efficient PKC-based key management system for wireless sensor networks [Volume 6, Issue 1, 2014, Pages 53-66]

  • Aref, M. R. Artemia: a family of provably secure authenticated encryption schemes [Volume 6, Issue 2, 2014, Pages 125-139]

  • Aref, M. R. Improving the Rao-Nam secret key cryptosystem using regular EDF-QC-LDPC codes [Volume 4, Issue 1, 2012, Pages 3-14]

  • Aref, M. R. Cryptanalysis of some first round CAESAR candidates [Volume 7, Issue 2, 2015, Pages 127-134]

  • Aref, M. R. Enhancing privacy of recent authentication schemes for low-cost RFID systems [Volume 7, Issue 2, 2015, Pages 135-149]

  • Aref, M. R. On the design and security of a lattice-based threshold secret sharing scheme [Volume 8, Issue 1, 2016, Pages 25-38]

  • Aref, M. R. Optimum decoder for multiplicative spread spectrum image watermarking with Laplacian modeling [Volume 8, Issue 2, 2016, Pages 131-139]

  • Aref, M. R. Editorial [Volume 8, Issue 2, 2016, Pages 91-92]

  • Aref, M. R. Editorial [Volume 9, Issue 1, 2017, Pages 1-2]

  • Aref, M. R. Editorial [Volume 9, Issue 2, 2017, Pages 99-100]

  • Aref, M. R. Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher (Extended Version) [Volume 10, Issue 1, 2018, Pages 3-13]

  • Aref, M.R. On the Security of O-PSI: A Delegated Private Set Intersection on Outsourced Datasets (Extended Version) [Volume 10, Issue 2, 2018, Pages 117-127]

  • Aref, M.R. Editorial [Volume 10, Issue 2, 2018, Pages 77-78]

  • Asaad, S. On the design and security of a lattice-based threshold secret sharing scheme [Volume 8, Issue 1, 2016, Pages 25-38]

  • Asenov, Ivaylo Access and Mobility Policy Control at the Network Edge [Volume 11, Issue 3, 2019, Pages 105-111]

  • A. Shah, N. Image flip CAPTCHA [Volume 1, Issue 2, 2009, Pages 105-123]

  • Ashouri-Talouki, M. An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks [Volume 10, Issue 1, 2018, Pages 15-27]

  • Ashouri-Talouki, Maede Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems [Volume 12, Issue 2, 2020, Pages 129-140]

  • Asif, Muhammad Evaluation of Planet Factors of Smart City through Multi-layer Fuzzy Logic (MFL) [Volume 11, Issue 3, 2019, Pages 51-58]

  • Asif, Muhammad Cloud and IoT based Smart Car Parking System by using Mamdani Fuzzy Inference System (MFIS) [Volume 11, Issue 3, 2019, Pages 153-160]

  • Atanasov, Ivaylo Access and Mobility Policy Control at the Network Edge [Volume 11, Issue 3, 2019, Pages 105-111]

  • Atia, Ayman Hand Gestures Classification with Multi-Core DTW [Volume 11, Issue 3, 2019, Pages 91-96]

  • Avizheh, S. Convertible limited (multi-) verifier signature: new constructions and applications [Volume 5, Issue 2, 2013, Pages 189-208]

  • Azimi, A. Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher (Extended Version) [Volume 10, Issue 1, 2018, Pages 3-13]

  • Azmi, R. STLR: a novel danger theory based structural TLR algorithm [Volume 5, Issue 2, 2013, Pages 209-225]

  • Azmi, R. Private Key based query on encrypted data [Volume 4, Issue 1, 2012, Pages 41-50]

B

  • Bagheri, N. Artemia: a family of provably secure authenticated encryption schemes [Volume 6, Issue 2, 2014, Pages 125-139]

  • Bagheri, N. Cryptanalysis of some first round CAESAR candidates [Volume 7, Issue 2, 2015, Pages 127-134]

  • Bagheri, N. A note on the security of two improved RFID protocols [Volume 8, Issue 2, 2016, Pages 155-160]

  • Bagheri, Nasour Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives [Volume 11, Issue 1, 2019, Pages 35-46]

  • Bagheri, Nasour Relaxed Differential Fault Analysis of SHA-3 [Volume 11, Issue 2, 2019, Pages 129-143]

  • Bagheri, Nasour Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants [Volume 12, Issue 1, 2020, Pages 13-23]

  • Bagheri, Nasour CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking [Volume 12, Issue 2, 2020, Pages 67-80]

  • Bagherpour, Bagher A Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions [Volume 12, Issue 2, 2020, Pages 91-99]

  • Baghery, K. Enhancing privacy of recent authentication schemes for low-cost RFID systems [Volume 7, Issue 2, 2015, Pages 135-149]

  • Bahramgiri, H. A new method for accelerating impossible differential cryptanalysis and its application on LBlock [Volume 8, Issue 1, 2016, Pages 73-84]

  • BaniMustafa, Ahmed Enhancing Learning from Imbalanced Classes via Data Preprocessing: A Data-Driven Application in Metabolomics Data Mining [Volume 11, Issue 3, 2019, Pages 79-89]

  • Barani, F. BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms [Volume 4, Issue 1, 2012, Pages 25-39]

  • Baseri, Y. Double voter perceptible blind signature based electronic voting protocol [Volume 3, Issue 1, 2011, Pages 43-50]

  • Bayat, Majid A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications [Volume 11, Issue 2, 2019, Pages 113-128]

  • Bayat Sarmadi, Siavash A Trusted Design Platform for Trojan Detection in FPGA Bitstreams Using Partial Reconfiguration [Volume 13, Issue 1, 2021, Pages 29-45]

  • Behniafar, M. A Survey of Anomaly Detection Approaches in Internet of Things [Volume 10, Issue 2, 2018, Pages 79-92]

  • Bel, K. Nalini Sujantha OT-Feature Extraction on Scrambled Images with Instantaneous Clustering for CBIR Scheme in Cloud Computing [Volume 13, Issue 1, 2021, Pages 1-17]

  • Berenjkoub, M. An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks [Volume 6, Issue 2, 2014, Pages 141-153]

  • Berenjkoub, M. A TESLA-based mutual authentication protocol for GSM networks [Volume 1, Issue 1, 2009, Pages 3-15]

  • Berenjkoub, M. An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks [Volume 2, Issue 2, 2010, Pages 89-105]

  • Berenjkoub, M. An efficient certificateless signcryption scheme in the standard model [Volume 9, Issue 1, 2017, Pages 3-16]

  • Bishop, M. Computer security in the future [Volume 3, Issue 1, 2011, Pages 3-27]

  • Bohlooli, R. Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version) [Volume 10, Issue 2, 2018, Pages 129-139]

  • Böhm, Markus Critical Success Factors for Data Virtualization: A Literature Review [Volume 11, Issue 3, 2019, Pages 131-137]

C

  • Carlsson, M. Security testing of session initiation protocol implementations [Volume 1, Issue 2, 2009, Pages 91-103]

  • Chegeni, Vahid Providing a Hybrid Cryptography Algorithm for Lightweight Authentication Protocol in RFID with Urban Traffic Usage Case [Volume 13, Issue 1, 2021, Pages 73-85]

  • Chen, A. Security testing of session initiation protocol implementations [Volume 1, Issue 2, 2009, Pages 91-103]

  • Cimato, S. A risk model for cloud processes [Volume 6, Issue 2, 2014, Pages 99-123]

  • Córdova, Felisa Cognitive Strategic Model applied to a Port System [Volume 11, Issue 3, 2019, Pages 73-78]

D

  • Dahri, Kamran Aspect Oriented UML to ECORE Model Transformation [Volume 11, Issue 3, 2019, Pages 97-103]

