A
-
Abadi, M.
A particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs [Volume 2, Issue 1, 2010, Pages 13-32]
-
Abadi, M.
BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms [Volume 4, Issue 1, 2012, Pages 25-39]
-
Abadi, M.
BotOnus: an online unsupervised method for Botnet detection [Volume 4, Issue 1, 2012, Pages 51-62]
-
Abadi, Mahdi
Android Malware Detection Using One-Class Graph Neural Networks [Volume 14, Issue 3, 2022, Pages 51-60]
-
Abazar, Mahdieh
A Binary Relevance Adaptive Model-Selection for Ensemble Steganalysis [Volume 14, Issue 1, 2022, Pages 105-113]
-
Abbas, Sagheer
Evaluation of Planet Factors of Smart City through Multi-layer Fuzzy Logic (MFL) [Volume 11, Issue 3, 2019, Pages 51-58]
-
Abbas, Sagheer
An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling [Volume 11, Issue 3, 2019, Pages 145-151]
-
Abbasi, Rabeeh
Identifying Entrepreneurial Influencers on Twitter [Volume 12, Issue 3, 2020, Pages 59-72]
-
Abdollahi, Sina
Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT [Volume 15, Issue 1, 2023, Pages 97-110]
-
Abdollahi Azgomi, M.
Quantitative evaluation of software security: an approach based on UML/SecAM and evidence theory [Volume 8, Issue 2, 2016, Pages 141-153]
-
Abdolmaleki, B.
Enhancing privacy of recent authentication schemes for low-cost RFID systems [Volume 7, Issue 2, 2015, Pages 135-149]
-
Abdul, Wadood
Modeling a Cloud-Based Smart Parking WLAN Networks Using IEEE802.11AC Technology [Volume 12, Issue 3, 2020, Pages 101-109]
-
Abdullah, Manal
Identifying Entrepreneurial Influencers on Twitter [Volume 12, Issue 3, 2020, Pages 59-72]
-
Abdullah Alkharmani, Hanan
The Impact of Mobile Payment Quality on User’s Continuance Intention Toward Mobile Payment in Saudi Arabia [Volume 12, Issue 3, 2020, Pages 45-53]
-
Abolghasemi, M.
Detection of perturbed quantization (PQ) steganography based on empirical matrix [Volume 2, Issue 2, 2010, Pages 119-128]
-
Abolghasemi, M. S.
A novel key management scheme for heterogeneous sensor networks based on the position of nodes [Volume 8, Issue 2, 2016, Pages 115-130]
-
Adnan Khan, Muhammad
Evaluation of Planet Factors of Smart City through Multi-layer Fuzzy Logic (MFL) [Volume 11, Issue 3, 2019, Pages 51-58]
-
Adnan Khan, Muhammad
An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling [Volume 11, Issue 3, 2019, Pages 145-151]
-
Aerabi, E.
Side channel parameter characteristics of code injection attacks [Volume 9, Issue 1, 2017, Pages 17-26]
-
Afzali, H.
Private Key based query on encrypted data [Volume 4, Issue 1, 2012, Pages 41-50]
-
Aghaee, Hadi
One-Shot Achievable Secrecy Rate Regions for Quantum Interference Wiretap Channel [Volume 14, Issue 3, 2022, Pages 71-80]
-
Aghaeinia, H.
Detection of perturbed quantization (PQ) steganography based on empirical matrix [Volume 2, Issue 2, 2010, Pages 119-128]
-
Agil, Abeer
Anomaly-Based Network Intrusion Detection Using Bidirectional Long Short Term Memory and Convolutional Neural Network [Volume 12, Issue 3, 2020, Pages 37-44]
-
Agoyi, Mary
A Hybrid Encryption Algorithm for Mitigating the Effects of Attacks in Ad Hoc Networks [Volume 12, Issue 3, 2020, Pages 19-27]
-
Ahadipour, A. R.
LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring [Volume 9, Issue 1, 2017, Pages 27-39]
-
A. Hammoudeh, Mohammad Ali
Secure Coding Guidelines — Python [Volume 13, Issue 3, 2021, Pages 31-38]
-
Ahmad, Gulzar
Cloud and IoT based Smart Car Parking System by using Mamdani Fuzzy Inference System (MFIS) [Volume 11, Issue 3, 2019, Pages 153-160]
-
Ahmadi, Siavash
Biclique Cryptanalysis of Block Ciphers LBlock and TWINE-80 with Practical Data Complexity [Volume 11, Issue 1, 2019, Pages 57-74]
-
Ahmadi, Siavash
New Fixed Point Attacks on GOST2 Block Cipher [Volume 11, Issue 2, 2019, Pages 145-158]
-
Ahmadian, Z.
Total break of Zorro using linear and differential attacks [Volume 6, Issue 1, 2014, Pages 23-34]
-
Ahmadian, Zahra
Biclique Cryptanalysis of Block Ciphers LBlock and TWINE-80 with Practical Data Complexity [Volume 11, Issue 1, 2019, Pages 57-74]
-
Ahmadian, Zahra
Revisiting the Security and Efficiency of SP2DAS, 3PDA, and EPPA Smart Grid Security Protocols [Volume 14, Issue 2, 2022, Pages 157-165]
-
Ahmadian Attari, M.
Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC [Volume 5, Issue 1, 2013, Pages 55-70]
-
Ahmadian Attari, Mahmoud
Location Privacy Preservation for Secondary Users in a Database-Driven Cognitive Radio Network [Volume 14, Issue 2, 2022, Pages 215-227]
-
Ahmed Albliwi, Saja
The Impact of Mobile Payment Quality on User’s Continuance Intention Toward Mobile Payment in Saudi Arabia [Volume 12, Issue 3, 2020, Pages 45-53]
-
Akbari, A.
Side channel parameter characteristics of code injection attacks [Volume 9, Issue 1, 2017, Pages 17-26]
-
Akhaee, M. A.
A survey on digital data hiding schemes: principals, algorithms, and applications [Volume 5, Issue 1, 2013, Pages 5-36]
-
Akhaee, M. A.
Robust multiplicative video watermarking using statistical modeling [Volume 5, Issue 1, 2013, Pages 83-95]
-
Akhbari, B.
Enhancing privacy of recent authentication schemes for low-cost RFID systems [Volume 7, Issue 2, 2015, Pages 135-149]
-
Akhbari, Bahareh
One-Shot Achievable Secrecy Rate Regions for Quantum Interference Wiretap Channel [Volume 14, Issue 3, 2022, Pages 71-80]
-
Akram, Ali
An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling [Volume 11, Issue 3, 2019, Pages 145-151]
-
Alabdali, Ruyuf
Broken Authentication and Session Management Vulnerabilities [Volume 13, Issue 3, 2021, Pages 11-19]
-
Alahmari, Saad Ali
Using Machine Learning ARIMA to Predict the Price of Cryptocurrencies [Volume 11, Issue 3, 2019, Pages 139-144]
-
Alajlan, Norah
Data Enhancement for Date Fruit Classification Using DCGAN [Volume 13, Issue 3, 2021, Pages 39-48]
-
Alamifar, F.
An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks [Volume 6, Issue 2, 2014, Pages 141-153]
-
Al-Anazi, Sumayia
CEMD: A Cluster-based Ensemble Motif Discovery Tool [Volume 12, Issue 3, 2020, Pages 29-36]
-
Alawad, Wedad
Forensic-Enabled Security as a Service (FESaaS) - A Readiness Framework for Cloud Forensics [Volume 13, Issue 3, 2021, Pages 49-57]
-
Alghasham, Noorah
Data Enhancement for Date Fruit Classification Using DCGAN [Volume 13, Issue 3, 2021, Pages 39-48]
-
Alghufaili, Lujain
Cross Site Scripting Attack Review [Volume 13, Issue 3, 2021, Pages 21-30]
-
Al-Hammad, Abeer Salman
Reverse Image-Based Search Engine for IP Trademarks [Volume 12, Issue 3, 2020, Pages 117-127]
-
Alharbi, sara
Anomaly-Based Network Intrusion Detection Using Bidirectional Long Short Term Memory and Convolutional Neural Network [Volume 12, Issue 3, 2020, Pages 37-44]
-
Al-Hudhud, Ghada
A Multilingual Infobot in Airports [Volume 12, Issue 3, 2020, Pages 111-115]
-
Al-Hudhud, Ghada
Reverse Image-Based Search Engine for IP Trademarks [Volume 12, Issue 3, 2020, Pages 117-127]
-
Al-Humaimeedy, Abeer Sulaiman
Reverse Image-Based Search Engine for IP Trademarks [Volume 12, Issue 3, 2020, Pages 117-127]
-
Al-Humamidi, Abeer
A Multilingual Infobot in Airports [Volume 12, Issue 3, 2020, Pages 111-115]
-
Alhumidan, Ragad
Secure Coding Guidelines — Python [Volume 13, Issue 3, 2021, Pages 31-38]
-
Ali, Mohammad
Attribute-Based Remote Data Auditing and User Authentication for Cloud Storage Systems [Volume 14, Issue 3, 2022, Pages 43-49]
-
Ali Awad, Osama
Evaluation of a Wireless ZigBee with PID Controller for Networked Control System Using True Time Toolbox [Volume 12, Issue 3, 2020, Pages 13-17]
-
Alidoosti, Mitra
Business-Layer Session Puzzling Racer: Dynamic Security Testing Against Session Puzzling Race Conditions in Business Layer [Volume 14, Issue 1, 2022, Pages 83-104]
-
Alizadeh, Bijan
Mutual Lightweight PUF-Based Authentication Scheme Using Random Key Management Mechanism for Resource-Constrained IoT Devices [Volume 14, Issue 3, 2022, Pages 1-8]
-
Alizadeh, J.
Artemia: a family of provably secure authenticated encryption schemes [Volume 6, Issue 2, 2014, Pages 125-139]
-
Alizadeh, J.
