A

  • AmirHaeri, M. Alert correlation and prediction using data mining and HMM [Volume 3, Issue 2, 2011, Pages 77-101]

B

  • Baseri, Y. Double voter perceptible blind signature based electronic voting protocol [Volume 3, Issue 1, 2011, Pages 43-50]

  • Bishop, M. Computer security in the future [Volume 3, Issue 1, 2011, Pages 3-27]

D

  • Danyali, H. Intelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms [Volume 3, Issue 1, 2011, Pages 51-66]

  • Deljavan Amiri, M. Intelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms [Volume 3, Issue 1, 2011, Pages 51-66]

  • Derakhshandeh, Z. A model for specification, composition and verification of access control policies and its application to web services [Volume 3, Issue 2, 2011, Pages 103-120]

F

  • Farhadi, H. Alert correlation and prediction using data mining and HMM [Volume 3, Issue 2, 2011, Pages 77-101]

H

  • Hadavi, M. A. Separating indexes from data: a distributed scheme for secure database outsourcing [Volume 3, Issue 2, 2011, Pages 121-133]

J

  • Jalili, R. Editorial [Volume 3, Issue 1, 2011, Pages 1-2]

  • Jalili, R. Editorial [Volume 3, Issue 2, 2011, Pages 67-68]

  • Jalili, R. Separating indexes from data: a distributed scheme for secure database outsourcing [Volume 3, Issue 2, 2011, Pages 121-133]

K

  • Khansari, M. Alert correlation and prediction using data mining and HMM [Volume 3, Issue 2, 2011, Pages 77-101]

M

  • Malekian, E. QTRU: quaternionic version of the NTRU public-key cryptosystems [Volume 3, Issue 1, 2011, Pages 29-42]

  • Mashatan, A. QTRU: quaternionic version of the NTRU public-key cryptosystems [Volume 3, Issue 1, 2011, Pages 29-42]

  • Mohajeri, J. Double voter perceptible blind signature based electronic voting protocol [Volume 3, Issue 1, 2011, Pages 43-50]

  • Mortazavi, A. Double voter perceptible blind signature based electronic voting protocol [Volume 3, Issue 1, 2011, Pages 43-50]

P

  • Pourpouneh, M. Double voter perceptible blind signature based electronic voting protocol [Volume 3, Issue 1, 2011, Pages 43-50]

R

  • Rajabzadeh Asaar, M. Double voter perceptible blind signature based electronic voting protocol [Volume 3, Issue 1, 2011, Pages 43-50]

  • Rogaway, P. Constructing cryptographic definitions [Volume 3, Issue 2, 2011, Pages 69-76]

S

  • Soltani, S. Separating indexes from data: a distributed scheme for secure database outsourcing [Volume 3, Issue 2, 2011, Pages 121-133]

T

  • Tork Ladani, B. A model for specification, composition and verification of access control policies and its application to web services [Volume 3, Issue 2, 2011, Pages 103-120]

Z

  • Zahir-Azami, B. Intelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms [Volume 3, Issue 1, 2011, Pages 51-66]

  • Zakerolhosseini, A. QTRU: quaternionic version of the NTRU public-key cryptosystems [Volume 3, Issue 1, 2011, Pages 29-42]