  • Damiani, E. A risk model for cloud processes [Volume 6, Issue 2, 2014, Pages 99-123]

  • Daneshgar, A. A new security proof for FMNV continuous non-malleable encoding scheme [Volume 9, Issue 1, 2017, Pages 41-51]

  • Danyali, H. Intelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms [Volume 3, Issue 1, 2011, Pages 51-66]

  • Davarpanah Jazi, M. A centralized privacy-preserving framework for online social networks [Volume 6, Issue 1, 2014, Pages 35-52]

  • Dawson, E. Authorization models for secure information sharing: a survey and research agenda [Volume 2, Issue 2, 2010, Pages 69-87]

  • Dehnavi, S. M. Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives [Volume 11, Issue 1, 2019, Pages 35-46]

  • Delavar, M. On the Security of O-PSI: A Delegated Private Set Intersection on Outsourced Datasets (Extended Version) [Volume 10, Issue 2, 2018, Pages 117-127]

  • Deljavan Amiri, M. Intelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms [Volume 3, Issue 1, 2011, Pages 51-66]

  • Derakhshandeh, Z. A model for specification, composition and verification of access control policies and its application to web services [Volume 3, Issue 2, 2011, Pages 103-120]

  • DiGiuseppe, N. Security testing of session initiation protocol implementations [Volume 1, Issue 2, 2009, Pages 91-103]

  • Diyanat, A. Eigenvalues-based LSB steganalysis [Volume 4, Issue 2, 2012, Pages 97-106]

  • Diyanat, A. Robust multiplicative video watermarking using statistical modeling [Volume 5, Issue 1, 2013, Pages 83-95]

  • Doroudian, M. A hybrid approach for database intrusion detection at transaction and inter-transaction levels [Volume 6, Issue 2, 2014, Pages 155-167]

  • Dorri Nogoorani, S. A collusion mitigation scheme for reputation systems [Volume 7, Issue 2, 2015, Pages 151-166]

  • Dousti, Mohammad Sadeq SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing [Volume 11, Issue 1, 2019, Pages 15-34]

  • D. R. Assis, Karcius A Fair Power Allocation for Non-Orthogonal Multiple Access in the Power Domain [Volume 11, Issue 3, 2019, Pages 123-130]

  • Durán, Claudia Cognitive Strategic Model applied to a Port System [Volume 11, Issue 3, 2019, Pages 73-78]

E

  • Ebrahimi Atani, R. Improving Tor security against timing and traffic analysis attacks with fair randomization [Volume 6, Issue 1, 2014, Pages 67-76]

  • Ebrahimi Atani, R. EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations [Volume 7, Issue 2, 2015, Pages 115-126]

  • Ebrahimi Atani, R. A novel key management scheme for heterogeneous sensor networks based on the position of nodes [Volume 8, Issue 2, 2016, Pages 115-130]

  • Ebrahimi Atani, Reza NETRU: A Non-commutative and Secure Variant of CTRU Cryptosystem [Volume 10, Issue 1, 2018, Pages 45-53]

  • Ebrahimi Atani, Reza A New Ring-Based SPHF and PAKE Protocol On Ideal Lattices [Volume 11, Issue 1, 2019, Pages 75-86]

  • Ebrahimi Atani, Sh. EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations [Volume 7, Issue 2, 2015, Pages 115-126]

  • Ebrahimi Atani, Shahabaddin NETRU: A Non-commutative and Secure Variant of CTRU Cryptosystem [Volume 10, Issue 1, 2018, Pages 45-53]

  • Ebrahimi Atani, Shahabaddin A New Ring-Based SPHF and PAKE Protocol On Ideal Lattices [Volume 11, Issue 1, 2019, Pages 75-86]

  • E. Cordeiro Junior, Joel A Fair Power Allocation for Non-Orthogonal Multiple Access in the Power Domain [Volume 11, Issue 3, 2019, Pages 123-130]

  • Eghlidos, T. Improving the Rao-Nam secret key cryptosystem using regular EDF-QC-LDPC codes [Volume 4, Issue 1, 2012, Pages 3-14]

  • Eghlidos, T. On the design and security of a lattice-based threshold secret sharing scheme [Volume 8, Issue 1, 2016, Pages 25-38]

  • Eghlidos, T. An efficient secure channel coding scheme based on polar codes [Volume 9, Issue 2, 2017, Pages 111-118]

  • Elmahdy, Hesham Medical Image Compression Based on Region of Interest [Volume 11, Issue 3, 2019, Pages 29-34]

  • Eshghi, M. Image encryption based on chaotic tent map in time and frequency domains [Volume 5, Issue 1, 2013, Pages 97-110]

  • Eskandari, Zahra Extension of Cube Attack with Probabilistic Equations and its Application on Cryptanalysis of KATAN Cipher [Volume 12, Issue 1, 2020, Pages 1-12]

  • Esmaeili, J. Access control in ultra-large-scale systems using a data-centric middleware [Volume 6, Issue 1, 2014, Pages 3-22]

  • Etemadi Borujeni, Shahram Hardware Trojan Prevention and Detection by Filling Unused Space Using Shift registers, Gate-chain and Extra Routing [Volume 13, Issue 1, 2021, Pages 47-57]

  • Ezhei, M. GTrust: a group based trust model [Volume 5, Issue 2, 2013, Pages 155-170]

F

  • Faez, K. Detection of perturbed quantization (PQ) steganography based on empirical matrix [Volume 2, Issue 2, 2010, Pages 119-128]

  • Fanian, A. A TESLA-based mutual authentication protocol for GSM networks [Volume 1, Issue 1, 2009, Pages 3-15]

  • Fanian, A. An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks [Volume 2, Issue 2, 2010, Pages 89-105]

  • Farhadi, H. Alert correlation and prediction using data mining and HMM [Volume 3, Issue 2, 2011, Pages 77-101]

  • Farhat, F. Eigenvalues-based LSB steganalysis [Volume 4, Issue 2, 2012, Pages 97-106]

  • Farooq, Umer Cloud and IoT based Smart Car Parking System by using Mamdani Fuzzy Inference System (MFIS) [Volume 11, Issue 3, 2019, Pages 153-160]

  • Fatima, Areej Evaluation of Planet Factors of Smart City through Multi-layer Fuzzy Logic (MFL) [Volume 11, Issue 3, 2019, Pages 51-58]

  • Fatima, Areej An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling [Volume 11, Issue 3, 2019, Pages 145-151]

  • Fazeli, M. Unauthenticated event detection in wireless sensor networks using sensors co-coverage [Volume 8, Issue 1, 2016, Pages 61-71]

  • Fazeli, M. Side channel parameter characteristics of code injection attacks [Volume 9, Issue 1, 2017, Pages 17-26]

  • Flifel, Rawan The Role of Packet Tracer in Learning Wireless Networks and Managing IoT Devices [Volume 11, Issue 3, 2019, Pages 35-38]

  • Fuhrmann, Isabel Critical Success Factors for Data Virtualization: A Literature Review [Volume 11, Issue 3, 2019, Pages 131-137]

G

  • Ganjavi, R. A traceable optimistic fair exchange protocol in the standard model [Volume 7, Issue 1, 2015, Pages 3-14]

  • Gee, J. Security testing of session initiation protocol implementations [Volume 1, Issue 2, 2009, Pages 91-103]

  • Ghaemi Bafghi, A. A confidence-aware interval-based trust model [Volume 4, Issue 2, 2012, Pages 151-165]

  • Ghaemi Bafghi, A. Design and formal verification of DZMBE+ [Volume 5, Issue 1, 2013, Pages 37-53]

  • Ghaemi Bafghi, A. SEIMCHA: a new semantic image CAPTCHA using geometric transformations [Volume 4, Issue 1, 2012, Pages 63-76]