Cryptanalysis of some first round CAESAR candidates [Volume 7, Issue 2, 2015, Pages 127-134]
-
Aljedaibi, Wajdi
Towards Measuring the Project Management Process During Large Scale Software System Implementation Phase [Volume 11, Issue 3, 2019, Pages 161-172]
-
Aljoaey, Hanan
Broken Authentication and Session Management Vulnerabilities [Volume 13, Issue 3, 2021, Pages 11-19]
-
Aljodhi, Haya
Anomaly-Based Network Intrusion Detection Using Bidirectional Long Short Term Memory and Convolutional Neural Network [Volume 12, Issue 3, 2020, Pages 37-44]
-
Alkenazan, Wafa Abdulaziz
Modeling a Cloud-Based Smart Parking WLAN Networks Using IEEE802.11AC Technology [Volume 12, Issue 3, 2020, Pages 101-109]
-
Almotairy, Bodor
Identifying Entrepreneurial Influencers on Twitter [Volume 12, Issue 3, 2020, Pages 59-72]
-
Almutawa, Khawla
Broken Authentication and Session Management Vulnerabilities [Volume 13, Issue 3, 2021, Pages 11-19]
-
Al-Nazer, A. A.
High capacity steganography tool for Arabic text using 'Kashida' [Volume 2, Issue 2, 2010, Pages 107-118]
-
Alnomise, Manar
Secure Coding Guidelines — Python [Volume 13, Issue 3, 2021, Pages 31-38]
-
Alotaibi, Afnan
Cross Site Scripting Attack Review [Volume 13, Issue 3, 2021, Pages 21-30]
-
Alpcan, Tansu
Interdependent Security Game Design over Constrained Linear Influence Networks [Volume 11, Issue 2, 2019, Pages 95-111]
-
Alqassem, Lina
Anomaly-Based Network Intrusion Detection Using Bidirectional Long Short Term Memory and Convolutional Neural Network [Volume 12, Issue 3, 2020, Pages 37-44]
-
Alqwifli, Hutaf
A Review Study on SQL Injection Attacks, Prevention, and Detection [Volume 13, Issue 3, 2021, Pages 1-10]
-
Alrahem, T.
Security testing of session initiation protocol implementations [Volume 1, Issue 2, 2009, Pages 91-103]
-
Alsalamah, Mona
A Review Study on SQL Injection Attacks, Prevention, and Detection [Volume 13, Issue 3, 2021, Pages 1-10]
-
Alshraryan, Lama
Secure Coding Guidelines — Python [Volume 13, Issue 3, 2021, Pages 31-38]
-
Al-Turaiki, Isra
CEMD: A Cluster-based Ensemble Motif Discovery Tool [Volume 12, Issue 3, 2020, Pages 29-36]
-
Al-Turaiki, Isra
Anomaly-Based Network Intrusion Detection Using Bidirectional Long Short Term Memory and Convolutional Neural Network [Volume 12, Issue 3, 2020, Pages 37-44]
-
Altwaijry, Najwa
CEMD: A Cluster-based Ensemble Motif Discovery Tool [Volume 12, Issue 3, 2020, Pages 29-36]
-
Altwaijry, Najwa
Anomaly-Based Network Intrusion Detection Using Bidirectional Long Short Term Memory and Convolutional Neural Network [Volume 12, Issue 3, 2020, Pages 37-44]
-
Alwabli, Huda
A Review Study on SQL Injection Attacks, Prevention, and Detection [Volume 13, Issue 3, 2021, Pages 1-10]
-
Alyahya, Meshael
Data Enhancement for Date Fruit Classification Using DCGAN [Volume 13, Issue 3, 2021, Pages 39-48]
-
Alyas, Tahir
Cloud and IoT based Smart Car Parking System by using Mamdani Fuzzy Inference System (MFIS) [Volume 11, Issue 3, 2019, Pages 153-160]
-
Amerehei, Mahsa
Secure and Imperceptible Image Steganography in Discrete Wavelet Transform Using the XOR Logical Function and Genetic Algorithm [Volume 14, Issue 2, 2022, Pages 167-179]
-
Ameri, M.H.
On the Security of O-PSI: A Delegated Private Set Intersection on Outsourced Datasets (Extended Version) [Volume 10, Issue 2, 2018, Pages 117-127]
-
Amin Ghafari, V.
Cryptanalysis of GSM encryption algorithm A5/1 [Volume 4, Issue 2, 2012, Pages 107-114]
-
Amini, M.
A semantic-aware role-based access control model for pervasive computing environments [Volume 5, Issue 2, 2013, Pages 119-140]
-
Amini, M.
CAMAC: a context-aware mandatory access control model [Volume 1, Issue 1, 2009, Pages 35-54]
-
Amini, M.
A combination of semantic and attribute-based access control model for virtual organizations [Volume 7, Issue 1, 2015, Pages 27-45]
-
Amini Khorasgani, H. R.
On the design and security of a lattice-based threshold secret sharing scheme [Volume 8, Issue 1, 2016, Pages 25-38]
-
Aminmansour, F.
Aggrandizing the beast's limbs: patulous code reuse attack on ARM architecture [Volume 8, Issue 1, 2016, Pages 39-52]
-
Aminmansour, F.
Dwarf Frankenstein is still in your memory: tiny code reuse attacks [Volume 9, Issue 1, 2017, Pages 53-72]
-
Amintoosi, Haleh
On the Suitability of Improved TrustChain for Smartphones [Volume 14, Issue 3, 2022, Pages 33-42]
-
AmirHaeri, M.
Alert correlation and prediction using data mining and HMM [Volume 3, Issue 2, 2011, Pages 77-101]
-
Amiri, Mohammad Amin
Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives [Volume 11, Issue 1, 2019, Pages 35-46]
-
Amiryousefi, Hamid
Revisiting the Security and Efficiency of SP2DAS, 3PDA, and EPPA Smart Grid Security Protocols [Volume 14, Issue 2, 2022, Pages 157-165]
-
A. Mohammed Ali, Salim
Suspended Stripline Low-pass Filter Design for Wide Stopband Attenuation Applications [Volume 12, Issue 3, 2020, Pages 7-12]
-
Amoozgar, M.
A computational model and convergence theorem for rumor dissemination in social networks [Volume 5, Issue 2, 2013, Pages 141-154]
-
Andarzian, Seyed Behnam
SANT: Static Analysis of Native Threads for Security Vetting of Android Applications [Volume 14, Issue 1, 2022, Pages 13-25]
-
Anum, Leena
Evaluation of Planet Factors of Smart City through Multi-layer Fuzzy Logic (MFL) [Volume 11, Issue 3, 2019, Pages 51-58]
-
Anum, Leena
An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling [Volume 11, Issue 3, 2019, Pages 145-151]
-
Aqel, Musbah
A Comparison Study between Intelligent Decision Support Systems and Decision Support Systems [Volume 11, Issue 3, 2019, Pages 187-194]
-
Aqel, Musbah
The Impact of The Biometric System on Election Fraud Elimination: Case of The North of IRAQ [Volume 11, Issue 3, 2019, Pages 195-207]
-
Aqel, Musbah
Human Activity Recognition Based on Multi-Sensors in a Smart Home Using Deep Learning [Volume 13, Issue 3, 2021, Pages 69-78]
-
Arasteh, M.
A combination of semantic and attribute-based access control model for virtual organizations [Volume 7, Issue 1, 2015, Pages 27-45]
-
Aref, M. R.
Editorial [Volume 1, Issue 1, 2009, Pages 1-2]
-
Aref, M. R.
Editorial [Volume 8, Issue 1, 2016, Pages 1-2]
-
Aref, Mohammad Reza
Biclique Cryptanalysis of Block Ciphers LBlock and TWINE-80 with Practical Data Complexity [Volume 11, Issue 1, 2019, Pages 57-74]
-
Aref, Mohammad Reza
Editorial [Volume 11, Issue 1, 2019, Pages 1-2]
-
Aref, Mohammad Reza
New Fixed Point Attacks on GOST2 Block Cipher [Volume 11, Issue 2, 2019, Pages 145-158]
-
Aref, Mohammad Reza
A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications [Volume 11, Issue 2, 2019, Pages 113-128]
-
Aref, Mohammad Reza
Editorial [Volume 11, Issue 2, 2019, Pages 93-94]
-
Aref, Mohammad Reza
Editorial [Volume 11, Issue 3, 2019]
-
Aref, Mohammad Reza
Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants [Volume 12, Issue 1, 2020, Pages 13-23]
-
Aref, Mohammad Reza
Location Privacy Preservation for Secondary Users in a Database-Driven Cognitive Radio Network [Volume 14, Issue 2, 2022, Pages 215-227]
-
Aref, M. R.
Eigenvalues-based LSB steganalysis [Volume 4, Issue 2, 2012, Pages 97-106]
-
Aref, M. R.
Total break of Zorro using linear and differential attacks [Volume 6, Issue 1, 2014, Pages 23-34]
-
Aref, M. R.
Toward an energy efficient PKC-based key management system for wireless sensor networks [Volume 6, Issue 1, 2014, Pages 53-66]
-
Aref, M. R.
Artemia: a family of provably secure authenticated encryption schemes [Volume 6, Issue 2, 2014, Pages 125-139]
-
Aref, M. R.
Improving the Rao-Nam secret key cryptosystem using regular EDF-QC-LDPC codes [Volume 4, Issue 1, 2012, Pages 3-14]
-
Aref, M. R.
Cryptanalysis of some first round CAESAR candidates [Volume 7, Issue 2, 2015, Pages 127-134]
-
Aref, M. R.
Enhancing privacy of recent authentication schemes for low-cost RFID systems [Volume 7, Issue 2, 2015, Pages 135-149]
-
Aref, M. R.
On the design and security of a lattice-based threshold secret sharing scheme [Volume 8, Issue 1, 2016, Pages 25-38]
-
Aref, M. R.
Optimum decoder for multiplicative spread spectrum image watermarking with Laplacian modeling [Volume 8, Issue 2, 2016, Pages 131-139]
-
Aref, M. R.
