AmirHaeri, M.
Alert correlation and prediction using data mining and HMM [Volume 3, Issue 2, 2011, Pages 77-101]
B
Baseri, Y.
Double voter perceptible blind signature based electronic voting protocol [Volume 3, Issue 1, 2011, Pages 43-50]
Bishop, M.
Computer security in the future [Volume 3, Issue 1, 2011, Pages 3-27]
D
Danyali, H.
Intelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms [Volume 3, Issue 1, 2011, Pages 51-66]
Deljavan Amiri, M.
Intelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms [Volume 3, Issue 1, 2011, Pages 51-66]
Derakhshandeh, Z.
A model for specification, composition and verification of access control policies and its application to web services [Volume 3, Issue 2, 2011, Pages 103-120]
F
Farhadi, H.
Alert correlation and prediction using data mining and HMM [Volume 3, Issue 2, 2011, Pages 77-101]
H
Hadavi, M. A.
Separating indexes from data: a distributed scheme for secure database outsourcing [Volume 3, Issue 2, 2011, Pages 121-133]
J
Jalili, R.
Editorial [Volume 3, Issue 1, 2011, Pages 1-2]
Jalili, R.
Editorial [Volume 3, Issue 2, 2011, Pages 67-68]
Jalili, R.
Separating indexes from data: a distributed scheme for secure database outsourcing [Volume 3, Issue 2, 2011, Pages 121-133]
K
Khansari, M.
Alert correlation and prediction using data mining and HMM [Volume 3, Issue 2, 2011, Pages 77-101]
M
Malekian, E.
QTRU: quaternionic version of the NTRU public-key cryptosystems [Volume 3, Issue 1, 2011, Pages 29-42]
Mashatan, A.
QTRU: quaternionic version of the NTRU public-key cryptosystems [Volume 3, Issue 1, 2011, Pages 29-42]
Mohajeri, J.
Double voter perceptible blind signature based electronic voting protocol [Volume 3, Issue 1, 2011, Pages 43-50]
Mortazavi, A.
Double voter perceptible blind signature based electronic voting protocol [Volume 3, Issue 1, 2011, Pages 43-50]
P
Pourpouneh, M.
Double voter perceptible blind signature based electronic voting protocol [Volume 3, Issue 1, 2011, Pages 43-50]
R
Rajabzadeh Asaar, M.
Double voter perceptible blind signature based electronic voting protocol [Volume 3, Issue 1, 2011, Pages 43-50]
Soltani, S.
Separating indexes from data: a distributed scheme for secure database outsourcing [Volume 3, Issue 2, 2011, Pages 121-133]
T
Tork Ladani, B.
A model for specification, composition and verification of access control policies and its application to web services [Volume 3, Issue 2, 2011, Pages 103-120]
Z
Zahir-Azami, B.
Intelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms [Volume 3, Issue 1, 2011, Pages 51-66]
Zakerolhosseini, A.
QTRU: quaternionic version of the NTRU public-key cryptosystems [Volume 3, Issue 1, 2011, Pages 29-42]