  • Ghaemi Bafghi, Abbas Extension of Cube Attack with Probabilistic Equations and its Application on Cryptanalysis of KATAN Cipher [Volume 12, Issue 1, 2020, Pages 1-12]

  • Ghaemmaghami, Sh. Eigenvalues-based LSB steganalysis [Volume 4, Issue 2, 2012, Pages 97-106]

  • Ghaemmaghami, Sh. Robust multiplicative video watermarking using statistical modeling [Volume 5, Issue 1, 2013, Pages 83-95]

  • Ghaemmaghami, Sh. An extended feature set for blind image steganalysis in contourlet domain [Volume 6, Issue 2, 2014, Pages 169-181]

  • Gharaee Garakani, Hossein Anomaly Detection Using SVM as Classifier and Decision Tree for Optimizing Feature Vectors [Volume 11, Issue 2, 2019, Pages 159-171]

  • Ghareh Chamani, Javad SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing [Volume 11, Issue 1, 2019, Pages 15-34]

  • Ghasemi, S. GGRA: a grouped gossip-based reputation aggregation algorithm [Volume 7, Issue 1, 2015, Pages 59-74]

  • Ghasemi, Simin A Trust Based Probabilistic Method for Efficient Correctness Verification in Database Outsourcing [Volume 11, Issue 1, 2019, Pages 3-14]

  • Ghasemi Falavarjani, S. GGRA: a grouped gossip-based reputation aggregation algorithm [Volume 7, Issue 1, 2015, Pages 59-74]

  • Ghasemzadeh, H. Toward an energy efficient PKC-based key management system for wireless sensor networks [Volume 6, Issue 1, 2014, Pages 53-66]

  • Ghasemzadeh, H. Cipher text only attack on speech time scrambling systems using correction of audio spectrogram [Volume 9, Issue 2, 2017, Pages 131-145]

  • Ghiasi, M. DyVSoR: dynamic malware detection based on extracting patterns from value sets of registers [Volume 5, Issue 1, 2013, Pages 71-82]

  • Gianini, G. A risk model for cloud processes [Volume 6, Issue 2, 2014, Pages 99-123]

  • Golic', J. Dj. Moving dispersion method for statistical anomaly detection in intrusion detection systems [Volume 1, Issue 2, 2009, Pages 71-90]

  • Gottlieb, Matthias Critical Success Factors for Data Virtualization: A Literature Review [Volume 11, Issue 3, 2019, Pages 131-137]

  • Gulliver, T. A. An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks [Volume 2, Issue 2, 2010, Pages 89-105]

  • Gulliver, T. A. A TESLA-based mutual authentication protocol for GSM networks [Volume 1, Issue 1, 2009, Pages 3-15]

  • Gutub, A. Abdul-Aziz High capacity steganography tool for Arabic text using 'Kashida' [Volume 2, Issue 2, 2010, Pages 107-118]

H

  • Habibi, J. A hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection [Volume 2, Issue 1, 2010, Pages 33-46]

  • Hadavi, M. A. Separating indexes from data: a distributed scheme for secure database outsourcing [Volume 3, Issue 2, 2011, Pages 121-133]

  • Hadavi, Mohammad Ali A Trust Based Probabilistic Method for Efficient Correctness Verification in Database Outsourcing [Volume 11, Issue 1, 2019, Pages 3-14]

  • Hadjer, Saadi Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns [Volume 11, Issue 3, 2019, Pages 9-17]

  • Haghbin, A. Traceability improvements of a new RFID protocol based on EPC C1 G2 [Volume 8, Issue 2, 2016, Pages 105-114]

  • Hajian Nezhad, J. Analyzing new features of infected web content in detection of malicious web pages [Volume 9, Issue 2, 2017, Pages 161-181]

  • Haj Seyyed Javadi, Hamid Providing a Hybrid Cryptography Algorithm for Lightweight Authentication Protocol in RFID with Urban Traffic Usage Case [Volume 13, Issue 1, 2021, Pages 73-85]

  • Hakimi, A. A chaos-based video watermarking algorithm [Volume 4, Issue 1, 2012, Pages 77-86]

  • H. Al-Hemiary, Emad IoT Protocols Based Fog/Cloud over High Traffic [Volume 11, Issue 3, 2019, Pages 173-180]

  • H. Al-Hemiary, Emad Virtualized Network Management Laboratory for Educational Purposes [Volume 11, Issue 3, 2019, Pages 181-186]

  • Hamidzadeh, J. A density based clustering approach to distinguish between web robot and human requests to a web server [Volume 6, Issue 1, 2014, Pages 77-89]

  • Harati, A. SEIMCHA: a new semantic image CAPTCHA using geometric transformations [Volume 4, Issue 1, 2012, Pages 63-76]

  • Harris, I. G. Security testing of session initiation protocol implementations [Volume 1, Issue 2, 2009, Pages 91-103]

  • Hashemi, M. R. Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach [Volume 4, Issue 2, 2012, Pages 125-136]

  • Hasheminasab, Seyed Alireza Interdependent Security Game Design over Constrained Linear Influence Networks [Volume 11, Issue 2, 2019, Pages 95-111]

  • Hassan, Zaira Aspect Oriented UML to ECORE Model Transformation [Volume 11, Issue 3, 2019, Pages 97-103]

  • Hassan Ahmed, Omed Face Recognition Based Rank Reduction SVD Approach [Volume 11, Issue 3, 2019, Pages 39-50]

  • Hassani, E. Image encryption based on chaotic tent map in time and frequency domains [Volume 5, Issue 1, 2013, Pages 97-110]

  • Hassani Karbasi, A. EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations [Volume 7, Issue 2, 2015, Pages 115-126]

  • Hassani Karbasi, A. NETRU: A Non-commutative and Secure Variant of CTRU Cryptosystem [Volume 10, Issue 1, 2018, Pages 45-53]

  • Hassani Karbasi, Amir A New Ring-Based SPHF and PAKE Protocol On Ideal Lattices [Volume 11, Issue 1, 2019, Pages 75-86]

  • Hassannejad, H. Classification of encrypted traffic for applications based on statistical features [Volume 10, Issue 1, 2018, Pages 29-43]

  • Hidouci, Walid Khaled Considering Uncertainty in Modeling Historical Knowledge [Volume 11, Issue 3, 2019, Pages 59-65]

  • Hooshmand, R. Improving the Rao-Nam secret key cryptosystem using regular EDF-QC-LDPC codes [Volume 4, Issue 1, 2012, Pages 3-14]

  • Hosiny Nezhad, S.Ehsan Relaxed Differential Fault Analysis of SHA-3 [Volume 11, Issue 2, 2019, Pages 129-143]

  • Hryniuk, Yaroslav Algebraic Matching of Vulnerabilities in a Low-Level Code [Volume 11, Issue 3, 2019, Pages 1-7]

  • Hsiao, Sh. P. Security testing of session initiation protocol implementations [Volume 1, Issue 2, 2009, Pages 91-103]

I

  • Ibrahim, Dina Proposed ST-Slotted-CS-ALOHA Protocol for Time Saving and Collision Avoidance [Volume 11, Issue 3, 2019, Pages 67-72]

  • Ibrahim, Soran A Sudy on Information Privacy Issue on Social Networks [Volume 11, Issue 3, 2019, Pages 19-27]

  • Imani, M. Phishing website detection using weighted feature line embedding [Volume 9, Issue 2, 2017, Pages 147-159]

J

  • Jafarian, J. H. CAMAC: a context-aware mandatory access control model [Volume 1, Issue 1, 2009, Pages 35-54]

  • Jahanbani, Mohsen CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking [Volume 12, Issue 2, 2020, Pages 67-80]