Editorial [Volume 8, Issue 2, 2016, Pages 91-92]
-
Aref, M. R.
Editorial [Volume 9, Issue 1, 2017, Pages 1-2]
-
Aref, M. R.
Editorial [Volume 9, Issue 2, 2017, Pages 99-100]
-
Aref, M. R.
Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher (Extended Version) [Volume 10, Issue 1, 2018, Pages 3-13]
-
Aref, M.R.
On the Security of O-PSI: A Delegated Private Set Intersection on Outsourced Datasets (Extended Version) [Volume 10, Issue 2, 2018, Pages 117-127]
-
Aref, M.R.
Editorial [Volume 10, Issue 2, 2018, Pages 77-78]
-
Asaad, S.
On the design and security of a lattice-based threshold secret sharing scheme [Volume 8, Issue 1, 2016, Pages 25-38]
-
Asenov, Ivaylo
Access and Mobility Policy Control at the Network Edge [Volume 11, Issue 3, 2019, Pages 105-111]
-
A. Shah, N.
Image flip CAPTCHA [Volume 1, Issue 2, 2009, Pages 105-123]
-
Ashouri-Talouki, M.
An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks [Volume 10, Issue 1, 2018, Pages 15-27]
-
Ashouri-Talouki, Maede
Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems [Volume 12, Issue 2, 2020, Pages 129-140]
-
Ashouri-Talouki, Maede
Hierarchical Deterministic Wallets for Secure Steganography in Blockchain [Volume 15, Issue 1, 2023, Pages 73-81]
-
Ashouri-Talouki, Maede
An Auto-Encoder based Membership Inference Attack against Generative Adversarial Network [(Articles in Press)]
-
Ashouri-Talouki, Maede
Light-Weight Privacy-Preserving Data Aggregation Protocols in Smart Grid Metering Networks [Volume 14, Issue 3, 2022, Pages 101-112]
-
Ashtari, Amir
Mutual Lightweight PUF-Based Authentication Scheme Using Random Key Management Mechanism for Resource-Constrained IoT Devices [Volume 14, Issue 3, 2022, Pages 1-8]
-
Asif, Muhammad
Evaluation of Planet Factors of Smart City through Multi-layer Fuzzy Logic (MFL) [Volume 11, Issue 3, 2019, Pages 51-58]
-
Asif, Muhammad
Cloud and IoT based Smart Car Parking System by using Mamdani Fuzzy Inference System (MFIS) [Volume 11, Issue 3, 2019, Pages 153-160]
-
A. Taha, Ashraf
Modeling a Cloud-Based Smart Parking WLAN Networks Using IEEE802.11AC Technology [Volume 12, Issue 3, 2020, Pages 101-109]
-
Atanasov, Ivaylo
Access and Mobility Policy Control at the Network Edge [Volume 11, Issue 3, 2019, Pages 105-111]
-
Atia, Ayman
Hand Gestures Classification with Multi-Core DTW [Volume 11, Issue 3, 2019, Pages 91-96]
-
Avizheh, S.
Convertible limited (multi-) verifier signature: new constructions and applications [Volume 5, Issue 2, 2013, Pages 189-208]
-
Azadmanesh, Maryam
An Auto-Encoder based Membership Inference Attack against Generative Adversarial Network [(Articles in Press)]
-
Azimi, A.
Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher (Extended Version) [Volume 10, Issue 1, 2018, Pages 3-13]
-
Azmi, R.
STLR: a novel danger theory based structural TLR algorithm [Volume 5, Issue 2, 2013, Pages 209-225]
-
Azmi, R.
Private Key based query on encrypted data [Volume 4, Issue 1, 2012, Pages 41-50]
B
-
Bagherdaei, Arash
IDOT: Black-Box Detection of Access Control Violations in Web Applications [Volume 13, Issue 2, 2021, Pages 117-129]
-
Bagheri, N.
Artemia: a family of provably secure authenticated encryption schemes [Volume 6, Issue 2, 2014, Pages 125-139]
-
Bagheri, N.
Cryptanalysis of some first round CAESAR candidates [Volume 7, Issue 2, 2015, Pages 127-134]
-
Bagheri, N.
A note on the security of two improved RFID protocols [Volume 8, Issue 2, 2016, Pages 155-160]
-
Bagheri, Nasour
Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives [Volume 11, Issue 1, 2019, Pages 35-46]
-
Bagheri, Nasour
Relaxed Differential Fault Analysis of SHA-3 [Volume 11, Issue 2, 2019, Pages 129-143]
-
Bagheri, Nasour
Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants [Volume 12, Issue 1, 2020, Pages 13-23]
-
Bagheri, Nasour
CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking [Volume 12, Issue 2, 2020, Pages 67-80]
-
Bagheri, Nasour
Practical Differential Fault Analysis on SKINNY [Volume 14, Issue 3, 2022, Pages 9-19]
-
Bagheri, Nasour
Practical Differential Fault Analysis on CRAFT, a Lightweight Block Cipher [Volume 14, Issue 3, 2022, Pages 21-31]
-
Bagherpour, Bagher
A Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions [Volume 12, Issue 2, 2020, Pages 91-99]
-
Baghery, K.
Enhancing privacy of recent authentication schemes for low-cost RFID systems [Volume 7, Issue 2, 2015, Pages 135-149]
-
Bahramgiri, H.
A new method for accelerating impossible differential cryptanalysis and its application on LBlock [Volume 8, Issue 1, 2016, Pages 73-84]
-
Balobaid, Awatef
Forensic-Enabled Security as a Service (FESaaS) - A Readiness Framework for Cloud Forensics [Volume 13, Issue 3, 2021, Pages 49-57]
-
Banaeian Far, Saeed
An Efficient Pairing-Free Identity-Based Certificateless Signcryption [Volume 14, Issue 1, 2022, Pages 69-82]
-
BaniMustafa, Ahmed
Enhancing Learning from Imbalanced Classes via Data Preprocessing: A Data-Driven Application in Metabolomics Data Mining [Volume 11, Issue 3, 2019, Pages 79-89]
-
Barani, F.
BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms [Volume 4, Issue 1, 2012, Pages 25-39]
-
Baseri, Y.
Double voter perceptible blind signature based electronic voting protocol [Volume 3, Issue 1, 2011, Pages 43-50]
-
Bassiri, Mustapha
The Establishment of a Distance Training Device within the Regional Center of the Taza Education and Training: Administrative Cycle Case [Volume 12, Issue 3, 2020, Pages 87-93]
-
Bayat, Majid
A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications [Volume 11, Issue 2, 2019, Pages 113-128]
-
Bayat, Majid
Privacy Preserving Attribute-Based Encryption with Conjunctive Keyword Search for E-health Records in Cloud [Volume 13, Issue 2, 2021, Pages 87-100]
-
Bayat, Majid
A Privacy Preserving Mutual Authentication Scheme Suitable for IoT-Based Medical Systems [Volume 14, Issue 1, 2022, Pages 57-68]
-
Bayat Sarmadi, Siavash
A Trusted Design Platform for Trojan Detection in FPGA Bitstreams Using Partial Reconfiguration [Volume 13, Issue 1, 2021, Pages 29-45]
-
Bayat Sarmadi, Siavash
A Study of Timing Side-Channel Attacks and Countermeasures on JavaScript and WebAssembly [Volume 14, Issue 1, 2022, Pages 27-46]
-
Behniafar, M.
A Survey of Anomaly Detection Approaches in Internet of Things [Volume 10, Issue 2, 2018, Pages 79-92]
-
Bel, K. Nalini Sujantha
OT-Feature Extraction on Scrambled Images with Instantaneous Clustering for CBIR Scheme in Cloud Computing [Volume 13, Issue 1, 2021, Pages 1-17]
-
Belaaouad, Said
The Establishment of a Distance Training Device within the Regional Center of the Taza Education and Training: Administrative Cycle Case [Volume 12, Issue 3, 2020, Pages 87-93]
-
Belaaouad, Said
The Establishment of a Distance Training Device within the Regional Center of the Taza Education and Training: Administrative Cycle Case [Volume 12, Issue 3, 2020, Pages 87-93]
-
Berenjkoub, M.
An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks [Volume 6, Issue 2, 2014, Pages 141-153]
-
Berenjkoub, M.
A TESLA-based mutual authentication protocol for GSM networks [Volume 1, Issue 1, 2009, Pages 3-15]
-
Berenjkoub, M.
An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks [Volume 2, Issue 2, 2010, Pages 89-105]
-
Berenjkoub, M.
An efficient certificateless signcryption scheme in the standard model [Volume 9, Issue 1, 2017, Pages 3-16]
-
Bishop, M.
Computer security in the future [Volume 3, Issue 1, 2011, Pages 3-27]
-
Bohlooli, R.
Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version) [Volume 10, Issue 2, 2018, Pages 129-139]
-
Böhm, Markus
Critical Success Factors for Data Virtualization: A Literature Review [Volume 11, Issue 3, 2019, Pages 131-137]
C
-
Carlsson, M.
Security testing of session initiation protocol implementations [Volume 1, Issue 2, 2009, Pages 91-103]
-
Chegeni, Vahid
Providing a Hybrid Cryptography Algorithm for Lightweight Authentication Protocol in RFID with Urban Traffic Usage Case [Volume 13, Issue 1, 2021, Pages 73-85]
-
Chen, A.
Security testing of session initiation protocol implementations [Volume 1, Issue 2, 2009, Pages 91-103]
-
Cimato, S.
A risk model for cloud processes [Volume 6, Issue 2, 2014, Pages 99-123]
-
Córdova, Felisa
Cognitive Strategic Model applied to a Port System [Volume 11, Issue 3, 2019, Pages 73-78]
D
-
Dahri, Kamran
Aspect Oriented UML to ECORE Model Transformation [Volume 11, Issue 3, 2019, Pages 97-103]
-
Damavandi, Sepehr
An Electronic Voting Scheme Based on Blockchain Technology and Zero-Knowledge Proofs [Volume 14, Issue 3, 2022, Pages 123-133]
-
Damiani, E.
