A
-
Aerabi, E.
Side channel parameter characteristics of code injection attacks [Volume 9, Issue 1, 2017, Pages 17-26]
-
Ahadipour, A. R.
LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring [Volume 9, Issue 1, 2017, Pages 27-39]
-
Akbari, A.
Side channel parameter characteristics of code injection attacks [Volume 9, Issue 1, 2017, Pages 17-26]
-
Aminmansour, F.
Dwarf Frankenstein is still in your memory: tiny code reuse attacks [Volume 9, Issue 1, 2017, Pages 53-72]
-
Aref, M. R.
Editorial [Volume 9, Issue 1, 2017, Pages 1-2]
-
Aref, M. R.
Editorial [Volume 9, Issue 2, 2017, Pages 99-100]
B
-
Berenjkoub, M.
An efficient certificateless signcryption scheme in the standard model [Volume 9, Issue 1, 2017, Pages 3-16]
D
-
Daneshgar, A.
A new security proof for FMNV continuous non-malleable encoding scheme [Volume 9, Issue 1, 2017, Pages 41-51]
E
-
Eghlidos, T.
An efficient secure channel coding scheme based on polar codes [Volume 9, Issue 2, 2017, Pages 111-118]
F
-
Fazeli, M.
Side channel parameter characteristics of code injection attacks [Volume 9, Issue 1, 2017, Pages 17-26]
G
-
Ghasemzadeh, H.
Cipher text only attack on speech time scrambling systems using correction of audio spectrogram [Volume 9, Issue 2, 2017, Pages 131-145]
H
-
Hajian Nezhad, J.
Analyzing new features of infected web content in detection of malicious web pages [Volume 9, Issue 2, 2017, Pages 161-181]
I
-
Imani, M.
Phishing website detection using weighted feature line embedding [Volume 9, Issue 2, 2017, Pages 147-159]
K
-
Kaykha, M.
Side channel parameter characteristics of code injection attacks [Volume 9, Issue 1, 2017, Pages 17-26]
-
Keshavarz-Haddad, A. R.
LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring [Volume 9, Issue 1, 2017, Pages 27-39]
-
Khazaei, Sh.
On the computational complexity of finding a minimal basis for the guess and determine attack [Volume 9, Issue 2, 2017, Pages 101-110]
M
-
Mafakheri, B.
An efficient secure channel coding scheme based on polar codes [Volume 9, Issue 2, 2017, Pages 111-118]
-
Mehrara, H.
Cipher text only attack on speech time scrambling systems using correction of audio spectrogram [Volume 9, Issue 2, 2017, Pages 131-145]
-
Moazami, F.
On the computational complexity of finding a minimal basis for the guess and determine attack [Volume 9, Issue 2, 2017, Pages 101-110]
-
Montazer, Gh. A.
Phishing website detection using weighted feature line embedding [Volume 9, Issue 2, 2017, Pages 147-159]
-
Mortazavi, A.
A new security proof for FMNV continuous non-malleable encoding scheme [Volume 9, Issue 1, 2017, Pages 41-51]
P
-
Patooghy, A.
Side channel parameter characteristics of code injection attacks [Volume 9, Issue 1, 2017, Pages 17-26]
-
Pilaram, H.
An efficient secure channel coding scheme based on polar codes [Volume 9, Issue 2, 2017, Pages 111-118]
R
-
Rastegari, P.
An efficient certificateless signcryption scheme in the standard model [Volume 9, Issue 1, 2017, Pages 3-16]
S
-
Sadeghi, A.A
Dwarf Frankenstein is still in your memory: tiny code reuse attacks [Volume 9, Issue 1, 2017, Pages 53-72]
-
Sadrnezhad, Z.
Analyzing new features of infected web content in detection of malicious web pages [Volume 9, Issue 2, 2017, Pages 161-181]
-
Safaei Pour, M.
A new CPA resistant software implementation for symmetric ciphers with smoothed power consumption: SIMON case study [Volume 9, Issue 2, 2017, Pages 119-130]
-
Safarzadeh, M.
An automatic test case generator for evaluating implementation of access control policies [Volume 9, Issue 1, 2017, Pages 73-91]
-
Salmasizadeh, M.
A new security proof for FMNV continuous non-malleable encoding scheme [Volume 9, Issue 1, 2017, Pages 41-51]
-
Salmasizadeh, M.
A new CPA resistant software implementation for symmetric ciphers with smoothed power consumption: SIMON case study [Volume 9, Issue 2, 2017, Pages 119-130]
-
Shahriari, H.R.
Dwarf Frankenstein is still in your memory: tiny code reuse attacks [Volume 9, Issue 1, 2017, Pages 53-72]
T
-
Taghizadeh, M.
An automatic test case generator for evaluating implementation of access control policies [Volume 9, Issue 1, 2017, Pages 73-91]
-
Tajik Khasss, M.
Cipher text only attack on speech time scrambling systems using correction of audio spectrogram [Volume 9, Issue 2, 2017, Pages 131-145]
-
Tayarani-N, M.
Analyzing new features of infected web content in detection of malicious web pages [Volume 9, Issue 2, 2017, Pages 161-181]
-
Tork Ladani, B.
An automatic test case generator for evaluating implementation of access control policies [Volume 9, Issue 1, 2017, Pages 73-91]
V
-
Vafaei Jahan, Majid
Analyzing new features of infected web content in detection of malicious web pages [Volume 9, Issue 2, 2017, Pages 161-181]
Z
-
Zamani, B.
An automatic test case generator for evaluating implementation of access control policies [Volume 9, Issue 1, 2017, Pages 73-91]