  • Jahanian, A. Security-aware register placement to hinder malicious hardware updating and improve Trojan detectability [Volume 7, Issue 1, 2015, Pages 75-81]

  • Jahanian, A. Self authentication path insertion in FPGA-based design flow for tamper-resistant purpose [Volume 8, Issue 1, 2016, Pages 53-60]

  • Jahanian, A. ASIC design protection against reverse engineering during the fabrication process using automatic netlist obfuscation design flow [Volume 8, Issue 2, 2016, Pages 93-104]

  • Jalili, R. Editorial [Volume 5, Issue 1, 2013, Pages 1-3]

  • Jalili, R. Editorial [Volume 5, Issue 2, 2013, Pages 117-118]

  • Jalili, R. Editorial [Volume 6, Issue 1, 2014, Pages 1-2]

  • Jalili, R. Editorial [Volume 6, Issue 2, 2014, Pages 97-98]

  • Jalili, R. Editorial [Volume 1, Issue 1, 2009, Pages 1-2]

  • Jalili, R. Editorial [Volume 1, Issue 2, 2009, Pages 69-70]

  • Jalili, R. Editorial [Volume 2, Issue 1, 2010, Pages 1-2]

  • Jalili, R. Editorial [Volume 2, Issue 2, 2010, Pages 67-68]

  • Jalili, R. Editorial [Volume 3, Issue 1, 2011, Pages 1-2]

  • Jalili, R. Editorial [Volume 3, Issue 2, 2011, Pages 67-68]

  • Jalili, R. Separating indexes from data: a distributed scheme for secure database outsourcing [Volume 3, Issue 2, 2011, Pages 121-133]

  • Jalili, R. Editorial [Volume 4, Issue 1, 2012, Pages 1-2]

  • Jalili, R. Editorial [Volume 7, Issue 1, 2015, Pages 1-2]

  • Jalili, R. Editorial [Volume 7, Issue 2, 2015, Pages 89-90]

  • Jalili, R. A collusion mitigation scheme for reputation systems [Volume 7, Issue 2, 2015, Pages 151-166]

  • Jalili, R. Editorial [Volume 4, Issue 2, 2012, Pages 95-96]

  • Jalili, R. Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version) [Volume 10, Issue 2, 2018, Pages 129-139]

  • Jalili, Rasool SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing [Volume 11, Issue 1, 2019, Pages 15-34]

  • Jalili, S. A particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs [Volume 2, Issue 1, 2010, Pages 13-32]

  • Jalili, S. A novel local search method for microaggregation [Volume 7, Issue 1, 2015, Pages 15-26]

  • James, Salome An Efficient Pairing-Free Identity Based Proxy Blind Signature Scheme with Message Recovery [Volume 13, Issue 1, 2021, Pages 59-72]

  • Javadi, A. A semantic-aware role-based access control model for pervasive computing environments [Volume 5, Issue 2, 2013, Pages 119-140]

  • J.F. Alenazi, Mohammed Evaluating Multipath TCP Resilience against Link Failures [Volume 11, Issue 3, 2019, Pages 113-122]

K

  • Kamarei, M. Unauthenticated event detection in wireless sensor networks using sensors co-coverage [Volume 8, Issue 1, 2016, Pages 61-71]

  • Kanwal, Asma Cloud and IoT based Smart Car Parking System by using Mamdani Fuzzy Inference System (MFIS) [Volume 11, Issue 3, 2019, Pages 153-160]

  • Kaya, Tugberk The Impact of The Biometric System on Election Fraud Elimination: Case of The North of IRAQ [Volume 11, Issue 3, 2019, Pages 195-207]

  • Kaykha, M. Side channel parameter characteristics of code injection attacks [Volume 9, Issue 1, 2017, Pages 17-26]

  • Keshavarz-Haddad, A. R. LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring [Volume 9, Issue 1, 2017, Pages 27-39]

  • Khalesi, A. A new method for accelerating impossible differential cryptanalysis and its application on LBlock [Volume 8, Issue 1, 2016, Pages 73-84]

  • Khamis, Sufian Towards Measuring the Project Management Process During Large Scale Software System Implementation Phase [Volume 11, Issue 3, 2019, Pages 161-172]

  • Khansari, M. Alert correlation and prediction using data mining and HMM [Volume 3, Issue 2, 2011, Pages 77-101]

  • Khatter, Ehab Proposed ST-Slotted-CS-ALOHA Protocol for Time Saving and Collision Avoidance [Volume 11, Issue 3, 2019, Pages 67-72]

  • Khazaei, Sh. On the computational complexity of finding a minimal basis for the guess and determine attack [Volume 9, Issue 2, 2017, Pages 101-110]

  • Kheiri, Hossein Modified Sliding-Mode Control Method for Synchronization a Class of Chaotic Fractional-Order Systems with Application in Encryption [Volume 12, Issue 1, 2020, Pages 55-66]

  • Khoshhalpour, E. BotRevealer: Behavioral Detection of Botnets based on Botnet Life-cycle [Volume 10, Issue 1, 2018, Pages 55-61]

  • Krcmar, Helmut Critical Success Factors for Data Virtualization: A Literature Review [Volume 11, Issue 3, 2019, Pages 131-137]

  • Kuchaki Rafsanjani, M. Optimizing image steganography by combining the GA and ICA [Volume 7, Issue 1, 2015, Pages 47-58]

  • Kumar Das, Ashok A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications [Volume 11, Issue 2, 2019, Pages 113-128]

  • Kumari, Saru A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications [Volume 11, Issue 2, 2019, Pages 113-128]

L

  • Labbafniya, Mansoureh Secure FPGA Design by Filling Unused Spaces [Volume 11, Issue 1, 2019, Pages 47-56]

  • Labbafniya, Mansoureh Hardware Trojan Prevention and Detection by Filling Unused Space Using Shift registers, Gate-chain and Extra Routing [Volume 13, Issue 1, 2021, Pages 47-57]

  • L. Abdulsattar, Oula Virtualized Network Management Laboratory for Educational Purposes [Volume 11, Issue 3, 2019, Pages 181-186]

  • Letychevskyi, Oleksandr Algebraic Matching of Vulnerabilities in a Low-Level Code [Volume 11, Issue 3, 2019, Pages 1-7]

  • Lu, Joan Face Recognition Based Rank Reduction SVD Approach [Volume 11, Issue 3, 2019, Pages 39-50]

M

  • Mabuto, E. K. Analyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications [Volume 4, Issue 2, 2012, Pages 137-150]

  • Madian, Ahmed Medical Image Compression Based on Region of Interest [Volume 11, Issue 3, 2019, Pages 29-34]

  • Mafakheri, B. An efficient secure channel coding scheme based on polar codes [Volume 9, Issue 2, 2017, Pages 111-118]

  • Mahdavi, E. Classification of encrypted traffic for applications based on statistical features [Volume 10, Issue 1, 2018, Pages 29-43]

  • Mahdavi, M. Steganalysis of embedding in difference of image pixel pairs by neural network [Volume 1, Issue 1, 2009, Pages 17-26]

  • Mahdavi, M. An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks [Volume 10, Issue 1, 2018, Pages 15-27]

  • Mahdavi Oliaee, M. On the Security of O-PSI: A Delegated Private Set Intersection on Outsourced Datasets (Extended Version) [Volume 10, Issue 2, 2018, Pages 117-127]

  • Mahmoodi Rishakani, Akbar Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives [Volume 11, Issue 1, 2019, Pages 35-46]

  • Mahmoudzadeh Niknam, Majid Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants [Volume 12, Issue 1, 2020, Pages 13-23]

  • Maimani, Hamidreza Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives [Volume 11, Issue 1, 2019, Pages 35-46]

