A

  • Ahmadian, Z. Total break of Zorro using linear and differential attacks [Volume 6, Issue 1, 2014, Pages 23-34]

  • Alamifar, F. An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks [Volume 6, Issue 2, 2014, Pages 141-153]

  • Alizadeh, J. Artemia: a family of provably secure authenticated encryption schemes [Volume 6, Issue 2, 2014, Pages 125-139]

  • Aref, M. R. Total break of Zorro using linear and differential attacks [Volume 6, Issue 1, 2014, Pages 23-34]

  • Aref, M. R. Toward an energy efficient PKC-based key management system for wireless sensor networks [Volume 6, Issue 1, 2014, Pages 53-66]

  • Aref, M. R. Artemia: a family of provably secure authenticated encryption schemes [Volume 6, Issue 2, 2014, Pages 125-139]

B

  • Bagheri, N. Artemia: a family of provably secure authenticated encryption schemes [Volume 6, Issue 2, 2014, Pages 125-139]

  • Berenjkoub, M. An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks [Volume 6, Issue 2, 2014, Pages 141-153]

C

  • Cimato, S. A risk model for cloud processes [Volume 6, Issue 2, 2014, Pages 99-123]

D

  • Damiani, E. A risk model for cloud processes [Volume 6, Issue 2, 2014, Pages 99-123]

  • Davarpanah Jazi, M. A centralized privacy-preserving framework for online social networks [Volume 6, Issue 1, 2014, Pages 35-52]

  • Doroudian, M. A hybrid approach for database intrusion detection at transaction and inter-transaction levels [Volume 6, Issue 2, 2014, Pages 155-167]

E

  • Ebrahimi Atani, R. Improving Tor security against timing and traffic analysis attacks with fair randomization [Volume 6, Issue 1, 2014, Pages 67-76]

  • Esmaeili, J. Access control in ultra-large-scale systems using a data-centric middleware [Volume 6, Issue 1, 2014, Pages 3-22]

G

  • Ghaemmaghami, Sh. An extended feature set for blind image steganalysis in contourlet domain [Volume 6, Issue 2, 2014, Pages 169-181]

  • Ghasemzadeh, H. Toward an energy efficient PKC-based key management system for wireless sensor networks [Volume 6, Issue 1, 2014, Pages 53-66]

  • Gianini, G. A risk model for cloud processes [Volume 6, Issue 2, 2014, Pages 99-123]

H

  • Hamidzadeh, J. A density based clustering approach to distinguish between web robot and human requests to a web server [Volume 6, Issue 1, 2014, Pages 77-89]

J

  • Jalili, R. Editorial [Volume 6, Issue 1, 2014, Pages 1-2]

  • Jalili, R. Editorial [Volume 6, Issue 2, 2014, Pages 97-98]

M

  • Miri, A. A centralized privacy-preserving framework for online social networks [Volume 6, Issue 1, 2014, Pages 35-52]

  • Movaghar, A. A two-phase wormhole attack detection scheme in MANETs [Volume 6, Issue 2, 2014, Pages 183-191]

P

  • Payandeh, A. Toward an energy efficient PKC-based key management system for wireless sensor networks [Volume 6, Issue 1, 2014, Pages 53-66]

R

  • Raji, F. A centralized privacy-preserving framework for online social networks [Volume 6, Issue 1, 2014, Pages 35-52]

  • Rasoolzadeh, Sh. Total break of Zorro using linear and differential attacks [Volume 6, Issue 1, 2014, Pages 23-34]

S

  • Salmasizadeh, M. Total break of Zorro using linear and differential attacks [Volume 6, Issue 1, 2014, Pages 23-34]

  • Shahriari, H. R. A hybrid approach for database intrusion detection at transaction and inter-transaction levels [Volume 6, Issue 2, 2014, Pages 155-167]

  • Shakeri, E. An extended feature set for blind image steganalysis in contourlet domain [Volume 6, Issue 2, 2014, Pages 169-181]

  • Shamaei, Sh. A two-phase wormhole attack detection scheme in MANETs [Volume 6, Issue 2, 2014, Pages 183-191]

  • Shams, F. Access control in ultra-large-scale systems using a data-centric middleware [Volume 6, Issue 1, 2014, Pages 3-22]

  • Shokrollahi, S. Access control in ultra-large-scale systems using a data-centric middleware [Volume 6, Issue 1, 2014, Pages 3-22]

T

  • Tavakoly, A. Improving Tor security against timing and traffic analysis attacks with fair randomization [Volume 6, Issue 1, 2014, Pages 67-76]

V

  • Vafaei Jahan, M. A density based clustering approach to distinguish between web robot and human requests to a web server [Volume 6, Issue 1, 2014, Pages 77-89]

Z

  • Zabihi, M. A density based clustering approach to distinguish between web robot and human requests to a web server [Volume 6, Issue 1, 2014, Pages 77-89]