A
-
Abadi, Mahdi
Android Malware Detection Using One-Class Graph Neural Networks [Volume 14, Issue 3, 2022, Pages 51-60]
-
Abazar, Mahdieh
A Binary Relevance Adaptive Model-Selection for Ensemble Steganalysis [Volume 14, Issue 1, 2022, Pages 105-113]
-
Aghaee, Hadi
One-Shot Achievable Secrecy Rate Regions for Quantum Interference Wiretap Channel [Volume 14, Issue 3, 2022, Pages 71-80]
-
Ahmadian, Zahra
Revisiting the Security and Efficiency of SP2DAS, 3PDA, and EPPA Smart Grid Security Protocols [Volume 14, Issue 2, 2022, Pages 157-165]
-
Ahmadian Attari, Mahmoud
Location Privacy Preservation for Secondary Users in a Database-Driven Cognitive Radio Network [Volume 14, Issue 2, 2022, Pages 215-227]
-
Akhbari, Bahareh
One-Shot Achievable Secrecy Rate Regions for Quantum Interference Wiretap Channel [Volume 14, Issue 3, 2022, Pages 71-80]
-
Ali, Mohammad
Attribute-Based Remote Data Auditing and User Authentication for Cloud Storage Systems [Volume 14, Issue 3, 2022, Pages 43-49]
-
Alidoosti, Mitra
Business-Layer Session Puzzling Racer: Dynamic Security Testing Against Session Puzzling Race Conditions in Business Layer [Volume 14, Issue 1, 2022, Pages 83-104]
-
Alizadeh, Bijan
Mutual Lightweight PUF-Based Authentication Scheme Using Random Key Management Mechanism for Resource-Constrained IoT Devices [Volume 14, Issue 3, 2022, Pages 1-8]
-
Amerehei, Mahsa
Secure and Imperceptible Image Steganography in Discrete Wavelet Transform Using the XOR Logical Function and Genetic Algorithm [Volume 14, Issue 2, 2022, Pages 167-179]
-
Amintoosi, Haleh
On the Suitability of Improved TrustChain for Smartphones [Volume 14, Issue 3, 2022, Pages 33-42]
-
Amiryousefi, Hamid
Revisiting the Security and Efficiency of SP2DAS, 3PDA, and EPPA Smart Grid Security Protocols [Volume 14, Issue 2, 2022, Pages 157-165]
-
Andarzian, Seyed Behnam
SANT: Static Analysis of Native Threads for Security Vetting of Android Applications [Volume 14, Issue 1, 2022, Pages 13-25]
-
Aref, Mohammad Reza
Location Privacy Preservation for Secondary Users in a Database-Driven Cognitive Radio Network [Volume 14, Issue 2, 2022, Pages 215-227]
-
Ashouri-Talouki, Maede
Light-Weight Privacy-Preserving Data Aggregation Protocols in Smart Grid Metering Networks [Volume 14, Issue 3, 2022, Pages 101-112]
-
Ashtari, Amir
Mutual Lightweight PUF-Based Authentication Scheme Using Random Key Management Mechanism for Resource-Constrained IoT Devices [Volume 14, Issue 3, 2022, Pages 1-8]
B
-
Bagheri, Nasour
Practical Differential Fault Analysis on SKINNY [Volume 14, Issue 3, 2022, Pages 9-19]
-
Bagheri, Nasour
Practical Differential Fault Analysis on CRAFT, a Lightweight Block Cipher [Volume 14, Issue 3, 2022, Pages 21-31]
-
Banaeian Far, Saeed
An Efficient Pairing-Free Identity-Based Certificateless Signcryption [Volume 14, Issue 1, 2022, Pages 69-82]
-
Bayat, Majid
A Privacy Preserving Mutual Authentication Scheme Suitable for IoT-Based Medical Systems [Volume 14, Issue 1, 2022, Pages 57-68]
-
Bayat Sarmadi, Siavash
A Study of Timing Side-Channel Attacks and Countermeasures on JavaScript and WebAssembly [Volume 14, Issue 1, 2022, Pages 27-46]
D
-
Damavandi, Sepehr
An Electronic Voting Scheme Based on Blockchain Technology and Zero-Knowledge Proofs [Volume 14, Issue 3, 2022, Pages 123-133]
-
Dastanpour, Hajar
A Graph-based Online Feature Selection to Improve Detection of New Attacks [Volume 14, Issue 2, 2022, Pages 115-130]
-
Deldar, Fatemeh
Android Malware Detection Using One-Class Graph Neural Networks [Volume 14, Issue 3, 2022, Pages 51-60]
-
Dorri Nogoorani, Sadegh
