A

  • Aerabi, E. Side channel parameter characteristics of code injection attacks [Volume 9, Issue 1, 2017, Pages 17-26]

  • Ahadipour, A. R. LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring [Volume 9, Issue 1, 2017, Pages 27-39]

  • Akbari, A. Side channel parameter characteristics of code injection attacks [Volume 9, Issue 1, 2017, Pages 17-26]

  • Aminmansour, F. Dwarf Frankenstein is still in your memory: tiny code reuse attacks [Volume 9, Issue 1, 2017, Pages 53-72]

  • Aref, M. R. Editorial [Volume 9, Issue 1, 2017, Pages 1-2]

  • Aref, M. R. Editorial [Volume 9, Issue 2, 2017, Pages 99-100]

B

  • Berenjkoub, M. An efficient certificateless signcryption scheme in the standard model [Volume 9, Issue 1, 2017, Pages 3-16]

D

  • Daneshgar, A. A new security proof for FMNV continuous non-malleable encoding scheme [Volume 9, Issue 1, 2017, Pages 41-51]

E

  • Eghlidos, T. An efficient secure channel coding scheme based on polar codes [Volume 9, Issue 2, 2017, Pages 111-118]

F

  • Fazeli, M. Side channel parameter characteristics of code injection attacks [Volume 9, Issue 1, 2017, Pages 17-26]

G

  • Ghasemzadeh, H. Cipher text only attack on speech time scrambling systems using correction of audio spectrogram [Volume 9, Issue 2, 2017, Pages 131-145]

H

  • Hajian Nezhad, J. Analyzing new features of infected web content in detection of malicious web pages [Volume 9, Issue 2, 2017, Pages 161-181]

I

  • Imani, M. Phishing website detection using weighted feature line embedding [Volume 9, Issue 2, 2017, Pages 147-159]

K

  • Kaykha, M. Side channel parameter characteristics of code injection attacks [Volume 9, Issue 1, 2017, Pages 17-26]

  • Keshavarz-Haddad, A. R. LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring [Volume 9, Issue 1, 2017, Pages 27-39]

  • Khazaei, Sh. On the computational complexity of finding a minimal basis for the guess and determine attack [Volume 9, Issue 2, 2017, Pages 101-110]

M

  • Mafakheri, B. An efficient secure channel coding scheme based on polar codes [Volume 9, Issue 2, 2017, Pages 111-118]

  • Mehrara, H. Cipher text only attack on speech time scrambling systems using correction of audio spectrogram [Volume 9, Issue 2, 2017, Pages 131-145]

  • Moazami, F. On the computational complexity of finding a minimal basis for the guess and determine attack [Volume 9, Issue 2, 2017, Pages 101-110]

  • Montazer, Gh. A. Phishing website detection using weighted feature line embedding [Volume 9, Issue 2, 2017, Pages 147-159]

  • Mortazavi, A. A new security proof for FMNV continuous non-malleable encoding scheme [Volume 9, Issue 1, 2017, Pages 41-51]

P

  • Patooghy, A. Side channel parameter characteristics of code injection attacks [Volume 9, Issue 1, 2017, Pages 17-26]

  • Pilaram, H. An efficient secure channel coding scheme based on polar codes [Volume 9, Issue 2, 2017, Pages 111-118]

R

  • Rastegari, P. An efficient certificateless signcryption scheme in the standard model [Volume 9, Issue 1, 2017, Pages 3-16]

S

  • Sadeghi, A.A Dwarf Frankenstein is still in your memory: tiny code reuse attacks [Volume 9, Issue 1, 2017, Pages 53-72]

  • Sadrnezhad, Z. Analyzing new features of infected web content in detection of malicious web pages [Volume 9, Issue 2, 2017, Pages 161-181]

  • Safaei Pour, M. A new CPA resistant software implementation for symmetric ciphers with smoothed power consumption: SIMON case study [Volume 9, Issue 2, 2017, Pages 119-130]

  • Safarzadeh, M. An automatic test case generator for evaluating implementation of access control policies [Volume 9, Issue 1, 2017, Pages 73-91]

  • Salmasizadeh, M. A new security proof for FMNV continuous non-malleable encoding scheme [Volume 9, Issue 1, 2017, Pages 41-51]

  • Salmasizadeh, M. A new CPA resistant software implementation for symmetric ciphers with smoothed power consumption: SIMON case study [Volume 9, Issue 2, 2017, Pages 119-130]

  • Shahriari, H.R. Dwarf Frankenstein is still in your memory: tiny code reuse attacks [Volume 9, Issue 1, 2017, Pages 53-72]

T

  • Taghizadeh, M. An automatic test case generator for evaluating implementation of access control policies [Volume 9, Issue 1, 2017, Pages 73-91]

  • Tajik Khasss, M. Cipher text only attack on speech time scrambling systems using correction of audio spectrogram [Volume 9, Issue 2, 2017, Pages 131-145]

  • Tayarani-N, M. Analyzing new features of infected web content in detection of malicious web pages [Volume 9, Issue 2, 2017, Pages 161-181]

  • Tork Ladani, B. An automatic test case generator for evaluating implementation of access control policies [Volume 9, Issue 1, 2017, Pages 73-91]

V

  • Vafaei Jahan, Majid Analyzing new features of infected web content in detection of malicious web pages [Volume 9, Issue 2, 2017, Pages 161-181]

Z

  • Zamani, B. An automatic test case generator for evaluating implementation of access control policies [Volume 9, Issue 1, 2017, Pages 73-91]