A

  • Abadi, Mahdi Android Malware Detection Using One-Class Graph Neural Networks [Volume 14, Issue 3, 2022, Pages 51-60]

  • Abazar, Mahdieh A Binary Relevance Adaptive Model-Selection for Ensemble Steganalysis [Volume 14, Issue 1, 2022, Pages 105-113]

  • Aghaee, Hadi One-Shot Achievable Secrecy Rate Regions for Quantum Interference Wiretap Channel [Volume 14, Issue 3, 2022, Pages 71-80]

  • Ahmadian, Zahra Revisiting the Security and Efficiency of SP2DAS, 3PDA, and EPPA Smart Grid Security Protocols [Volume 14, Issue 2, 2022, Pages 157-165]

  • Ahmadian Attari, Mahmoud Location Privacy Preservation for Secondary Users in a Database-Driven Cognitive Radio Network [Volume 14, Issue 2, 2022, Pages 215-227]

  • Akhbari, Bahareh One-Shot Achievable Secrecy Rate Regions for Quantum Interference Wiretap Channel [Volume 14, Issue 3, 2022, Pages 71-80]

  • Ali, Mohammad Attribute-Based Remote Data Auditing and User Authentication for Cloud Storage Systems [Volume 14, Issue 3, 2022, Pages 43-49]

  • Alidoosti, Mitra Business-Layer Session Puzzling Racer: Dynamic Security Testing Against Session Puzzling Race Conditions in Business Layer [Volume 14, Issue 1, 2022, Pages 83-104]

  • Alizadeh, Bijan Mutual Lightweight PUF-Based Authentication Scheme Using Random Key Management Mechanism for Resource-Constrained IoT Devices [Volume 14, Issue 3, 2022, Pages 1-8]

  • Amerehei, Mahsa Secure and Imperceptible Image Steganography in Discrete Wavelet Transform Using the XOR Logical Function and Genetic Algorithm [Volume 14, Issue 2, 2022, Pages 167-179]

  • Amintoosi, Haleh On the Suitability of Improved TrustChain for Smartphones [Volume 14, Issue 3, 2022, Pages 33-42]

  • Amiryousefi, Hamid Revisiting the Security and Efficiency of SP2DAS, 3PDA, and EPPA Smart Grid Security Protocols [Volume 14, Issue 2, 2022, Pages 157-165]

  • Andarzian, Seyed Behnam SANT: Static Analysis of Native Threads for Security Vetting of Android Applications [Volume 14, Issue 1, 2022, Pages 13-25]

  • Aref, Mohammad Reza Location Privacy Preservation for Secondary Users in a Database-Driven Cognitive Radio Network [Volume 14, Issue 2, 2022, Pages 215-227]

  • Ashouri-Talouki, Maede Light-Weight Privacy-Preserving Data Aggregation Protocols in Smart Grid Metering Networks [Volume 14, Issue 3, 2022, Pages 101-112]

  • Ashtari, Amir Mutual Lightweight PUF-Based Authentication Scheme Using Random Key Management Mechanism for Resource-Constrained IoT Devices [Volume 14, Issue 3, 2022, Pages 1-8]

B

  • Bagheri, Nasour Practical Differential Fault Analysis on SKINNY [Volume 14, Issue 3, 2022, Pages 9-19]

  • Bagheri, Nasour Practical Differential Fault Analysis on CRAFT, a Lightweight Block Cipher [Volume 14, Issue 3, 2022, Pages 21-31]

  • Banaeian Far, Saeed An Efficient Pairing-Free Identity-Based Certificateless Signcryption [Volume 14, Issue 1, 2022, Pages 69-82]

  • Bayat, Majid A Privacy Preserving Mutual Authentication Scheme Suitable for IoT-Based Medical Systems [Volume 14, Issue 1, 2022, Pages 57-68]

  • Bayat Sarmadi, Siavash A Study of Timing Side-Channel Attacks and Countermeasures on JavaScript and WebAssembly [Volume 14, Issue 1, 2022, Pages 27-46]

D

  • Damavandi, Sepehr An Electronic Voting Scheme Based on Blockchain Technology and Zero-Knowledge Proofs [Volume 14, Issue 3, 2022, Pages 123-133]

  • Dastanpour, Hajar A Graph-based Online Feature Selection to Improve Detection of New Attacks [Volume 14, Issue 2, 2022, Pages 115-130]

  • Deldar, Fatemeh Android Malware Detection Using One-Class Graph Neural Networks [Volume 14, Issue 3, 2022, Pages 51-60]