  • Malekian, E. QTRU: quaternionic version of the NTRU public-key cryptosystems [Volume 3, Issue 1, 2011, Pages 29-42]

  • M. Al-Joboury, Istabraq IoT Protocols Based Fog/Cloud over High Traffic [Volume 11, Issue 3, 2019, Pages 173-180]

  • Mansuri, D. A new method for accelerating impossible differential cryptanalysis and its application on LBlock [Volume 8, Issue 1, 2016, Pages 73-84]

  • Marvasti, F. A survey on digital data hiding schemes: principals, algorithms, and applications [Volume 5, Issue 1, 2013, Pages 5-36]

  • Mashatan, A. QTRU: quaternionic version of the NTRU public-key cryptosystems [Volume 3, Issue 1, 2011, Pages 29-42]

  • Mashhadi, S. Computationally secure multiple secret sharing: models, schemes, and formal security analysis [Volume 7, Issue 2, 2015, Pages 91-99]

  • Mattox, S. Security testing of session initiation protocol implementations [Volume 1, Issue 2, 2009, Pages 91-103]

  • Mehrara, H. Cipher text only attack on speech time scrambling systems using correction of audio spectrogram [Volume 9, Issue 2, 2017, Pages 131-145]

  • Mehrdad, A.R. Impossible Differential Cryptanalysis on Deoxys-BC-256 [Volume 10, Issue 2, 2018, Pages 93-105]

  • Mehrnejad, M. SEIMCHA: a new semantic image CAPTCHA using geometric transformations [Volume 4, Issue 1, 2012, Pages 63-76]

  • Memon, Muhammad Ali Aspect Oriented UML to ECORE Model Transformation [Volume 11, Issue 3, 2019, Pages 97-103]

  • Meraji, Vahid Evict+Time Attack on Intel CPUs without Explicit Knowledge of Address Offsets [Volume 13, Issue 1, 2021, Pages 19-27]

  • Miri, A. A centralized privacy-preserving framework for online social networks [Volume 6, Issue 1, 2014, Pages 35-52]

  • Miri, A. A collusion attack on the fuzzy vault scheme [Volume 1, Issue 1, 2009, Pages 27-34]

  • Mirmohseni, M. Traceability improvements of a new RFID protocol based on EPC C1 G2 [Volume 8, Issue 2, 2016, Pages 105-114]

  • Mirzaee Shamsabad, Mohammad Reza Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives [Volume 11, Issue 1, 2019, Pages 35-46]

  • Moazami, F. On the computational complexity of finding a minimal basis for the guess and determine attack [Volume 9, Issue 2, 2017, Pages 101-110]

  • Moazami, F. Impossible Differential Cryptanalysis on Deoxys-BC-256 [Volume 10, Issue 2, 2018, Pages 93-105]

  • Moazami Goudarzi, Mohammad Reza Providing a Hybrid Cryptography Algorithm for Lightweight Authentication Protocol in RFID with Urban Traffic Usage Case [Volume 13, Issue 1, 2021, Pages 73-85]

  • Modiri, Mohammad Mahdi GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication [Volume 12, Issue 2, 2020, Pages 101-111]

  • Mohajeri, J. Cryptanalysis of GSM encryption algorithm A5/1 [Volume 4, Issue 2, 2012, Pages 107-114]

  • Mohajeri, J. Double voter perceptible blind signature based electronic voting protocol [Volume 3, Issue 1, 2011, Pages 43-50]

  • Mohajeri, J. On the multi _ chi-square tests and their data complexity [Volume 4, Issue 1, 2012, Pages 15-24]

  • Mohajeri, J. Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher (Extended Version) [Volume 10, Issue 1, 2018, Pages 3-13]

  • Mohajeri, J. On the Security of O-PSI: A Delegated Private Set Intersection on Outsourced Datasets (Extended Version) [Volume 10, Issue 2, 2018, Pages 117-127]

  • Mohajeri, Javad Biclique Cryptanalysis of Block Ciphers LBlock and TWINE-80 with Practical Data Complexity [Volume 11, Issue 1, 2019, Pages 57-74]

  • Mohajeri, Javad GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication [Volume 12, Issue 2, 2020, Pages 101-111]

  • Mohammadhassanzadeh, H. Prediction of user's trustworthiness in web-based social networks via text mining [Volume 5, Issue 2, 2013, Pages 171-187]

  • Mohammadi, S. A chaos-based video watermarking algorithm [Volume 4, Issue 1, 2012, Pages 77-86]

  • Mohammadi, Shahriar Anomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism [Volume 12, Issue 1, 2020, Pages 44-54]

  • Mohammadrezaei, Mohammad Reza Detection of Fake Accounts in Social Networks Based on One Class Classification [Volume 11, Issue 2, 2019, Pages 173-183]

  • Mohammadzadeh, Naser Anomaly Detection Using SVM as Classifier and Decision Tree for Optimizing Feature Vectors [Volume 11, Issue 2, 2019, Pages 159-171]

  • Mohseni-Ejiyeh, A. An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks [Volume 10, Issue 1, 2018, Pages 15-27]

  • Mollamotalebi, Mahdi F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management [Volume 12, Issue 2, 2020, Pages 113-128]

  • Montazer, Gh. A. Phishing website detection using weighted feature line embedding [Volume 9, Issue 2, 2017, Pages 147-159]

  • Mortazavi, A. Double voter perceptible blind signature based electronic voting protocol [Volume 3, Issue 1, 2011, Pages 43-50]

  • Mortazavi, A. A new security proof for FMNV continuous non-malleable encoding scheme [Volume 9, Issue 1, 2017, Pages 41-51]

  • Mortazavi, R. A novel local search method for microaggregation [Volume 7, Issue 1, 2015, Pages 15-26]

  • Mortazavi, Reza Improved Univariate Microaggregation for Integer Values [Volume 12, Issue 1, 2020, Pages 35-43]

  • Mosanaei Boorani, hatameh A Trusted Design Platform for Trojan Detection in FPGA Bitstreams Using Partial Reconfiguration [Volume 13, Issue 1, 2021, Pages 29-45]

  • Movaghar, A. A two-phase wormhole attack detection scheme in MANETs [Volume 6, Issue 2, 2014, Pages 183-191]

  • Mozaffari, S. Improving security of double random phase encoding with chaos theory using fractal images [Volume 4, Issue 2, 2012, Pages 115-124]

  • Mustapha C.E., Yagoub Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns [Volume 11, Issue 3, 2019, Pages 9-17]

N

  • Naderi, Bashir Modified Sliding-Mode Control Method for Synchronization a Class of Chaotic Fractional-Order Systems with Application in Encryption [Volume 12, Issue 1, 2020, Pages 55-66]

  • Namadchian, Amin Anomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism [Volume 12, Issue 1, 2020, Pages 44-54]

  • Nemati, H. Private Key based query on encrypted data [Volume 4, Issue 1, 2012, Pages 41-50]

  • Niknafs, M. A collusion mitigation scheme for reputation systems [Volume 7, Issue 2, 2015, Pages 151-166]

  • Niknafs, Mina A Trust Based Probabilistic Method for Efficient Correctness Verification in Database Outsourcing [Volume 11, Issue 1, 2019, Pages 3-14]

  • Nikooghadam, M. An efficient blind signature scheme based on the elliptic curve discrete logarithm problem [Volume 1, Issue 2, 2009, Pages 125-131]

  • Nizamani, Muhammad Ali Aspect Oriented UML to ECORE Model Transformation [Volume 11, Issue 3, 2019, Pages 97-103]

  • Nooribakhsh, Mahsa F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management [Volume 12, Issue 2, 2020, Pages 113-128]

  • Norozi, Zynolabedin CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking [Volume 12, Issue 2, 2020, Pages 67-80]