A risk model for cloud processes [Volume 6, Issue 2, 2014, Pages 99-123]
-
Daneshgar, A.
A new security proof for FMNV continuous non-malleable encoding scheme [Volume 9, Issue 1, 2017, Pages 41-51]
-
Danyali, H.
Intelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms [Volume 3, Issue 1, 2011, Pages 51-66]
-
Dastanpour, Hajar
A Graph-based Online Feature Selection to Improve Detection of New Attacks [Volume 14, Issue 2, 2022, Pages 115-130]
-
Davarpanah Jazi, M.
A centralized privacy-preserving framework for online social networks [Volume 6, Issue 1, 2014, Pages 35-52]
-
Dawson, E.
Authorization models for secure information sharing: a survey and research agenda [Volume 2, Issue 2, 2010, Pages 69-87]
-
Deeb, Hasan Muhammad
A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware [Volume 15, Issue 1, 2023, Pages 59-71]
-
Dehnavi, S. M.
Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives [Volume 11, Issue 1, 2019, Pages 35-46]
-
Delavar, M.
On the Security of O-PSI: A Delegated Private Set Intersection on Outsourced Datasets (Extended Version) [Volume 10, Issue 2, 2018, Pages 117-127]
-
Deldar, Fatemeh
Android Malware Detection Using One-Class Graph Neural Networks [Volume 14, Issue 3, 2022, Pages 51-60]
-
Deljavan Amiri, M.
Intelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms [Volume 3, Issue 1, 2011, Pages 51-66]
-
Derakhshandeh, Z.
A model for specification, composition and verification of access control policies and its application to web services [Volume 3, Issue 2, 2011, Pages 103-120]
-
DiGiuseppe, N.
Security testing of session initiation protocol implementations [Volume 1, Issue 2, 2009, Pages 91-103]
-
Diyanat, A.
Eigenvalues-based LSB steganalysis [Volume 4, Issue 2, 2012, Pages 97-106]
-
Diyanat, A.
Robust multiplicative video watermarking using statistical modeling [Volume 5, Issue 1, 2013, Pages 83-95]
-
Doroudian, M.
A hybrid approach for database intrusion detection at transaction and inter-transaction levels [Volume 6, Issue 2, 2014, Pages 155-167]
-
Dorri Nogoorani, S.
A collusion mitigation scheme for reputation systems [Volume 7, Issue 2, 2015, Pages 151-166]
-
Dorri Nogoorani, Sadegh
An Electronic Voting Scheme Based on Blockchain Technology and Zero-Knowledge Proofs [Volume 14, Issue 3, 2022, Pages 123-133]
-
Dousti, Mohammad Sadeq
SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing [Volume 11, Issue 1, 2019, Pages 15-34]
-
D. R. Assis, Karcius
A Fair Power Allocation for Non-Orthogonal Multiple Access in the Power Domain [Volume 11, Issue 3, 2019, Pages 123-130]
-
D. R. Assis, Karcius
A New Derivation of the Leftover Hash Lemma [Volume 12, Issue 3, 2020, Pages 55-58]
-
Durán, Claudia
Cognitive Strategic Model applied to a Port System [Volume 11, Issue 3, 2019, Pages 73-78]
E
-
Ebrahimi, Mahdieh
A Privacy Preserving Mutual Authentication Scheme Suitable for IoT-Based Medical Systems [Volume 14, Issue 1, 2022, Pages 57-68]
-
Ebrahimi Atani, R.
Improving Tor security against timing and traffic analysis attacks with fair randomization [Volume 6, Issue 1, 2014, Pages 67-76]
-
Ebrahimi Atani, R.
EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations [Volume 7, Issue 2, 2015, Pages 115-126]
-
Ebrahimi Atani, R.
A novel key management scheme for heterogeneous sensor networks based on the position of nodes [Volume 8, Issue 2, 2016, Pages 115-130]
-
Ebrahimi Atani, Reza
NETRU: A Non-commutative and Secure Variant of CTRU Cryptosystem [Volume 10, Issue 1, 2018, Pages 45-53]
-
Ebrahimi Atani, Reza
A New Ring-Based SPHF and PAKE Protocol On Ideal Lattices [Volume 11, Issue 1, 2019, Pages 75-86]
-
Ebrahimi Atani, Sh.
EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations [Volume 7, Issue 2, 2015, Pages 115-126]
-
Ebrahimi Atani, Shahabaddin
NETRU: A Non-commutative and Secure Variant of CTRU Cryptosystem [Volume 10, Issue 1, 2018, Pages 45-53]
-
Ebrahimi Atani, Shahabaddin
A New Ring-Based SPHF and PAKE Protocol On Ideal Lattices [Volume 11, Issue 1, 2019, Pages 75-86]
-
Ebrahimifard, Mohammad
Android Malware Detection Using One-Class Graph Neural Networks [Volume 14, Issue 3, 2022, Pages 51-60]
-
Ebrahimi Kiasari, Mohammad Ebrahim
A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem [Volume 15, Issue 1, 2023, Pages 125-135]
-
E. Cordeiro Junior, Joel
A Fair Power Allocation for Non-Orthogonal Multiple Access in the Power Domain [Volume 11, Issue 3, 2019, Pages 123-130]
-
Eghlidos, T.
Improving the Rao-Nam secret key cryptosystem using regular EDF-QC-LDPC codes [Volume 4, Issue 1, 2012, Pages 3-14]
-
Eghlidos, T.
On the design and security of a lattice-based threshold secret sharing scheme [Volume 8, Issue 1, 2016, Pages 25-38]
-
Eghlidos, T.
An efficient secure channel coding scheme based on polar codes [Volume 9, Issue 2, 2017, Pages 111-118]
-
Eghlidos, Taraneh
Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon’s Algorithm [Volume 15, Issue 1, 2023, Pages 83-95]
-
Elmahdy, Hesham
Medical Image Compression Based on Region of Interest [Volume 11, Issue 3, 2019, Pages 29-34]
-
Erfan, Mina
File Fragment Type Classification by Bag-Of-Visual-Words [Volume 13, Issue 2, 2021, Pages 101-116]
-
Esaid, Abdllkader
A Hybrid Encryption Algorithm for Mitigating the Effects of Attacks in Ad Hoc Networks [Volume 12, Issue 3, 2020, Pages 19-27]
-
Eshghi, M.
Image encryption based on chaotic tent map in time and frequency domains [Volume 5, Issue 1, 2013, Pages 97-110]
-
Eskandari, Zahra
Extension of Cube Attack with Probabilistic Equations and its Application on Cryptanalysis of KATAN Cipher [Volume 12, Issue 1, 2020, Pages 1-12]
-
Eslami, Ziba
Blind Multipurpose Image Watermarking with Perfect Security [Volume 13, Issue 2, 2021, Pages 145-156]
-
Esmaeili, J.
Access control in ultra-large-scale systems using a data-centric middleware [Volume 6, Issue 1, 2014, Pages 3-22]
-
Etemadi Borujeni, Shahram
Hardware Trojan Prevention and Detection by Filling Unused Space Using Shift registers, Gate-chain and Extra Routing [Volume 13, Issue 1, 2021, Pages 47-57]
-
Etemadi Borujeni, Shahram
An Obfuscation Method Based on CFGLUTs for Security of FPGAs [Volume 13, Issue 2, 2021, Pages 157-162]
-
Ezhei, M.
GTrust: a group based trust model [Volume 5, Issue 2, 2013, Pages 155-170]
F
-
Faez, K.
Detection of perturbed quantization (PQ) steganography based on empirical matrix [Volume 2, Issue 2, 2010, Pages 119-128]
-
Fanian, A.
A TESLA-based mutual authentication protocol for GSM networks [Volume 1, Issue 1, 2009, Pages 3-15]
-
Fanian, A.
An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks [Volume 2, Issue 2, 2010, Pages 89-105]
-
Fanian, Ali
A Graph-based Online Feature Selection to Improve Detection of New Attacks [Volume 14, Issue 2, 2022, Pages 115-130]
-
Farhadi, H.
Alert correlation and prediction using data mining and HMM [Volume 3, Issue 2, 2011, Pages 77-101]
-
Farhat, F.
Eigenvalues-based LSB steganalysis [Volume 4, Issue 2, 2012, Pages 97-106]
-
Farooq, Umer
Cloud and IoT based Smart Car Parking System by using Mamdani Fuzzy Inference System (MFIS) [Volume 11, Issue 3, 2019, Pages 153-160]
-
Fatima, Areej
Evaluation of Planet Factors of Smart City through Multi-layer Fuzzy Logic (MFL) [Volume 11, Issue 3, 2019, Pages 51-58]
-
Fatima, Areej
An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling [Volume 11, Issue 3, 2019, Pages 145-151]
-
Fazeli, M.
Unauthenticated event detection in wireless sensor networks using sensors co-coverage [Volume 8, Issue 1, 2016, Pages 61-71]
-
Fazeli, M.
Side channel parameter characteristics of code injection attacks [Volume 9, Issue 1, 2017, Pages 17-26]
-
Flifel, Rawan
The Role of Packet Tracer in Learning Wireless Networks and Managing IoT Devices [Volume 11, Issue 3, 2019, Pages 35-38]
-
Fuhrmann, Isabel
Critical Success Factors for Data Virtualization: A Literature Review [Volume 11, Issue 3, 2019, Pages 131-137]
G
-
Ganjavi, R.
A traceable optimistic fair exchange protocol in the standard model [Volume 7, Issue 1, 2015, Pages 3-14]
-
Gee, J.
Security testing of session initiation protocol implementations [Volume 1, Issue 2, 2009, Pages 91-103]
-
Ghaemi Bafghi, A.
A confidence-aware interval-based trust model [Volume 4, Issue 2, 2012, Pages 151-165]
-
Ghaemi Bafghi, A.
