Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
Research Article
2. An efficient certificateless signcryption scheme in the standard model

P. Rastegari; M. Berenjkoub

Volume 9, Issue 1 , Winter and Spring 2017, Pages 3-16


  Certificateless public key cryptography (CL-PKC) is a useful method in order to solve the problems of traditional public key infrastructure (i.e., large amount of computation, storage and communication costs for managing certificates) and ID-based public key cryptography (i.e., key escrow problem), simultaneously. ...  Read More

Research Article
3. Side channel parameter characteristics of code injection attacks

E. Aerabi; M. Kaykha; M. Fazeli; A. Patooghy; A. Akbari

Volume 9, Issue 1 , Winter and Spring 2017, Pages 17-26


  Embedded systems are suggestive targets for code injection attacks in the recent years. Software protection mechanisms, and in general computers, are not usually applicable in embedded systems since they have limited resources like memory and process power. In this paper we investigate side channel characteristics ...  Read More

Research Article
4. LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring

A. R. Ahadipour; A. R. Keshavarz-Haddad

Volume 9, Issue 1 , Winter and Spring 2017, Pages 27-39


  Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios ...  Read More

Research Article
5. A new security proof for FMNV continuous non-malleable encoding scheme

A. Mortazavi; M. Salmasizadeh; A. Daneshgar

Volume 9, Issue 1 , Winter and Spring 2017, Pages 41-51


  A non-malleable code is a variant of an encoding scheme which is resilient to tampering attacks. The main idea behind non-malleable coding is that the adversary should not be able to obtain any valuable information about the message. Non-malleable codes are used in tamper-resilient cryptography and protecting ...  Read More

Research Article
6. Dwarf Frankenstein is still in your memory: tiny code reuse attacks

A.A Sadeghi; F. Aminmansour; H.R. Shahriari

Volume 9, Issue 1 , Winter and Spring 2017, Pages 53-72


  Code reuse attacks such as return oriented programming and jump oriented programming are the most popular exploitation methods among attackers. A large number of practical and non-practical defenses are proposed that differ in their overhead, the source code requirement, detection rate and implementation ...  Read More

Research Article
7. An automatic test case generator for evaluating implementation of access control policies

M. Safarzadeh; M. Taghizadeh; B. Zamani; B. Tork Ladani

Volume 9, Issue 1 , Winter and Spring 2017, Pages 73-91


  One of the main requirements for providing software security is the enforcement of access control policies which aim to protect resources of the system against unauthorized accesses. Any error in the implementation of such policies may lead to undesirable outcomes. For testing the implementation of access ...  Read More