An Electronic Voting Scheme Based on Blockchain Technology and Zero-Knowledge Proofs [Volume 14, Issue 3, 2022, Pages 123-133]
E
-
Ebrahimi, Mahdieh
A Privacy Preserving Mutual Authentication Scheme Suitable for IoT-Based Medical Systems [Volume 14, Issue 1, 2022, Pages 57-68]
-
Ebrahimifard, Mohammad
Android Malware Detection Using One-Class Graph Neural Networks [Volume 14, Issue 3, 2022, Pages 51-60]
F
-
Fanian, Ali
A Graph-based Online Feature Selection to Improve Detection of New Attacks [Volume 14, Issue 2, 2022, Pages 115-130]
G
-
Ghazi, Seyed Salar
On the Suitability of Improved TrustChain for Smartphones [Volume 14, Issue 3, 2022, Pages 33-42]
H
-
Hadavi, Mohammad Ali
Bypassing Web Application Firewalls Using Deep Reinforcement Learning [Volume 14, Issue 2, 2022, Pages 131-145]
-
Hadavi, Mohammad Ali
SecureKV: Secure Searchable Outsourcing of Key-Value Databases to the Public Cloud [Volume 14, Issue 3, 2022, Pages 113-121]
-
Hadian Dehkordi, Massoud
A New Variant of the Winternitz One Time Signature Based on Graded Encoding Schemes [Volume 14, Issue 1, 2022, Pages 1-11]
-
Hajisoltani, Muhamadali
Secure and Low-Area Implementation of the AES Using FPGA [Volume 14, Issue 3, 2022, Pages 93-99]
-
Hamzeh, Ali
Ransomware Detection Based on PE Header Using Convolutional Neural Networks [Volume 14, Issue 2, 2022, Pages 181-192]
-
Hemmati, Mojtaba
Bypassing Web Application Firewalls Using Deep Reinforcement Learning [Volume 14, Issue 2, 2022, Pages 131-145]
-
Hosseintalaee, Hamed
A Time Randomization-Based Countermeasure Against the Template Side-Channel Attack [Volume 14, Issue 1, 2022, Pages 47-55]
J
-
Jahanian, Ali
A Time Randomization-Based Countermeasure Against the Template Side-Channel Attack [Volume 14, Issue 1, 2022, Pages 47-55]
-
Jalaly Bidgoly, Amir
Lightweight Identification of Android Malware with Knowledge Distillation and Deep Learning Approach [Volume 14, Issue 3, 2022, Pages 81-92]
-
Jannati, Hoda
Location Privacy Preservation for Secondary Users in a Database-Driven Cognitive Radio Network [Volume 14, Issue 2, 2022, Pages 215-227]
K
-
Karampour, Afshin
Light-Weight Privacy-Preserving Data Aggregation Protocols in Smart Grid Metering Networks [Volume 14, Issue 3, 2022, Pages 101-112]
-
Kordi, Farshideh
A Time Randomization-Based Countermeasure Against the Template Side-Channel Attack [Volume 14, Issue 1, 2022, Pages 47-55]
M
-
Manavi, Farnoush
Ransomware Detection Based on PE Header Using Convolutional Neural Networks [Volume 14, Issue 2, 2022, Pages 181-192]
-
Masjedi, Peyman
A Binary Relevance Adaptive Model-Selection for Ensemble Steganalysis [Volume 14, Issue 1, 2022, Pages 105-113]
-
Mazaheri, Mohammad Erfan
A Study of Timing Side-Channel Attacks and Countermeasures on JavaScript and WebAssembly [Volume 14, Issue 1, 2022, Pages 27-46]
-
Mozafari, Somayeh
Lightweight Identification of Android Malware with Knowledge Distillation and Deep Learning Approach [Volume 14, Issue 3, 2022, Pages 81-92]
N
-
Nickabadi, Ahmad
Business-Layer Session Puzzling Racer: Dynamic Security Testing Against Session Puzzling Race Conditions in Business Layer [Volume 14, Issue 1, 2022, Pages 83-104]
-
Nowroozi, Alireza
Business-Layer Session Puzzling Racer: Dynamic Security Testing Against Session Puzzling Race Conditions in Business Layer [Volume 14, Issue 1, 2022, Pages 83-104]
O
-
Oraei, Hossein
A New Variant of the Winternitz One Time Signature Based on Graded Encoding Schemes [Volume 14, Issue 1, 2022, Pages 1-11]
P
-
Palanki, Sajjad
Attribute-Based Encryption with Efficient Attribute Revocation, Decryption Outsourcing, and Multi-Keyword Searching in Cloud Storage [Volume 14, Issue 3, 2022, Pages 135-149]
-
Pilevar Moakhar, Sahar