Design and formal verification of DZMBE+ [Volume 5, Issue 1, 2013, Pages 37-53]
-
Ghaemi Bafghi, A.
SEIMCHA: a new semantic image CAPTCHA using geometric transformations [Volume 4, Issue 1, 2012, Pages 63-76]
-
Ghaemi Bafghi, Abbas
Extension of Cube Attack with Probabilistic Equations and its Application on Cryptanalysis of KATAN Cipher [Volume 12, Issue 1, 2020, Pages 1-12]
-
Ghaemmaghami, Sh.
Eigenvalues-based LSB steganalysis [Volume 4, Issue 2, 2012, Pages 97-106]
-
Ghaemmaghami, Sh.
Robust multiplicative video watermarking using statistical modeling [Volume 5, Issue 1, 2013, Pages 83-95]
-
Ghaemmaghami, Sh.
An extended feature set for blind image steganalysis in contourlet domain [Volume 6, Issue 2, 2014, Pages 169-181]
-
Gharaee Garakani, Hossein
Anomaly Detection Using SVM as Classifier and Decision Tree for Optimizing Feature Vectors [Volume 11, Issue 2, 2019, Pages 159-171]
-
Ghareh Chamani, Javad
SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing [Volume 11, Issue 1, 2019, Pages 15-34]
-
Ghasemi, S.
GGRA: a grouped gossip-based reputation aggregation algorithm [Volume 7, Issue 1, 2015, Pages 59-74]
-
Ghasemi, Simin
A Trust Based Probabilistic Method for Efficient Correctness Verification in Database Outsourcing [Volume 11, Issue 1, 2019, Pages 3-14]
-
Ghasemi, Simin
IDOT: Black-Box Detection of Access Control Violations in Web Applications [Volume 13, Issue 2, 2021, Pages 117-129]
-
Ghasemi Falavarjani, S.
GGRA: a grouped gossip-based reputation aggregation algorithm [Volume 7, Issue 1, 2015, Pages 59-74]
-
Ghasemzadeh, H.
Toward an energy efficient PKC-based key management system for wireless sensor networks [Volume 6, Issue 1, 2014, Pages 53-66]
-
Ghasemzadeh, H.
Cipher text only attack on speech time scrambling systems using correction of audio spectrogram [Volume 9, Issue 2, 2017, Pages 131-145]
-
Ghazi, Seyed Salar
On the Suitability of Improved TrustChain for Smartphones [Volume 14, Issue 3, 2022, Pages 33-42]
-
Ghiasi, M.
DyVSoR: dynamic malware detection based on extracting patterns from value sets of registers [Volume 5, Issue 1, 2013, Pages 71-82]
-
Gianini, G.
A risk model for cloud processes [Volume 6, Issue 2, 2014, Pages 99-123]
-
Golic', J. Dj.
Moving dispersion method for statistical anomaly detection in intrusion detection systems [Volume 1, Issue 2, 2009, Pages 71-90]
-
Gottlieb, Matthias
Critical Success Factors for Data Virtualization: A Literature Review [Volume 11, Issue 3, 2019, Pages 131-137]
-
Gulliver, T. A.
An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks [Volume 2, Issue 2, 2010, Pages 89-105]
-
Gulliver, T. A.
A TESLA-based mutual authentication protocol for GSM networks [Volume 1, Issue 1, 2009, Pages 3-15]
-
Gutub, A. Abdul-Aziz
High capacity steganography tool for Arabic text using 'Kashida' [Volume 2, Issue 2, 2010, Pages 107-118]
H
-
Habibi, J.
A hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection [Volume 2, Issue 1, 2010, Pages 33-46]
-
Hachem, Elkaber
The Use of Local Sensitive Hashing for E-learner Face Identification [Volume 12, Issue 3, 2020, Pages 1-5]
-
Hadavi, M. A.
Separating indexes from data: a distributed scheme for secure database outsourcing [Volume 3, Issue 2, 2011, Pages 121-133]
-
Hadavi, Mohammad Ali
A Trust Based Probabilistic Method for Efficient Correctness Verification in Database Outsourcing [Volume 11, Issue 1, 2019, Pages 3-14]
-
Hadavi, Mohammad Ali
IDOT: Black-Box Detection of Access Control Violations in Web Applications [Volume 13, Issue 2, 2021, Pages 117-129]
-
Hadavi, Mohammad Ali
Bypassing Web Application Firewalls Using Deep Reinforcement Learning [Volume 14, Issue 2, 2022, Pages 131-145]
-
Hadavi, Mohammad Ali
SecureKV: Secure Searchable Outsourcing of Key-Value Databases to the Public Cloud [Volume 14, Issue 3, 2022, Pages 113-121]
-
Hadian Dehkordi, Massoud
A New Variant of the Winternitz One Time Signature Based on Graded Encoding Schemes [Volume 14, Issue 1, 2022, Pages 1-11]
-
Hadjer, Saadi
Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns [Volume 11, Issue 3, 2019, Pages 9-17]
-
Haghbin, A.
Traceability improvements of a new RFID protocol based on EPC C1 G2 [Volume 8, Issue 2, 2016, Pages 105-114]
-
Hajian Nezhad, J.
Analyzing new features of infected web content in detection of malicious web pages [Volume 9, Issue 2, 2017, Pages 161-181]
-
Hajisoltani, Muhamadali
Secure and Low-Area Implementation of the AES Using FPGA [Volume 14, Issue 3, 2022, Pages 93-99]
-
Haj Seyyed Javadi, Hamid
Providing a Hybrid Cryptography Algorithm for Lightweight Authentication Protocol in RFID with Urban Traffic Usage Case [Volume 13, Issue 1, 2021, Pages 73-85]
-
Haj Seyyed Javadi, Hamid
Privacy Preserving Attribute-Based Encryption with Conjunctive Keyword Search for E-health Records in Cloud [Volume 13, Issue 2, 2021, Pages 87-100]
-
Hakimi, A.
A chaos-based video watermarking algorithm [Volume 4, Issue 1, 2012, Pages 77-86]
-
H. Alaoui, Hachem
The Use of Local Sensitive Hashing for E-learner Face Identification [Volume 12, Issue 3, 2020, Pages 1-5]
-
H. Al-Hemiary, Emad
IoT Protocols Based Fog/Cloud over High Traffic [Volume 11, Issue 3, 2019, Pages 173-180]
-
H. Al-Hemiary, Emad
Virtualized Network Management Laboratory for Educational Purposes [Volume 11, Issue 3, 2019, Pages 181-186]
-
Hamidzadeh, J.
A density based clustering approach to distinguish between web robot and human requests to a web server [Volume 6, Issue 1, 2014, Pages 77-89]
-
Hamzeh, Ali
Ransomware Detection Based on PE Header Using Convolutional Neural Networks [Volume 14, Issue 2, 2022, Pages 181-192]
-
Harati, A.
SEIMCHA: a new semantic image CAPTCHA using geometric transformations [Volume 4, Issue 1, 2012, Pages 63-76]
-
Harris, I. G.
Security testing of session initiation protocol implementations [Volume 1, Issue 2, 2009, Pages 91-103]
-
Hasan, Hayyan
Curious-Monkey: Evolved Monkey for Triggering Malicious Payloads in Android Malware [Volume 13, Issue 2, 2021, Pages 131-143]
-
Hasan, Hayyan Salman
A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware [Volume 15, Issue 1, 2023, Pages 59-71]
-
Hasan, Sami
Suspended Stripline Low-pass Filter Design for Wide Stopband Attenuation Applications [Volume 12, Issue 3, 2020, Pages 7-12]
-
Hasan, Sami
Indexed View Technique to Speed-up Data Warehouse Query Processing [Volume 12, Issue 3, 2020, Pages 81-85]
-
Hashemi, M. R.
Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach [Volume 4, Issue 2, 2012, Pages 125-136]
-
Hasheminasab, Seyed Alireza
Interdependent Security Game Design over Constrained Linear Influence Networks [Volume 11, Issue 2, 2019, Pages 95-111]
-
Hassan, Zaira
Aspect Oriented UML to ECORE Model Transformation [Volume 11, Issue 3, 2019, Pages 97-103]
-
Hassan Ahmed, Omed
Face Recognition Based Rank Reduction SVD Approach [Volume 11, Issue 3, 2019, Pages 39-50]
-
Hassani, E.
Image encryption based on chaotic tent map in time and frequency domains [Volume 5, Issue 1, 2013, Pages 97-110]
-
Hassani Karbasi, A.
EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations [Volume 7, Issue 2, 2015, Pages 115-126]
-
Hassani Karbasi, A.
NETRU: A Non-commutative and Secure Variant of CTRU Cryptosystem [Volume 10, Issue 1, 2018, Pages 45-53]
-
Hassani Karbasi, Amir
A New Ring-Based SPHF and PAKE Protocol On Ideal Lattices [Volume 11, Issue 1, 2019, Pages 75-86]
-
Hassannejad, H.
Classification of encrypted traffic for applications based on statistical features [Volume 10, Issue 1, 2018, Pages 29-43]
-
Hemmati, Mojtaba
Bypassing Web Application Firewalls Using Deep Reinforcement Learning [Volume 14, Issue 2, 2022, Pages 131-145]
-
Hidouci, Walid Khaled
Considering Uncertainty in Modeling Historical Knowledge [Volume 11, Issue 3, 2019, Pages 59-65]
-
Hooshmand, R.
Improving the Rao-Nam secret key cryptosystem using regular EDF-QC-LDPC codes [Volume 4, Issue 1, 2012, Pages 3-14]
-
Hosiny Nezhad, S.Ehsan
Relaxed Differential Fault Analysis of SHA-3 [Volume 11, Issue 2, 2019, Pages 129-143]
-
Hosseintalaee, Hamed
A Time Randomization-Based Countermeasure Against the Template Side-Channel Attack [Volume 14, Issue 1, 2022, Pages 47-55]
-
Hryniuk, Yaroslav
Algebraic Matching of Vulnerabilities in a Low-Level Code [Volume 11, Issue 3, 2019, Pages 1-7]
-
Hsiao, Sh. P.