  • Dorri Nogoorani, Sadegh An Electronic Voting Scheme Based on Blockchain Technology and Zero-Knowledge Proofs [Volume 14, Issue 3, 2022, Pages 123-133]

E

  • Ebrahimi, Mahdieh A Privacy Preserving Mutual Authentication Scheme Suitable for IoT-Based Medical Systems [Volume 14, Issue 1, 2022, Pages 57-68]

  • Ebrahimifard, Mohammad Android Malware Detection Using One-Class Graph Neural Networks [Volume 14, Issue 3, 2022, Pages 51-60]

F

  • Fanian, Ali A Graph-based Online Feature Selection to Improve Detection of New Attacks [Volume 14, Issue 2, 2022, Pages 115-130]

G

  • Ghazi, Seyed Salar On the Suitability of Improved TrustChain for Smartphones [Volume 14, Issue 3, 2022, Pages 33-42]

H

  • Hadavi, Mohammad Ali Bypassing Web Application Firewalls Using Deep Reinforcement Learning [Volume 14, Issue 2, 2022, Pages 131-145]

  • Hadavi, Mohammad Ali SecureKV: Secure Searchable Outsourcing of Key-Value Databases to the Public Cloud [Volume 14, Issue 3, 2022, Pages 113-121]

  • Hadian Dehkordi, Massoud A New Variant of the Winternitz One Time Signature Based on Graded Encoding Schemes [Volume 14, Issue 1, 2022, Pages 1-11]

  • Hajisoltani, Muhamadali Secure and Low-Area Implementation of the AES Using FPGA [Volume 14, Issue 3, 2022, Pages 93-99]

  • Hamzeh, Ali Ransomware Detection Based on PE Header Using Convolutional Neural Networks [Volume 14, Issue 2, 2022, Pages 181-192]

  • Hemmati, Mojtaba Bypassing Web Application Firewalls Using Deep Reinforcement Learning [Volume 14, Issue 2, 2022, Pages 131-145]

  • Hosseintalaee, Hamed A Time Randomization-Based Countermeasure Against the Template Side-Channel Attack [Volume 14, Issue 1, 2022, Pages 47-55]

J

  • Jahanian, Ali A Time Randomization-Based Countermeasure Against the Template Side-Channel Attack [Volume 14, Issue 1, 2022, Pages 47-55]

  • Jalaly Bidgoly, Amir Lightweight Identification of Android Malware with Knowledge Distillation and Deep Learning Approach [Volume 14, Issue 3, 2022, Pages 81-92]

  • Jannati, Hoda Location Privacy Preservation for Secondary Users in a Database-Driven Cognitive Radio Network [Volume 14, Issue 2, 2022, Pages 215-227]

K

  • Karampour, Afshin Light-Weight Privacy-Preserving Data Aggregation Protocols in Smart Grid Metering Networks [Volume 14, Issue 3, 2022, Pages 101-112]

  • Kordi, Farshideh A Time Randomization-Based Countermeasure Against the Template Side-Channel Attack [Volume 14, Issue 1, 2022, Pages 47-55]

M

  • Manavi, Farnoush Ransomware Detection Based on PE Header Using Convolutional Neural Networks [Volume 14, Issue 2, 2022, Pages 181-192]

  • Masjedi, Peyman A Binary Relevance Adaptive Model-Selection for Ensemble Steganalysis [Volume 14, Issue 1, 2022, Pages 105-113]

  • Mazaheri, Mohammad Erfan A Study of Timing Side-Channel Attacks and Countermeasures on JavaScript and WebAssembly [Volume 14, Issue 1, 2022, Pages 27-46]

  • Mozafari, Somayeh Lightweight Identification of Android Malware with Knowledge Distillation and Deep Learning Approach [Volume 14, Issue 3, 2022, Pages 81-92]

N

  • Nickabadi, Ahmad Business-Layer Session Puzzling Racer: Dynamic Security Testing Against Session Puzzling Race Conditions in Business Layer [Volume 14, Issue 1, 2022, Pages 83-104]

  • Nowroozi, Alireza Business-Layer Session Puzzling Racer: Dynamic Security Testing Against Session Puzzling Race Conditions in Business Layer [Volume 14, Issue 1, 2022, Pages 83-104]

O

  • Oraei, Hossein A New Variant of the Winternitz One Time Signature Based on Graded Encoding Schemes [Volume 14, Issue 1, 2022, Pages 1-11]

P

  • Palanki, Sajjad Attribute-Based Encryption with Efficient Attribute Revocation, Decryption Outsourcing, and Multi-Keyword Searching in Cloud Storage [Volume 14, Issue 3, 2022, Pages 135-149]

