A
-
AmirHaeri, M.
Alert correlation and prediction using data mining and HMM [Volume 3, Issue 2, 2011, Pages 77-101]
B
-
Baseri, Y.
Double voter perceptible blind signature based electronic voting protocol [Volume 3, Issue 1, 2011, Pages 43-50]
-
Bishop, M.
Computer security in the future [Volume 3, Issue 1, 2011, Pages 3-27]
D
-
Danyali, H.
Intelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms [Volume 3, Issue 1, 2011, Pages 51-66]
-
Deljavan Amiri, M.
Intelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms [Volume 3, Issue 1, 2011, Pages 51-66]
-
Derakhshandeh, Z.
A model for specification, composition and verification of access control policies and its application to web services [Volume 3, Issue 2, 2011, Pages 103-120]
F
-
Farhadi, H.
Alert correlation and prediction using data mining and HMM [Volume 3, Issue 2, 2011, Pages 77-101]
H
-
Hadavi, M. A.
Separating indexes from data: a distributed scheme for secure database outsourcing [Volume 3, Issue 2, 2011, Pages 121-133]
J
-
Jalili, R.
Editorial [Volume 3, Issue 1, 2011, Pages 1-2]
-
Jalili, R.
Editorial [Volume 3, Issue 2, 2011, Pages 67-68]
-
Jalili, R.
Separating indexes from data: a distributed scheme for secure database outsourcing [Volume 3, Issue 2, 2011, Pages 121-133]
K
-
Khansari, M.
Alert correlation and prediction using data mining and HMM [Volume 3, Issue 2, 2011, Pages 77-101]
M
-
Malekian, E.
QTRU: quaternionic version of the NTRU public-key cryptosystems [Volume 3, Issue 1, 2011, Pages 29-42]
-
Mashatan, A.
QTRU: quaternionic version of the NTRU public-key cryptosystems [Volume 3, Issue 1, 2011, Pages 29-42]
-
Mohajeri, J.
Double voter perceptible blind signature based electronic voting protocol [Volume 3, Issue 1, 2011, Pages 43-50]
-
Mortazavi, A.
Double voter perceptible blind signature based electronic voting protocol [Volume 3, Issue 1, 2011, Pages 43-50]
P
-
Pourpouneh, M.
Double voter perceptible blind signature based electronic voting protocol [Volume 3, Issue 1, 2011, Pages 43-50]
R
-
Rajabzadeh Asaar, M.
Double voter perceptible blind signature based electronic voting protocol [Volume 3, Issue 1, 2011, Pages 43-50]
-
Rogaway, P.
Constructing cryptographic definitions [Volume 3, Issue 2, 2011, Pages 69-76]
S
-
Soltani, S.
Separating indexes from data: a distributed scheme for secure database outsourcing [Volume 3, Issue 2, 2011, Pages 121-133]
T
-
Tork Ladani, B.
A model for specification, composition and verification of access control policies and its application to web services [Volume 3, Issue 2, 2011, Pages 103-120]
Z
-
Zahir-Azami, B.
Intelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms [Volume 3, Issue 1, 2011, Pages 51-66]
-
Zakerolhosseini, A.
QTRU: quaternionic version of the NTRU public-key cryptosystems [Volume 3, Issue 1, 2011, Pages 29-42]