Security testing of session initiation protocol implementations [Volume 1, Issue 2, 2009, Pages 91-103]
I
-
Ibrahim, Dina
Proposed ST-Slotted-CS-ALOHA Protocol for Time Saving and Collision Avoidance [Volume 11, Issue 3, 2019, Pages 67-72]
-
Ibrahim, Renad
Secure Coding Guidelines — Python [Volume 13, Issue 3, 2021, Pages 31-38]
-
Ibrahim, Soran
A Sudy on Information Privacy Issue on Social Networks [Volume 11, Issue 3, 2019, Pages 19-27]
-
Imani, M.
Phishing website detection using weighted feature line embedding [Volume 9, Issue 2, 2017, Pages 147-159]
J
-
Jafarian, J. H.
CAMAC: a context-aware mandatory access control model [Volume 1, Issue 1, 2009, Pages 35-54]
-
Jahanbani, Mohsen
CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking [Volume 12, Issue 2, 2020, Pages 67-80]
-
Jahanian, A.
Security-aware register placement to hinder malicious hardware updating and improve Trojan detectability [Volume 7, Issue 1, 2015, Pages 75-81]
-
Jahanian, A.
Self authentication path insertion in FPGA-based design flow for tamper-resistant purpose [Volume 8, Issue 1, 2016, Pages 53-60]
-
Jahanian, A.
ASIC design protection against reverse engineering during the fabrication process using automatic netlist obfuscation design flow [Volume 8, Issue 2, 2016, Pages 93-104]
-
Jahanian, Ali
Intensive Analysis of Physical Parameters of Power Sensors for Remote Side-Channel Attacks [Volume 13, Issue 2, 2021, Pages 163-176]
-
Jahanian, Ali
A Time Randomization-Based Countermeasure Against the Template Side-Channel Attack [Volume 14, Issue 1, 2022, Pages 47-55]
-
Jalaly Bidgoly, Amir
Lightweight Identification of Android Malware with Knowledge Distillation and Deep Learning Approach [Volume 14, Issue 3, 2022, Pages 81-92]
-
Jalili, R.
Editorial [Volume 5, Issue 1, 2013, Pages 1-3]
-
Jalili, R.
Editorial [Volume 5, Issue 2, 2013, Pages 117-118]
-
Jalili, R.
Editorial [Volume 6, Issue 1, 2014, Pages 1-2]
-
Jalili, R.
Editorial [Volume 6, Issue 2, 2014, Pages 97-98]
-
Jalili, R.
Editorial [Volume 1, Issue 1, 2009, Pages 1-2]
-
Jalili, R.
Editorial [Volume 1, Issue 2, 2009, Pages 69-70]
-
Jalili, R.
Editorial [Volume 2, Issue 1, 2010, Pages 1-2]
-
Jalili, R.
Editorial [Volume 2, Issue 2, 2010, Pages 67-68]
-
Jalili, R.
Editorial [Volume 3, Issue 1, 2011, Pages 1-2]
-
Jalili, R.
Editorial [Volume 3, Issue 2, 2011, Pages 67-68]
-
Jalili, R.
Separating indexes from data: a distributed scheme for secure database outsourcing [Volume 3, Issue 2, 2011, Pages 121-133]
-
Jalili, R.
Editorial [Volume 4, Issue 1, 2012, Pages 1-2]
-
Jalili, R.
Editorial [Volume 7, Issue 1, 2015, Pages 1-2]
-
Jalili, R.
Editorial [Volume 7, Issue 2, 2015, Pages 89-90]
-
Jalili, R.
A collusion mitigation scheme for reputation systems [Volume 7, Issue 2, 2015, Pages 151-166]
-
Jalili, R.
Editorial [Volume 4, Issue 2, 2012, Pages 95-96]
-
Jalili, R.
Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version) [Volume 10, Issue 2, 2018, Pages 129-139]
-
Jalili, Rasool
SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing [Volume 11, Issue 1, 2019, Pages 15-34]
-
Jalili, S.
A particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs [Volume 2, Issue 1, 2010, Pages 13-32]
-
Jalili, S.
A novel local search method for microaggregation [Volume 7, Issue 1, 2015, Pages 15-26]
-
Jalili, Saeed
File Fragment Type Classification by Bag-Of-Visual-Words [Volume 13, Issue 2, 2021, Pages 101-116]
-
James, Salome
An Efficient Pairing-Free Identity Based Proxy Blind Signature Scheme with Message Recovery [Volume 13, Issue 1, 2021, Pages 59-72]
-
Jannati, Hoda
Location Privacy Preservation for Secondary Users in a Database-Driven Cognitive Radio Network [Volume 14, Issue 2, 2022, Pages 215-227]
-
Javadi, A.
A semantic-aware role-based access control model for pervasive computing environments [Volume 5, Issue 2, 2013, Pages 119-140]
-
J.F. Alenazi, Mohammed
Evaluating Multipath TCP Resilience against Link Failures [Volume 11, Issue 3, 2019, Pages 113-122]
-
J.F. Alenazi, Mohammed
Modeling a Cloud-Based Smart Parking WLAN Networks Using IEEE802.11AC Technology [Volume 12, Issue 3, 2020, Pages 101-109]
K
-
K. Almazmomi, Najah
Knowledge Discovery in Cloud-Computing Environment and the Challenges [Volume 12, Issue 3, 2020, Pages 95-99]
-
Kamarei, M.
Unauthenticated event detection in wireless sensor networks using sensors co-coverage [Volume 8, Issue 1, 2016, Pages 61-71]
-
Kanwal, Asma
Cloud and IoT based Smart Car Parking System by using Mamdani Fuzzy Inference System (MFIS) [Volume 11, Issue 3, 2019, Pages 153-160]
-
Karampour, Afshin
Light-Weight Privacy-Preserving Data Aggregation Protocols in Smart Grid Metering Networks [Volume 14, Issue 3, 2022, Pages 101-112]
-
Karim, Mohammed
The Use of Local Sensitive Hashing for E-learner Face Identification [Volume 12, Issue 3, 2020, Pages 1-5]
-
Kaya, Tugberk
The Impact of The Biometric System on Election Fraud Elimination: Case of The North of IRAQ [Volume 11, Issue 3, 2019, Pages 195-207]
-
Kaykha, M.
Side channel parameter characteristics of code injection attacks [Volume 9, Issue 1, 2017, Pages 17-26]
-
Keshavarz-Haddad, A. R.
LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring [Volume 9, Issue 1, 2017, Pages 27-39]
-
Khalesi, A.
A new method for accelerating impossible differential cryptanalysis and its application on LBlock [Volume 8, Issue 1, 2016, Pages 73-84]
-
Khamis, Sufian
Towards Measuring the Project Management Process During Large Scale Software System Implementation Phase [Volume 11, Issue 3, 2019, Pages 161-172]
-
Khansari, M.
Alert correlation and prediction using data mining and HMM [Volume 3, Issue 2, 2011, Pages 77-101]
-
Khatter, Ehab
Proposed ST-Slotted-CS-ALOHA Protocol for Time Saving and Collision Avoidance [Volume 11, Issue 3, 2019, Pages 67-72]
-
Khazaei, Sh.
On the computational complexity of finding a minimal basis for the guess and determine attack [Volume 9, Issue 2, 2017, Pages 101-110]
-
Kheiri, Hossein
Modified Sliding-Mode Control Method for Synchronization a Class of Chaotic Fractional-Order Systems with Application in Encryption [Volume 12, Issue 1, 2020, Pages 55-66]
-
Khoshhalpour, E.
BotRevealer: Behavioral Detection of Botnets based on Botnet Life-cycle [Volume 10, Issue 1, 2018, Pages 55-61]
-
Khosravi, Ali
Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon’s Algorithm [Volume 15, Issue 1, 2023, Pages 83-95]
-
Kordi, Farshideh
A Time Randomization-Based Countermeasure Against the Template Side-Channel Attack [Volume 14, Issue 1, 2022, Pages 47-55]
-
Krcmar, Helmut
Critical Success Factors for Data Virtualization: A Literature Review [Volume 11, Issue 3, 2019, Pages 131-137]
-
Kuchaki Rafsanjani, M.
Optimizing image steganography by combining the GA and ICA [Volume 7, Issue 1, 2015, Pages 47-58]
-
Kumar Das, Ashok
A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications [Volume 11, Issue 2, 2019, Pages 113-128]
-
Kumari, Saru
A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications [Volume 11, Issue 2, 2019, Pages 113-128]
L
-
Labafniya, Mansoureh
An Obfuscation Method Based on CFGLUTs for Security of FPGAs [Volume 13, Issue 2, 2021, Pages 157-162]
-
Labbafniya, Mansoureh
Secure FPGA Design by Filling Unused Spaces [Volume 11, Issue 1, 2019, Pages 47-56]
-
Labbafniya, Mansoureh
Hardware Trojan Prevention and Detection by Filling Unused Space Using Shift registers, Gate-chain and Extra Routing [Volume 13, Issue 1, 2021, Pages 47-57]
-
L. Abdulsattar, Oula
Virtualized Network Management Laboratory for Educational Purposes [Volume 11, Issue 3, 2019, Pages 181-186]
-
Lamniai, Imad
The Establishment of a Distance Training Device within the Regional Center of the Taza Education and Training: Administrative Cycle Case [Volume 12, Issue 3, 2020, Pages 87-93]
-
Letychevskyi, Oleksandr
Algebraic Matching of Vulnerabilities in a Low-Level Code [Volume 11, Issue 3, 2019, Pages 1-7]
-
Lu, Joan
Face Recognition Based Rank Reduction SVD Approach [Volume 11, Issue 3, 2019, Pages 39-50]
M
-
Mabuto, E. K.
Analyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications [Volume 4, Issue 2, 2012, Pages 137-150]
-
Madian, Ahmed
Medical Image Compression Based on Region of Interest [Volume 11, Issue 3, 2019, Pages 29-34]
-
Mafakheri, B.