On the Suitability of Improved TrustChain for Smartphones [Volume 14, Issue 3, 2022, Pages 33-42]
-
Porkar, Maryam
Practical Differential Fault Analysis on SKINNY [Volume 14, Issue 3, 2022, Pages 9-19]
R
-
Rajabzadeh Assar, Maryam
An Efficient Pairing-Free Identity-Based Certificateless Signcryption [Volume 14, Issue 1, 2022, Pages 69-82]
-
Ramzanipour, Hamed
Practical Differential Fault Analysis on SKINNY [Volume 14, Issue 3, 2022, Pages 9-19]
-
Ramzanipour, Hamed
Practical Differential Fault Analysis on CRAFT, a Lightweight Block Cipher [Volume 14, Issue 3, 2022, Pages 21-31]
-
Rasouli, Faeze
Perfect Recovery of Small Tampers Using a Novel Fragile Watermarking Technique Based on Distributed Hamming Code [Volume 14, Issue 2, 2022, Pages 147-156]
-
Rastegari, Parvin
Attacks to Some Recently Proposed CL-SC Schemes and Presenting a Secure Scheme with KSSTIS [Volume 14, Issue 2, 2022, Pages 193-213]
S
-
Sabeti, Vajiheh
Secure and Imperceptible Image Steganography in Discrete Wavelet Transform Using the XOR Logical Function and Genetic Algorithm [Volume 14, Issue 2, 2022, Pages 167-179]
-
Saeedi Sadr, Maryam
SecureKV: Secure Searchable Outsourcing of Key-Value Databases to the Public Cloud [Volume 14, Issue 3, 2022, Pages 113-121]
-
Salami, Zeinab
Location Privacy Preservation for Secondary Users in a Database-Driven Cognitive Radio Network [Volume 14, Issue 2, 2022, Pages 215-227]
-
Salarifard, Raziyeh
Secure and Low-Area Implementation of the AES Using FPGA [Volume 14, Issue 3, 2022, Pages 93-99]
-
Sayyadabdi, Amirhosein
Towards a Formal Approach for Detection of Vulnerabilities in the Android Permissions System [Volume 14, Issue 3, 2022, Pages 61-69]
-
Shabani, Ahmad
Mutual Lightweight PUF-Based Authentication Scheme Using Random Key Management Mechanism for Resource-Constrained IoT Devices [Volume 14, Issue 3, 2022, Pages 1-8]
-
Shafieinejad, Alireza
Attribute-Based Encryption with Efficient Attribute Revocation, Decryption Outsourcing, and Multi-Keyword Searching in Cloud Storage [Volume 14, Issue 3, 2022, Pages 135-149]
-
Soleimany, Hadi
Secure and Low-Area Implementation of the AES Using FPGA [Volume 14, Issue 3, 2022, Pages 93-99]
T
-
Taheri, Mohammad
A Binary Relevance Adaptive Model-Selection for Ensemble Steganalysis [Volume 14, Issue 1, 2022, Pages 105-113]
-
Taheri, Mohammad
Perfect Recovery of Small Tampers Using a Novel Fragile Watermarking Technique Based on Distributed Hamming Code [Volume 14, Issue 2, 2022, Pages 147-156]
-
Taheri Ardakani, Farhad
A Study of Timing Side-Channel Attacks and Countermeasures on JavaScript and WebAssembly [Volume 14, Issue 1, 2022, Pages 27-46]
-
Tork Ladani, Behrouz
SANT: Static Analysis of Native Threads for Security Vetting of Android Applications [Volume 14, Issue 1, 2022, Pages 13-25]
-
Tork Ladani, Behrouz
Towards a Formal Approach for Detection of Vulnerabilities in the Android Permissions System [Volume 14, Issue 3, 2022, Pages 61-69]
-
Tork Ladani, Behrouz
Light-Weight Privacy-Preserving Data Aggregation Protocols in Smart Grid Metering Networks [Volume 14, Issue 3, 2022, Pages 101-112]
V
-
Vafaei, Navid
Practical Differential Fault Analysis on SKINNY [Volume 14, Issue 3, 2022, Pages 9-19]
-
Vafaei, Navid
Practical Differential Fault Analysis on CRAFT, a Lightweight Block Cipher [Volume 14, Issue 3, 2022, Pages 21-31]
Z
-
Zahednejad, Behnam
A Privacy Preserving Mutual Authentication Scheme Suitable for IoT-Based Medical Systems [Volume 14, Issue 1, 2022, Pages 57-68]
-
Zamani, Bahman
Towards a Formal Approach for Detection of Vulnerabilities in the Android Permissions System [Volume 14, Issue 3, 2022, Pages 61-69]