  • Pilevar Moakhar, Sahar On the Suitability of Improved TrustChain for Smartphones [Volume 14, Issue 3, 2022, Pages 33-42]

  • Porkar, Maryam Practical Differential Fault Analysis on SKINNY [Volume 14, Issue 3, 2022, Pages 9-19]

R

  • Rajabzadeh Assar, Maryam An Efficient Pairing-Free Identity-Based Certificateless Signcryption [Volume 14, Issue 1, 2022, Pages 69-82]

  • Ramzanipour, Hamed Practical Differential Fault Analysis on SKINNY [Volume 14, Issue 3, 2022, Pages 9-19]

  • Ramzanipour, Hamed Practical Differential Fault Analysis on CRAFT, a Lightweight Block Cipher [Volume 14, Issue 3, 2022, Pages 21-31]

  • Rasouli, Faeze Perfect Recovery of Small Tampers Using a Novel Fragile Watermarking Technique Based on Distributed Hamming Code [Volume 14, Issue 2, 2022, Pages 147-156]

  • Rastegari, Parvin Attacks to Some Recently Proposed CL-SC Schemes and Presenting a Secure Scheme with KSSTIS [Volume 14, Issue 2, 2022, Pages 193-213]

S

  • Sabeti, Vajiheh Secure and Imperceptible Image Steganography in Discrete Wavelet Transform Using the XOR Logical Function and Genetic Algorithm [Volume 14, Issue 2, 2022, Pages 167-179]

  • Saeedi Sadr, Maryam SecureKV: Secure Searchable Outsourcing of Key-Value Databases to the Public Cloud [Volume 14, Issue 3, 2022, Pages 113-121]

  • Salami, Zeinab Location Privacy Preservation for Secondary Users in a Database-Driven Cognitive Radio Network [Volume 14, Issue 2, 2022, Pages 215-227]

  • Salarifard, Raziyeh Secure and Low-Area Implementation of the AES Using FPGA [Volume 14, Issue 3, 2022, Pages 93-99]

  • Sayyadabdi, Amirhosein Towards a Formal Approach for Detection of Vulnerabilities in the Android Permissions System [Volume 14, Issue 3, 2022, Pages 61-69]

  • Shabani, Ahmad Mutual Lightweight PUF-Based Authentication Scheme Using Random Key Management Mechanism for Resource-Constrained IoT Devices [Volume 14, Issue 3, 2022, Pages 1-8]

  • Shafieinejad, Alireza Attribute-Based Encryption with Efficient Attribute Revocation, Decryption Outsourcing, and Multi-Keyword Searching in Cloud Storage [Volume 14, Issue 3, 2022, Pages 135-149]

  • Soleimany, Hadi Secure and Low-Area Implementation of the AES Using FPGA [Volume 14, Issue 3, 2022, Pages 93-99]

T

  • Taheri, Mohammad A Binary Relevance Adaptive Model-Selection for Ensemble Steganalysis [Volume 14, Issue 1, 2022, Pages 105-113]

  • Taheri, Mohammad Perfect Recovery of Small Tampers Using a Novel Fragile Watermarking Technique Based on Distributed Hamming Code [Volume 14, Issue 2, 2022, Pages 147-156]

  • Taheri Ardakani, Farhad A Study of Timing Side-Channel Attacks and Countermeasures on JavaScript and WebAssembly [Volume 14, Issue 1, 2022, Pages 27-46]

  • Tork Ladani, Behrouz SANT: Static Analysis of Native Threads for Security Vetting of Android Applications [Volume 14, Issue 1, 2022, Pages 13-25]

  • Tork Ladani, Behrouz Towards a Formal Approach for Detection of Vulnerabilities in the Android Permissions System [Volume 14, Issue 3, 2022, Pages 61-69]

  • Tork Ladani, Behrouz Light-Weight Privacy-Preserving Data Aggregation Protocols in Smart Grid Metering Networks [Volume 14, Issue 3, 2022, Pages 101-112]

V

  • Vafaei, Navid Practical Differential Fault Analysis on SKINNY [Volume 14, Issue 3, 2022, Pages 9-19]

  • Vafaei, Navid Practical Differential Fault Analysis on CRAFT, a Lightweight Block Cipher [Volume 14, Issue 3, 2022, Pages 21-31]

Z

  • Zahednejad, Behnam A Privacy Preserving Mutual Authentication Scheme Suitable for IoT-Based Medical Systems [Volume 14, Issue 1, 2022, Pages 57-68]

  • Zamani, Bahman Towards a Formal Approach for Detection of Vulnerabilities in the Android Permissions System [Volume 14, Issue 3, 2022, Pages 61-69]