Abdolmaleki, B.
Enhancing privacy of recent authentication schemes for low-cost RFID systems [Volume 7, Issue 2, 2015, Pages 135-149]
Akhbari, B.
Enhancing privacy of recent authentication schemes for low-cost RFID systems [Volume 7, Issue 2, 2015, Pages 135-149]
Alizadeh, J.
Cryptanalysis of some first round CAESAR candidates [Volume 7, Issue 2, 2015, Pages 127-134]
Amini, M.
A combination of semantic and attribute-based access control model for virtual organizations [Volume 7, Issue 1, 2015, Pages 27-45]
Arasteh, M.
A combination of semantic and attribute-based access control model for virtual organizations [Volume 7, Issue 1, 2015, Pages 27-45]
Aref, M. R.
Cryptanalysis of some first round CAESAR candidates [Volume 7, Issue 2, 2015, Pages 127-134]
Aref, M. R.
Enhancing privacy of recent authentication schemes for low-cost RFID systems [Volume 7, Issue 2, 2015, Pages 135-149]
B
Bagheri, N.
Cryptanalysis of some first round CAESAR candidates [Volume 7, Issue 2, 2015, Pages 127-134]
Baghery, K.
Enhancing privacy of recent authentication schemes for low-cost RFID systems [Volume 7, Issue 2, 2015, Pages 135-149]
D
Dorri Nogoorani, S.
A collusion mitigation scheme for reputation systems [Volume 7, Issue 2, 2015, Pages 151-166]
E
Ebrahimi Atani, R.
EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations [Volume 7, Issue 2, 2015, Pages 115-126]
Ebrahimi Atani, Sh.
EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations [Volume 7, Issue 2, 2015, Pages 115-126]
G
Ganjavi, R.
A traceable optimistic fair exchange protocol in the standard model [Volume 7, Issue 1, 2015, Pages 3-14]
Ghasemi, S.
GGRA: a grouped gossip-based reputation aggregation algorithm [Volume 7, Issue 1, 2015, Pages 59-74]
Ghasemi Falavarjani, S.
GGRA: a grouped gossip-based reputation aggregation algorithm [Volume 7, Issue 1, 2015, Pages 59-74]
H
Hassani Karbasi, A.
EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations [Volume 7, Issue 2, 2015, Pages 115-126]
J
Jahanian, A.
Security-aware register placement to hinder malicious hardware updating and improve Trojan detectability [Volume 7, Issue 1, 2015, Pages 75-81]
Jalili, R.
Editorial [Volume 7, Issue 1, 2015, Pages 1-2]
Jalili, R.
Editorial [Volume 7, Issue 2, 2015, Pages 89-90]
Jalili, R.
A collusion mitigation scheme for reputation systems [Volume 7, Issue 2, 2015, Pages 151-166]
Jalili, S.
A novel local search method for microaggregation [Volume 7, Issue 1, 2015, Pages 15-26]
K
Kuchaki Rafsanjani, M.
Optimizing image steganography by combining the GA and ICA [Volume 7, Issue 1, 2015, Pages 47-58]
M
Mashhadi, S.
Computationally secure multiple secret sharing: models, schemes, and formal security analysis [Volume 7, Issue 2, 2015, Pages 91-99]
Mortazavi, R.
A novel local search method for microaggregation [Volume 7, Issue 1, 2015, Pages 15-26]
N
Niknafs, M.
A collusion mitigation scheme for reputation systems [Volume 7, Issue 2, 2015, Pages 151-166]
R
Rajabzadeh Asaar, M.
A traceable optimistic fair exchange protocol in the standard model [Volume 7, Issue 1, 2015, Pages 3-14]
Rashidi, B.
Efficient implementation of low time complexity and pipelined bit-parallel polynomial basis multiplier over binary finite fields [Volume 7, Issue 2, 2015, Pages 101-114]
Rezaeian Farashahi, R.
Efficient implementation of low time complexity and pipelined bit-parallel polynomial basis multiplier over binary finite fields [Volume 7, Issue 2, 2015, Pages 101-114]
S
Sadeghi, F.
Optimizing image steganography by combining the GA and ICA [Volume 7, Issue 1, 2015, Pages 47-58]
Sadeghi, H.
Cryptanalysis of some first round CAESAR candidates [Volume 7, Issue 2, 2015, Pages 127-134]
Salmasizadeh, M.
A traceable optimistic fair exchange protocol in the standard model [Volume 7, Issue 1, 2015, Pages 3-14]
Sayedi, S. M.
Efficient implementation of low time complexity and pipelined bit-parallel polynomial basis multiplier over binary finite fields [Volume 7, Issue 2, 2015, Pages 101-114]