  • Nowroozi, A.R. A Survey of Anomaly Detection Approaches in Internet of Things [Volume 10, Issue 2, 2018, Pages 79-92]

P

  • Palominos, Fredi Cognitive Strategic Model applied to a Port System [Volume 11, Issue 3, 2019, Pages 73-78]

  • Papadopoulos, Dimitrios SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing [Volume 11, Issue 1, 2019, Pages 15-34]

  • Park, T. Security testing of session initiation protocol implementations [Volume 1, Issue 2, 2009, Pages 91-103]

  • Patil, D. Feature-based Malicious URL and Attack Type Detection Using Multi-class Classification [Volume 10, Issue 2, 2018, Pages 141-162]

  • Patil, J. Feature-based Malicious URL and Attack Type Detection Using Multi-class Classification [Volume 10, Issue 2, 2018, Pages 141-162]

  • Patooghy, A. Unauthenticated event detection in wireless sensor networks using sensors co-coverage [Volume 8, Issue 1, 2016, Pages 61-71]

  • Patooghy, A. Side channel parameter characteristics of code injection attacks [Volume 9, Issue 1, 2017, Pages 17-26]

  • Payandeh, A. Toward an energy efficient PKC-based key management system for wireless sensor networks [Volume 6, Issue 1, 2014, Pages 53-66]

  • Pencheva, Evelina Access and Mobility Policy Control at the Network Edge [Volume 11, Issue 3, 2019, Pages 105-111]

  • Peschanenko, Volodymyr Algebraic Matching of Vulnerabilities in a Low-Level Code [Volume 11, Issue 3, 2019, Pages 1-7]

  • Pilaram, H. On the design and security of a lattice-based threshold secret sharing scheme [Volume 8, Issue 1, 2016, Pages 25-38]

  • Pilaram, H. An efficient secure channel coding scheme based on polar codes [Volume 9, Issue 2, 2017, Pages 111-118]

  • Pishgoo, B. STLR: a novel danger theory based structural TLR algorithm [Volume 5, Issue 2, 2013, Pages 209-225]

  • Poon, H. T. A collusion attack on the fuzzy vault scheme [Volume 1, Issue 1, 2009, Pages 27-34]

  • Pourpouneh, M. Double voter perceptible blind signature based electronic voting protocol [Volume 3, Issue 1, 2011, Pages 43-50]

  • Pourpouneh, M. A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving [Volume 8, Issue 1, 2016, Pages 3-24]

  • Pourpouneh, M. A Decentralized Online Sortition Protocol [Volume 10, Issue 1, 2018, Pages 63-69]

R

  • Radchenko, Viktor Algebraic Matching of Vulnerabilities in a Low-Level Code [Volume 11, Issue 3, 2019, Pages 1-7]

  • Rahmani, Amir Masoud Detection of Fake Accounts in Social Networks Based on One Class Classification [Volume 11, Issue 2, 2019, Pages 173-183]

  • Rajabzadeh Asaar, M. Convertible limited (multi-) verifier signature: new constructions and applications [Volume 5, Issue 2, 2013, Pages 189-208]

  • Rajabzadeh Asaar, M. Double voter perceptible blind signature based electronic voting protocol [Volume 3, Issue 1, 2011, Pages 43-50]

  • Rajabzadeh Asaar, M. A traceable optimistic fair exchange protocol in the standard model [Volume 7, Issue 1, 2015, Pages 3-14]

  • Raji, F. A centralized privacy-preserving framework for online social networks [Volume 6, Issue 1, 2014, Pages 35-52]

  • Ramezanian, R. A computational model and convergence theorem for rumor dissemination in social networks [Volume 5, Issue 2, 2013, Pages 141-154]

  • Ramezanian, R. Process algebraic modeling of authentication protocols for analysis of parallel multi-session executions [Volume 1, Issue 1, 2009, Pages 55-67]

  • Ramezanian, R. A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving [Volume 8, Issue 1, 2016, Pages 3-24]

  • Ramezanian, R. A Decentralized Online Sortition Protocol [Volume 10, Issue 1, 2018, Pages 63-69]

  • Ramezanian, R. Distributed Contingency Logic and Security [Volume 10, Issue 2, 2018, Pages 107-115]

  • Rashidi, B. Efficient implementation of low time complexity and pipelined bit-parallel polynomial basis multiplier over binary finite fields [Volume 7, Issue 2, 2015, Pages 101-114]

  • Rasoolzadeh, Sh. Total break of Zorro using linear and differential attacks [Volume 6, Issue 1, 2014, Pages 23-34]

  • Rastegari, P. An efficient certificateless signcryption scheme in the standard model [Volume 9, Issue 1, 2017, Pages 3-16]

  • Reddy, P.Vasudeva An Efficient Pairing-Free Identity Based Proxy Blind Signature Scheme with Message Recovery [Volume 13, Issue 1, 2021, Pages 59-72]

  • Reid, J. Authorization models for secure information sharing: a survey and research agenda [Volume 2, Issue 2, 2010, Pages 69-87]

  • Rezaeian Farashahi, R. Efficient implementation of low time complexity and pipelined bit-parallel polynomial basis multiplier over binary finite fields [Volume 7, Issue 2, 2015, Pages 101-114]

  • Rezaei Shahmirzdi, A. Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher (Extended Version) [Volume 10, Issue 1, 2018, Pages 3-13]

  • Rezakhani, Afshin Providing a Hybrid Cryptography Algorithm for Lightweight Authentication Protocol in RFID with Urban Traffic Usage Case [Volume 13, Issue 1, 2021, Pages 73-85]

  • Rezapour, T. Y. A novel key management scheme for heterogeneous sensor networks based on the position of nodes [Volume 8, Issue 2, 2016, Pages 115-130]

  • Rijmen, V. Stream ciphers and the eSTREAM project [Volume 2, Issue 1, 2010, Pages 3-11]

  • Rogaway, P. Constructing cryptographic definitions [Volume 3, Issue 2, 2011, Pages 69-76]

S

  • Saad, Mohamed Medical Image Compression Based on Region of Interest [Volume 11, Issue 3, 2019, Pages 29-34]

  • Sabeti, V. Steganalysis of embedding in difference of image pixel pairs by neural network [Volume 1, Issue 1, 2009, Pages 17-26]

  • Sabeti, Vajiheh New High Secure Network Steganography Method Based on Packet Length [Volume 12, Issue 1, 2020, Pages 24-44]

  • Sabzinejad Farash, M. Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC [Volume 5, Issue 1, 2013, Pages 55-70]

  • Sadat Emami, S. A context-sensitive dynamic role-based access control model for pervasive computing environments [Volume 2, Issue 1, 2010, Pages 47-66]

  • Sadeghi, A.A Dwarf Frankenstein is still in your memory: tiny code reuse attacks [Volume 9, Issue 1, 2017, Pages 53-72]

  • Sadeghi, F. Optimizing image steganography by combining the GA and ICA [Volume 7, Issue 1, 2015, Pages 47-58]

  • Sadeghi, H. Cryptanalysis of some first round CAESAR candidates [Volume 7, Issue 2, 2015, Pages 127-134]

  • Sadeghi, Sadegh Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants [Volume 12, Issue 1, 2020, Pages 13-23]

  • Sadrnezhad, Z. Analyzing new features of infected web content in detection of malicious web pages [Volume 9, Issue 2, 2017, Pages 161-181]

  • Saeed, Anwar An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling [Volume 11, Issue 3, 2019, Pages 145-151]

  • Saeed, Yousaf Cloud and IoT based Smart Car Parking System by using Mamdani Fuzzy Inference System (MFIS) [Volume 11, Issue 3, 2019, Pages 153-160]

