A

  • Abdolmaleki, B. Enhancing privacy of recent authentication schemes for low-cost RFID systems [Volume 7, Issue 2, 2015, Pages 135-149]

  • Akhbari, B. Enhancing privacy of recent authentication schemes for low-cost RFID systems [Volume 7, Issue 2, 2015, Pages 135-149]

  • Alizadeh, J. Cryptanalysis of some first round CAESAR candidates [Volume 7, Issue 2, 2015, Pages 127-134]

  • Amini, M. A combination of semantic and attribute-based access control model for virtual organizations [Volume 7, Issue 1, 2015, Pages 27-45]

  • Arasteh, M. A combination of semantic and attribute-based access control model for virtual organizations [Volume 7, Issue 1, 2015, Pages 27-45]

  • Aref, M. R. Cryptanalysis of some first round CAESAR candidates [Volume 7, Issue 2, 2015, Pages 127-134]

  • Aref, M. R. Enhancing privacy of recent authentication schemes for low-cost RFID systems [Volume 7, Issue 2, 2015, Pages 135-149]

B

  • Bagheri, N. Cryptanalysis of some first round CAESAR candidates [Volume 7, Issue 2, 2015, Pages 127-134]

  • Baghery, K. Enhancing privacy of recent authentication schemes for low-cost RFID systems [Volume 7, Issue 2, 2015, Pages 135-149]

D

  • Dorri Nogoorani, S. A collusion mitigation scheme for reputation systems [Volume 7, Issue 2, 2015, Pages 151-166]

E

  • Ebrahimi Atani, R. EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations [Volume 7, Issue 2, 2015, Pages 115-126]

  • Ebrahimi Atani, Sh. EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations [Volume 7, Issue 2, 2015, Pages 115-126]

G

  • Ganjavi, R. A traceable optimistic fair exchange protocol in the standard model [Volume 7, Issue 1, 2015, Pages 3-14]

  • Ghasemi, S. GGRA: a grouped gossip-based reputation aggregation algorithm [Volume 7, Issue 1, 2015, Pages 59-74]

  • Ghasemi Falavarjani, S. GGRA: a grouped gossip-based reputation aggregation algorithm [Volume 7, Issue 1, 2015, Pages 59-74]

H

  • Hassani Karbasi, A. EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations [Volume 7, Issue 2, 2015, Pages 115-126]

J

  • Jahanian, A. Security-aware register placement to hinder malicious hardware updating and improve Trojan detectability [Volume 7, Issue 1, 2015, Pages 75-81]

  • Jalili, R. Editorial [Volume 7, Issue 1, 2015, Pages 1-2]

  • Jalili, R. Editorial [Volume 7, Issue 2, 2015, Pages 89-90]

  • Jalili, R. A collusion mitigation scheme for reputation systems [Volume 7, Issue 2, 2015, Pages 151-166]

  • Jalili, S. A novel local search method for microaggregation [Volume 7, Issue 1, 2015, Pages 15-26]

K

  • Kuchaki Rafsanjani, M. Optimizing image steganography by combining the GA and ICA [Volume 7, Issue 1, 2015, Pages 47-58]

M

  • Mashhadi, S. Computationally secure multiple secret sharing: models, schemes, and formal security analysis [Volume 7, Issue 2, 2015, Pages 91-99]

  • Mortazavi, R. A novel local search method for microaggregation [Volume 7, Issue 1, 2015, Pages 15-26]

N

  • Niknafs, M. A collusion mitigation scheme for reputation systems [Volume 7, Issue 2, 2015, Pages 151-166]

R

  • Rajabzadeh Asaar, M. A traceable optimistic fair exchange protocol in the standard model [Volume 7, Issue 1, 2015, Pages 3-14]

  • Rashidi, B. Efficient implementation of low time complexity and pipelined bit-parallel polynomial basis multiplier over binary finite fields [Volume 7, Issue 2, 2015, Pages 101-114]

  • Rezaeian Farashahi, R. Efficient implementation of low time complexity and pipelined bit-parallel polynomial basis multiplier over binary finite fields [Volume 7, Issue 2, 2015, Pages 101-114]

S

  • Sadeghi, F. Optimizing image steganography by combining the GA and ICA [Volume 7, Issue 1, 2015, Pages 47-58]

  • Sadeghi, H. Cryptanalysis of some first round CAESAR candidates [Volume 7, Issue 2, 2015, Pages 127-134]

  • Salmasizadeh, M. A traceable optimistic fair exchange protocol in the standard model [Volume 7, Issue 1, 2015, Pages 3-14]

  • Sayedi, S. M. Efficient implementation of low time complexity and pipelined bit-parallel polynomial basis multiplier over binary finite fields [Volume 7, Issue 2, 2015, Pages 101-114]

T

  • Tork Ladani, Behrouz GGRA: a grouped gossip-based reputation aggregation algorithm [Volume 7, Issue 1, 2015, Pages 59-74]

V

  • Vosoughi, M. Security-aware register placement to hinder malicious hardware updating and improve Trojan detectability [Volume 7, Issue 1, 2015, Pages 75-81]

Z

  • Zarisfi Kermani, F. Optimizing image steganography by combining the GA and ICA [Volume 7, Issue 1, 2015, Pages 47-58]