An efficient secure channel coding scheme based on polar codes [Volume 9, Issue 2, 2017, Pages 111-118]
-
Mahdavi, E.
Classification of encrypted traffic for applications based on statistical features [Volume 10, Issue 1, 2018, Pages 29-43]
-
Mahdavi, M.
Steganalysis of embedding in difference of image pixel pairs by neural network [Volume 1, Issue 1, 2009, Pages 17-26]
-
Mahdavi, M.
An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks [Volume 10, Issue 1, 2018, Pages 15-27]
-
Mahdavi, Mojtaba
Hierarchical Deterministic Wallets for Secure Steganography in Blockchain [Volume 15, Issue 1, 2023, Pages 73-81]
-
Mahdavi Oliaee, M.
On the Security of O-PSI: A Delegated Private Set Intersection on Outsourced Datasets (Extended Version) [Volume 10, Issue 2, 2018, Pages 117-127]
-
Mahmoodi Rishakani, Akbar
Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives [Volume 11, Issue 1, 2019, Pages 35-46]
-
Mahmoudzadeh Niknam, Majid
Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants [Volume 12, Issue 1, 2020, Pages 13-23]
-
Maimani, Hamidreza
Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives [Volume 11, Issue 1, 2019, Pages 35-46]
-
Malekian, E.
QTRU: quaternionic version of the NTRU public-key cryptosystems [Volume 3, Issue 1, 2011, Pages 29-42]
-
M. Al-Joboury, Istabraq
IoT Protocols Based Fog/Cloud over High Traffic [Volume 11, Issue 3, 2019, Pages 173-180]
-
M. Al-Kadhimi, Aymen
Suspended Stripline Low-pass Filter Design for Wide Stopband Attenuation Applications [Volume 12, Issue 3, 2020, Pages 7-12]
-
Manavi, Farnoush
Ransomware Detection Based on PE Header Using Convolutional Neural Networks [Volume 14, Issue 2, 2022, Pages 181-192]
-
Mansuri, D.
A new method for accelerating impossible differential cryptanalysis and its application on LBlock [Volume 8, Issue 1, 2016, Pages 73-84]
-
Marvasti, F.
A survey on digital data hiding schemes: principals, algorithms, and applications [Volume 5, Issue 1, 2013, Pages 5-36]
-
Mashatan, A.
QTRU: quaternionic version of the NTRU public-key cryptosystems [Volume 3, Issue 1, 2011, Pages 29-42]
-
Mashhadi, S.
Computationally secure multiple secret sharing: models, schemes, and formal security analysis [Volume 7, Issue 2, 2015, Pages 91-99]
-
Masjedi, Peyman
A Binary Relevance Adaptive Model-Selection for Ensemble Steganalysis [Volume 14, Issue 1, 2022, Pages 105-113]
-
Mattox, S.
Security testing of session initiation protocol implementations [Volume 1, Issue 2, 2009, Pages 91-103]
-
Mazaheri, Mohammad Erfan
A Study of Timing Side-Channel Attacks and Countermeasures on JavaScript and WebAssembly [Volume 14, Issue 1, 2022, Pages 27-46]
-
Mazouak, Abderrazak
The Establishment of a Distance Training Device within the Regional Center of the Taza Education and Training: Administrative Cycle Case [Volume 12, Issue 3, 2020, Pages 87-93]
-
Mehrara, H.
Cipher text only attack on speech time scrambling systems using correction of audio spectrogram [Volume 9, Issue 2, 2017, Pages 131-145]
-
Mehrdad, A.R.
Impossible Differential Cryptanalysis on Deoxys-BC-256 [Volume 10, Issue 2, 2018, Pages 93-105]
-
Mehrnejad, M.
SEIMCHA: a new semantic image CAPTCHA using geometric transformations [Volume 4, Issue 1, 2012, Pages 63-76]
-
Memon, Muhammad Ali
Aspect Oriented UML to ECORE Model Transformation [Volume 11, Issue 3, 2019, Pages 97-103]
-
Meraji, Vahid
Evict+Time Attack on Intel CPUs without Explicit Knowledge of Address Offsets [Volume 13, Issue 1, 2021, Pages 19-27]
-
M. Ibrahim, Dina
A Review Study on SQL Injection Attacks, Prevention, and Detection [Volume 13, Issue 3, 2021, Pages 1-10]
-
M. Ibrahim, Dina
Data Enhancement for Date Fruit Classification Using DCGAN [Volume 13, Issue 3, 2021, Pages 39-48]
-
M. Ibrahim, Dina
Open Web Application Security Project Components with Known Vulnerabilities: A Comprehensive Study [Volume 13, Issue 3, 2021, Pages 59-67]
-
M.Ibrahim, Dina
Broken Authentication and Session Management Vulnerabilities [Volume 13, Issue 3, 2021, Pages 11-19]
-
M.Ibrahim, Dina
Cross Site Scripting Attack Review [Volume 13, Issue 3, 2021, Pages 21-30]
-
Mirghadri, Abdolrasoul
A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem [Volume 15, Issue 1, 2023, Pages 125-135]
-
Miri, A.
A centralized privacy-preserving framework for online social networks [Volume 6, Issue 1, 2014, Pages 35-52]
-
Miri, A.
A collusion attack on the fuzzy vault scheme [Volume 1, Issue 1, 2009, Pages 27-34]
-
Mirmohseni, M.
Traceability improvements of a new RFID protocol based on EPC C1 G2 [Volume 8, Issue 2, 2016, Pages 105-114]
-
Mirzaee Shamsabad, Mohammad Reza
Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives [Volume 11, Issue 1, 2019, Pages 35-46]
-
Mirzaei, Arash
4n × 4n Diffusion Layers Based on Multiple 4 × 4 MDS Matrices [Volume 15, Issue 1, 2023, Pages 111-124]
-
M. J. Al Taleb, Talib
Indexed View Technique to Speed-up Data Warehouse Query Processing [Volume 12, Issue 3, 2020, Pages 81-85]
-
Moazami, F.
On the computational complexity of finding a minimal basis for the guess and determine attack [Volume 9, Issue 2, 2017, Pages 101-110]
-
Moazami, F.
Impossible Differential Cryptanalysis on Deoxys-BC-256 [Volume 10, Issue 2, 2018, Pages 93-105]
-
Moazami Goudarzi, Mohammad Reza
Providing a Hybrid Cryptography Algorithm for Lightweight Authentication Protocol in RFID with Urban Traffic Usage Case [Volume 13, Issue 1, 2021, Pages 73-85]
-
Modiri, Mohammad Mahdi
GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication [Volume 12, Issue 2, 2020, Pages 101-111]
-
Moghissi, Gholam Reza
Better Sampling Method of Enumeration Solution for BKZ-Simulation [Volume 13, Issue 2, 2021, Pages 177-208]
-
Mohajeri, J.
Cryptanalysis of GSM encryption algorithm A5/1 [Volume 4, Issue 2, 2012, Pages 107-114]
-
Mohajeri, J.
Double voter perceptible blind signature based electronic voting protocol [Volume 3, Issue 1, 2011, Pages 43-50]
-
Mohajeri, J.
On the multi _ chi-square tests and their data complexity [Volume 4, Issue 1, 2012, Pages 15-24]
-
Mohajeri, J.
Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher (Extended Version) [Volume 10, Issue 1, 2018, Pages 3-13]
-
Mohajeri, J.
On the Security of O-PSI: A Delegated Private Set Intersection on Outsourced Datasets (Extended Version) [Volume 10, Issue 2, 2018, Pages 117-127]
-
Mohajeri, Javad
Biclique Cryptanalysis of Block Ciphers LBlock and TWINE-80 with Practical Data Complexity [Volume 11, Issue 1, 2019, Pages 57-74]
-
Mohajeri, Javad
GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication [Volume 12, Issue 2, 2020, Pages 101-111]
-
Mohajeri, Javad
Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT [Volume 15, Issue 1, 2023, Pages 97-110]
-
Mohammadhassanzadeh, H.
Prediction of user's trustworthiness in web-based social networks via text mining [Volume 5, Issue 2, 2013, Pages 171-187]
-
Mohammadi, S.
A chaos-based video watermarking algorithm [Volume 4, Issue 1, 2012, Pages 77-86]
-
Mohammadi, Shahriar
Anomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism [Volume 12, Issue 1, 2020, Pages 44-54]
-
Mohammadrezaei, Mohammad Reza
Detection of Fake Accounts in Social Networks Based on One Class Classification [Volume 11, Issue 2, 2019, Pages 173-183]
-
Mohammadzadeh, Naser
Anomaly Detection Using SVM as Classifier and Decision Tree for Optimizing Feature Vectors [Volume 11, Issue 2, 2019, Pages 159-171]
-
Mohseni-Ejiyeh, A.
An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks [Volume 10, Issue 1, 2018, Pages 15-27]
-
Mollamotalebi, Mahdi
F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management [Volume 12, Issue 2, 2020, Pages 113-128]
-
Monqith, Mais
Evaluation of a Wireless ZigBee with PID Controller for Networked Control System Using True Time Toolbox [Volume 12, Issue 3, 2020, Pages 13-17]
-
Montazer, Gh. A.
Phishing website detection using weighted feature line embedding [Volume 9, Issue 2, 2017, Pages 147-159]
-
Mortazavi, A.
Double voter perceptible blind signature based electronic voting protocol [Volume 3, Issue 1, 2011, Pages 43-50]
-
Mortazavi, A.
A new security proof for FMNV continuous non-malleable encoding scheme [Volume 9, Issue 1, 2017, Pages 41-51]
-
Mortazavi, R.
A novel local search method for microaggregation [Volume 7, Issue 1, 2015, Pages 15-26]
-
Mortazavi, Reza
Improved Univariate Microaggregation for Integer Values [Volume 12, Issue 1, 2020, Pages 35-43]
-
Mosanaei Boorani, hatameh
A Trusted Design Platform for Trojan Detection in FPGA Bitstreams Using Partial Reconfiguration [Volume 13, Issue 1, 2021, Pages 29-45]
-
Movaghar, A.