  • Saeed Ali, Twana The Impact of The Biometric System on Election Fraud Elimination: Case of The North of IRAQ [Volume 11, Issue 3, 2019, Pages 195-207]

  • Saeidi, Roghaye Secure FPGA Design by Filling Unused Spaces [Volume 11, Issue 1, 2019, Pages 47-56]

  • Saeidi, Roghaye Hardware Trojan Prevention and Detection by Filling Unused Space Using Shift registers, Gate-chain and Extra Routing [Volume 13, Issue 1, 2021, Pages 47-57]

  • Safaei Pour, M. A new CPA resistant software implementation for symmetric ciphers with smoothed power consumption: SIMON case study [Volume 9, Issue 2, 2017, Pages 119-130]

  • Safarzadeh, M. An automatic test case generator for evaluating implementation of access control policies [Volume 9, Issue 1, 2017, Pages 73-91]

  • Safkhani, M. A note on the security of two improved RFID protocols [Volume 8, Issue 2, 2016, Pages 155-160]

  • Safkhani, Masoumeh Relaxed Differential Fault Analysis of SHA-3 [Volume 11, Issue 2, 2019, Pages 129-143]

  • Saidi, H. Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach [Volume 4, Issue 2, 2012, Pages 125-136]

  • Saidi, H. An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks [Volume 2, Issue 2, 2010, Pages 89-105]

  • Sajjadi Ghaemmaghami, S. Traceability improvements of a new RFID protocol based on EPC C1 G2 [Volume 8, Issue 2, 2016, Pages 105-114]

  • Salehi, Z. DyVSoR: dynamic malware detection based on extracting patterns from value sets of registers [Volume 5, Issue 1, 2013, Pages 71-82]

  • S. Alencar, Marcelo A Fair Power Allocation for Non-Orthogonal Multiple Access in the Power Domain [Volume 11, Issue 3, 2019, Pages 123-130]

  • Salim, F. Authorization models for secure information sharing: a survey and research agenda [Volume 2, Issue 2, 2010, Pages 69-87]

  • Salmasizadeh, M. Convertible limited (multi-) verifier signature: new constructions and applications [Volume 5, Issue 2, 2013, Pages 189-208]

  • Salmasizadeh, M. Total break of Zorro using linear and differential attacks [Volume 6, Issue 1, 2014, Pages 23-34]

  • Salmasizadeh, M. On the multi _ chi-square tests and their data complexity [Volume 4, Issue 1, 2012, Pages 15-24]

  • Salmasizadeh, M. A traceable optimistic fair exchange protocol in the standard model [Volume 7, Issue 1, 2015, Pages 3-14]

  • Salmasizadeh, M. A new security proof for FMNV continuous non-malleable encoding scheme [Volume 9, Issue 1, 2017, Pages 41-51]

  • Salmasizadeh, M. A new CPA resistant software implementation for symmetric ciphers with smoothed power consumption: SIMON case study [Volume 9, Issue 2, 2017, Pages 119-130]

  • Salmasizadeh, M. Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher (Extended Version) [Volume 10, Issue 1, 2018, Pages 3-13]

  • Salmasizadeh, Mahmoud GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication [Volume 12, Issue 2, 2020, Pages 101-111]

  • Sam, I.Shatheesh OT-Feature Extraction on Scrambled Images with Instantaneous Clustering for CBIR Scheme in Cloud Computing [Volume 13, Issue 1, 2021, Pages 1-17]

  • Samavi, Sh. Steganalysis of embedding in difference of image pixel pairs by neural network [Volume 1, Issue 1, 2009, Pages 17-26]

  • Sami, A. DyVSoR: dynamic malware detection based on extracting patterns from value sets of registers [Volume 5, Issue 1, 2013, Pages 71-82]

  • Saniee Abadeh, M. A hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection [Volume 2, Issue 1, 2010, Pages 33-46]

  • Sayedi, S. M. Efficient implementation of low time complexity and pipelined bit-parallel polynomial basis multiplier over binary finite fields [Volume 7, Issue 2, 2015, Pages 101-114]

  • Sedaghatbaf, A. Quantitative evaluation of software security: an approach based on UML/SecAM and evidence theory [Volume 8, Issue 2, 2016, Pages 141-153]

  • Seddigh, Milad Enhanced Flush+Reload Attack on AES [Volume 12, Issue 2, 2020, Pages 81-89]

  • Selvaraj, S. Security testing of session initiation protocol implementations [Volume 1, Issue 2, 2009, Pages 91-103]

  • Serkani, Elham Anomaly Detection Using SVM as Classifier and Decision Tree for Optimizing Feature Vectors [Volume 11, Issue 2, 2019, Pages 159-171]

  • Shaaban, Dalia Medical Image Compression Based on Region of Interest [Volume 11, Issue 3, 2019, Pages 29-34]

  • Shaban Al-Ani, Muzhir Face Recognition Based Rank Reduction SVD Approach [Volume 11, Issue 3, 2019, Pages 39-50]

  • Shahriari, H. R. Aggrandizing the beast's limbs: patulous code reuse attack on ARM architecture [Volume 8, Issue 1, 2016, Pages 39-52]

  • Shahriari, H. R. Prediction of user's trustworthiness in web-based social networks via text mining [Volume 5, Issue 2, 2013, Pages 171-187]

  • Shahriari, H. R. A hybrid approach for database intrusion detection at transaction and inter-transaction levels [Volume 6, Issue 2, 2014, Pages 155-167]

  • Shahriari, H. R. BotRevealer: Behavioral Detection of Botnets based on Botnet Life-cycle [Volume 10, Issue 1, 2018, Pages 55-61]

  • Shahriari, H.R. Dwarf Frankenstein is still in your memory: tiny code reuse attacks [Volume 9, Issue 1, 2017, Pages 53-72]

  • Shahriari, H.R. A Survey of Anomaly Detection Approaches in Internet of Things [Volume 10, Issue 2, 2018, Pages 79-92]

  • Shaikh, Asadullah Aspect Oriented UML to ECORE Model Transformation [Volume 11, Issue 3, 2019, Pages 97-103]

  • Shakeri, E. An extended feature set for blind image steganalysis in contourlet domain [Volume 6, Issue 2, 2014, Pages 169-181]

  • Shakeri, H. A confidence-aware interval-based trust model [Volume 4, Issue 2, 2012, Pages 151-165]

  • Shamaei, Sh. A two-phase wormhole attack detection scheme in MANETs [Volume 6, Issue 2, 2014, Pages 183-191]

  • Shams, F. Access control in ultra-large-scale systems using a data-centric middleware [Volume 6, Issue 1, 2014, Pages 3-22]

  • Shekofte, Nastaran A Trusted Design Platform for Trojan Detection in FPGA Bitstreams Using Partial Reconfiguration [Volume 13, Issue 1, 2021, Pages 29-45]

  • Shirani, Sh. Steganalysis of embedding in difference of image pixel pairs by neural network [Volume 1, Issue 1, 2009, Pages 17-26]

  • Shiri, Mohammad Ebrahim Detection of Fake Accounts in Social Networks Based on One Class Classification [Volume 11, Issue 2, 2019, Pages 173-183]

  • Shoaei, Minoo New High Secure Network Steganography Method Based on Packet Length [Volume 12, Issue 1, 2020, Pages 24-44]

  • Shokrollahi, S. Access control in ultra-large-scale systems using a data-centric middleware [Volume 6, Issue 1, 2014, Pages 3-22]

  • Shorim, Nada Hand Gestures Classification with Multi-Core DTW [Volume 11, Issue 3, 2019, Pages 91-96]

  • Shraideh, Marwin Critical Success Factors for Data Virtualization: A Literature Review [Volume 11, Issue 3, 2019, Pages 131-137]

  • Siavashi, Mohammad Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems [Volume 12, Issue 2, 2020, Pages 129-140]

  • Singh, Pitam A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications [Volume 11, Issue 2, 2019, Pages 113-128]

  • Soleimany, H. Impossible Differential Cryptanalysis on Deoxys-BC-256 [Volume 10, Issue 2, 2018, Pages 93-105]

  • Soleimany, Hadi Enhanced Flush+Reload Attack on AES [Volume 12, Issue 2, 2020, Pages 81-89]

  • Soleimany, Hadi Evict+Time Attack on Intel CPUs without Explicit Knowledge of Address Offsets [Volume 13, Issue 1, 2021, Pages 19-27]

  • Soltani, N. Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version) [Volume 10, Issue 2, 2018, Pages 129-139]

  • Soltani, S. Separating indexes from data: a distributed scheme for secure database outsourcing [Volume 3, Issue 2, 2011, Pages 121-133]

  • Soodkhah Mohammadi, M. Design and formal verification of DZMBE+ [Volume 5, Issue 1, 2013, Pages 37-53]

T

  • Taghizadeh, M. An automatic test case generator for evaluating implementation of access control policies [Volume 9, Issue 1, 2017, Pages 73-91]

  • Taheri, M. Improving security of double random phase encoding with chaos theory using fractal images [Volume 4, Issue 2, 2012, Pages 115-124]

  • Tajik Khasss, M. Cipher text only attack on speech time scrambling systems using correction of audio spectrogram [Volume 9, Issue 2, 2017, Pages 131-145]

  • Tam, A. Security testing of session initiation protocol implementations [Volume 1, Issue 2, 2009, Pages 91-103]

  • Tan, Qing A Sudy on Information Privacy Issue on Social Networks [Volume 11, Issue 3, 2019, Pages 19-27]

  • Tariq Banday, M. Image flip CAPTCHA [Volume 1, Issue 2, 2009, Pages 105-123]

  • Tavakoly, A. Improving Tor security against timing and traffic analysis attacks with fair randomization [Volume 6, Issue 1, 2014, Pages 67-76]

  • Tayarani-N, M. Analyzing new features of infected web content in detection of malicious web pages [Volume 9, Issue 2, 2017, Pages 161-181]

  • Thumbur, Gowri An Efficient Pairing-Free Identity Based Proxy Blind Signature Scheme with Message Recovery [Volume 13, Issue 1, 2021, Pages 59-72]

  • Toreini, E. SEIMCHA: a new semantic image CAPTCHA using geometric transformations [Volume 4, Issue 1, 2012, Pages 63-76]

  • Tork Ladani, B. GTrust: a group based trust model [Volume 5, Issue 2, 2013, Pages 155-170]

  • Tork Ladani, B. A model for specification, composition and verification of access control policies and its application to web services [Volume 3, Issue 2, 2011, Pages 103-120]

  • Tork Ladani, B. An automatic test case generator for evaluating implementation of access control policies [Volume 9, Issue 1, 2017, Pages 73-91]

  • Tork Ladani, Behrouz GGRA: a grouped gossip-based reputation aggregation algorithm [Volume 7, Issue 1, 2015, Pages 59-74]

  • Tork Ladani, Behrouz Interdependent Security Game Design over Constrained Linear Influence Networks [Volume 11, Issue 2, 2019, Pages 95-111]

  • TOUHAMI, Rachida Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns [Volume 11, Issue 3, 2019, Pages 9-17]

V

  • Vafaei, Vajiheh Modified Sliding-Mode Control Method for Synchronization a Class of Chaotic Fractional-Order Systems with Application in Encryption [Volume 12, Issue 1, 2020, Pages 55-66]

  • Vafaei Jahan, M. A density based clustering approach to distinguish between web robot and human requests to a web server [Volume 6, Issue 1, 2014, Pages 77-89]

  • Vafaei Jahan, Majid Analyzing new features of infected web content in detection of malicious web pages [Volume 9, Issue 2, 2017, Pages 161-181]

  • Vardasbi, A. Cryptanalysis of GSM encryption algorithm A5/1 [Volume 4, Issue 2, 2012, Pages 107-114]

  • Vardasbi, A. On the multi _ chi-square tests and their data complexity [Volume 4, Issue 1, 2012, Pages 15-24]

  • V. dos Santos Filho, José A Fair Power Allocation for Non-Orthogonal Multiple Access in the Power Domain [Volume 11, Issue 3, 2019, Pages 123-130]

  • Venter, H. S. Analyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications [Volume 4, Issue 2, 2012, Pages 137-150]

  • Vosoughi, M. Security-aware register placement to hinder malicious hardware updating and improve Trojan detectability [Volume 7, Issue 1, 2015, Pages 75-81]

W

  • Waqas, Muhammad Evaluation of Planet Factors of Smart City through Multi-layer Fuzzy Logic (MFL) [Volume 11, Issue 3, 2019, Pages 51-58]

X

  • Xu, Qiang Face Recognition Based Rank Reduction SVD Approach [Volume 11, Issue 3, 2019, Pages 39-50]

Y

  • Yahyazadeh, M. BotOnus: an online unsupervised method for Botnet detection [Volume 4, Issue 1, 2012, Pages 51-62]

  • Yakovlev, Viktor Algebraic Matching of Vulnerabilities in a Low-Level Code [Volume 11, Issue 3, 2019, Pages 1-7]

  • Yousif, Muhammad An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling [Volume 11, Issue 3, 2019, Pages 145-151]

Z

  • Zabihi, M. A density based clustering approach to distinguish between web robot and human requests to a web server [Volume 6, Issue 1, 2014, Pages 77-89]

  • Zaghian, Ali A Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions [Volume 12, Issue 2, 2020, Pages 91-99]

  • Zahir-Azami, B. Intelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms [Volume 3, Issue 1, 2011, Pages 51-66]

  • Zakerolhosseini, A. An efficient blind signature scheme based on the elliptic curve discrete logarithm problem [Volume 1, Issue 2, 2009, Pages 125-131]

  • Zakerolhosseini, A. QTRU: quaternionic version of the NTRU public-key cryptosystems [Volume 3, Issue 1, 2011, Pages 29-42]

  • Zali, Z. Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach [Volume 4, Issue 2, 2012, Pages 125-136]

  • Zamani, B. An automatic test case generator for evaluating implementation of access control policies [Volume 9, Issue 1, 2017, Pages 73-91]

  • Zamanzadeh, Sh. Self authentication path insertion in FPGA-based design flow for tamper-resistant purpose [Volume 8, Issue 1, 2016, Pages 53-60]

  • Zamanzadeh, Sh. ASIC design protection against reverse engineering during the fabrication process using automatic netlist obfuscation design flow [Volume 8, Issue 2, 2016, Pages 93-104]

  • Zare Jousheghani, Zahra A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications [Volume 11, Issue 2, 2019, Pages 113-128]

  • Zarezadeh, Maryam Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems [Volume 12, Issue 2, 2020, Pages 129-140]

  • Zarisfi Kermani, F. Optimizing image steganography by combining the GA and ICA [Volume 7, Issue 1, 2015, Pages 47-58]

  • Zarmehi, N. Optimum decoder for multiplicative spread spectrum image watermarking with Laplacian modeling [Volume 8, Issue 2, 2016, Pages 131-139]

  • Zeebaree, Mosleh A Comparison Study between Intelligent Decision Support Systems and Decision Support Systems [Volume 11, Issue 3, 2019, Pages 187-194]

  • Zendaoui, Fairouz Considering Uncertainty in Modeling Historical Knowledge [Volume 11, Issue 3, 2019, Pages 59-65]

  • Zokaei, S. A context-sensitive dynamic role-based access control model for pervasive computing environments [Volume 2, Issue 1, 2010, Pages 47-66]