A two-phase wormhole attack detection scheme in MANETs [Volume 6, Issue 2, 2014, Pages 183-191]
-
Mozafari, Somayeh
Lightweight Identification of Android Malware with Knowledge Distillation and Deep Learning Approach [Volume 14, Issue 3, 2022, Pages 81-92]
-
Mozaffari, S.
Improving security of double random phase encoding with chaos theory using fractal images [Volume 4, Issue 2, 2012, Pages 115-124]
-
Mustapha C.E., Yagoub
Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns [Volume 11, Issue 3, 2019, Pages 9-17]
N
-
Naderi, Bashir
Modified Sliding-Mode Control Method for Synchronization a Class of Chaotic Fractional-Order Systems with Application in Encryption [Volume 12, Issue 1, 2020, Pages 55-66]
-
Najafi, Aniseh
Privacy Preserving Attribute-Based Encryption with Conjunctive Keyword Search for E-health Records in Cloud [Volume 13, Issue 2, 2021, Pages 87-100]
-
Namadchian, Amin
Anomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism [Volume 12, Issue 1, 2020, Pages 44-54]
-
Nazari, Mojtaba
A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem [Volume 15, Issue 1, 2023, Pages 125-135]
-
Nemati, H.
Private Key based query on encrypted data [Volume 4, Issue 1, 2012, Pages 41-50]
-
Nickabadi, Ahmad
Business-Layer Session Puzzling Racer: Dynamic Security Testing Against Session Puzzling Race Conditions in Business Layer [Volume 14, Issue 1, 2022, Pages 83-104]
-
Niknafs, M.
A collusion mitigation scheme for reputation systems [Volume 7, Issue 2, 2015, Pages 151-166]
-
Niknafs, Mina
A Trust Based Probabilistic Method for Efficient Correctness Verification in Database Outsourcing [Volume 11, Issue 1, 2019, Pages 3-14]
-
Nikooghadam, M.
An efficient blind signature scheme based on the elliptic curve discrete logarithm problem [Volume 1, Issue 2, 2009, Pages 125-131]
-
Nizamani, Muhammad Ali
Aspect Oriented UML to ECORE Model Transformation [Volume 11, Issue 3, 2019, Pages 97-103]
-
Nooribakhsh, Mahsa
F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management [Volume 12, Issue 2, 2020, Pages 113-128]
-
Norozi, Zynolabedin
CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking [Volume 12, Issue 2, 2020, Pages 67-80]
-
Nowroozi, Alireza
Business-Layer Session Puzzling Racer: Dynamic Security Testing Against Session Puzzling Race Conditions in Business Layer [Volume 14, Issue 1, 2022, Pages 83-104]
-
Nowroozi, A.R.
A Survey of Anomaly Detection Approaches in Internet of Things [Volume 10, Issue 2, 2018, Pages 79-92]
O
-
Oraei, Hossein
A New Variant of the Winternitz One Time Signature Based on Graded Encoding Schemes [Volume 14, Issue 1, 2022, Pages 1-11]
P
-
Pakniat, Nasrollah
A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem [Volume 15, Issue 1, 2023, Pages 125-135]
-
Palanki, Sajjad
Attribute-Based Encryption with Efficient Attribute Revocation, Decryption Outsourcing, and Multi-Keyword Searching in Cloud Storage [Volume 14, Issue 3, 2022, Pages 135-149]
-
Palominos, Fredi
Cognitive Strategic Model applied to a Port System [Volume 11, Issue 3, 2019, Pages 73-78]
-
Papadopoulos, Dimitrios
SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing [Volume 11, Issue 1, 2019, Pages 15-34]
-
Park, T.
Security testing of session initiation protocol implementations [Volume 1, Issue 2, 2009, Pages 91-103]
-
Patil, Dharmaraj Rajaram
Feature-based Malicious URL and attack type detection using multi-class classification [Volume 10, Issue 2, 2018, Pages 141-162]
-
Patil, Jayantrao
Feature-based Malicious URL and attack type detection using multi-class classification [Volume 10, Issue 2, 2018, Pages 141-162]
-
Patooghy, A.
Unauthenticated event detection in wireless sensor networks using sensors co-coverage [Volume 8, Issue 1, 2016, Pages 61-71]
-
Patooghy, A.
Side channel parameter characteristics of code injection attacks [Volume 9, Issue 1, 2017, Pages 17-26]
-
Payandeh, A.
Toward an energy efficient PKC-based key management system for wireless sensor networks [Volume 6, Issue 1, 2014, Pages 53-66]
-
Payandeh, Ali
Better Sampling Method of Enumeration Solution for BKZ-Simulation [Volume 13, Issue 2, 2021, Pages 177-208]
-
Pencheva, Evelina
Access and Mobility Policy Control at the Network Edge [Volume 11, Issue 3, 2019, Pages 105-111]
-
Pericherla, Suryateja Satya
Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art [Volume 15, Issue 1, 2023, Pages 1-58]
-
Peschanenko, Volodymyr
Algebraic Matching of Vulnerabilities in a Low-Level Code [Volume 11, Issue 3, 2019, Pages 1-7]
-
Pilaram, H.
On the design and security of a lattice-based threshold secret sharing scheme [Volume 8, Issue 1, 2016, Pages 25-38]
-
Pilaram, H.
An efficient secure channel coding scheme based on polar codes [Volume 9, Issue 2, 2017, Pages 111-118]
-
Pilevar Moakhar, Sahar
On the Suitability of Improved TrustChain for Smartphones [Volume 14, Issue 3, 2022, Pages 33-42]
-
Pishgoo, B.
STLR: a novel danger theory based structural TLR algorithm [Volume 5, Issue 2, 2013, Pages 209-225]
-
Poon, H. T.
A collusion attack on the fuzzy vault scheme [Volume 1, Issue 1, 2009, Pages 27-34]
-
Porkar, Maryam
Practical Differential Fault Analysis on SKINNY [Volume 14, Issue 3, 2022, Pages 9-19]
-
Pourpouneh, M.
Double voter perceptible blind signature based electronic voting protocol [Volume 3, Issue 1, 2011, Pages 43-50]
-
Pourpouneh, M.
A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving [Volume 8, Issue 1, 2016, Pages 3-24]
-
Pourpouneh, M.
A Decentralized Online Sortition Protocol [Volume 10, Issue 1, 2018, Pages 63-69]
R
-
Radchenko, Viktor
Algebraic Matching of Vulnerabilities in a Low-Level Code [Volume 11, Issue 3, 2019, Pages 1-7]
-
Rahmani, Amir Masoud
Detection of Fake Accounts in Social Networks Based on One Class Classification [Volume 11, Issue 2, 2019, Pages 173-183]
-
Rajabzadeh Asaar, M.
Convertible limited (multi-) verifier signature: new constructions and applications [Volume 5, Issue 2, 2013, Pages 189-208]
-
Rajabzadeh Asaar, M.
Double voter perceptible blind signature based electronic voting protocol [Volume 3, Issue 1, 2011, Pages 43-50]
-
Rajabzadeh Asaar, M.
A traceable optimistic fair exchange protocol in the standard model [Volume 7, Issue 1, 2015, Pages 3-14]
-
Rajabzadeh Assar, Maryam
An Efficient Pairing-Free Identity-Based Certificateless Signcryption [Volume 14, Issue 1, 2022, Pages 69-82]
-
Raji, F.
A centralized privacy-preserving framework for online social networks [Volume 6, Issue 1, 2014, Pages 35-52]
-
Ramezanian, R.
A computational model and convergence theorem for rumor dissemination in social networks [Volume 5, Issue 2, 2013, Pages 141-154]
-
Ramezanian, R.
Process algebraic modeling of authentication protocols for analysis of parallel multi-session executions [Volume 1, Issue 1, 2009, Pages 55-67]
-
Ramezanian, R.
A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving [Volume 8, Issue 1, 2016, Pages 3-24]
-
Ramezanian, R.
A Decentralized Online Sortition Protocol [Volume 10, Issue 1, 2018, Pages 63-69]
-
Ramezanian, R.
Distributed Contingency Logic and Security [Volume 10, Issue 2, 2018, Pages 107-115]
-
Ramzanipour, Hamed
Practical Differential Fault Analysis on SKINNY [Volume 14, Issue 3, 2022, Pages 9-19]
-
Ramzanipour, Hamed
Practical Differential Fault Analysis on CRAFT, a Lightweight Block Cipher [Volume 14, Issue 3, 2022, Pages 21-31]
-
Rashidi, B.
Efficient implementation of low time complexity and pipelined bit-parallel polynomial basis multiplier over binary finite fields [Volume 7, Issue 2, 2015, Pages 101-114]
-
Rashidi, Bahram
Lightweight Cryptographic S-Boxes Based on Efficient Hardware Structures for Block Ciphers [Volume 15, Issue 1, 2023, Pages 137-151]
-
Rasoolzadeh, Sh.
Total break of Zorro using linear and differential attacks [Volume 6, Issue 1, 2014, Pages 23-34]
-
Rasouli, Faeze
Perfect Recovery of Small Tampers Using a Novel Fragile Watermarking Technique Based on Distributed Hamming Code [Volume 14, Issue 2, 2022, Pages 147-156]
-
Rastegari, P.
An efficient certificateless signcryption scheme in the standard model [Volume 9, Issue 1, 2017, Pages 3-16]
-
Rastegari, Parvin
Attacks to Some Recently Proposed CL-SC Schemes and Presenting a Secure Scheme with KSSTIS [Volume 14, Issue 2, 2022, Pages 193-213]
-
Reddy, P.Vasudeva
An Efficient Pairing-Free Identity Based Proxy Blind Signature Scheme with Message Recovery [Volume 13, Issue 1, 2021, Pages 59-72]
-
Reid, J.
Authorization models for secure information sharing: a survey and research agenda [Volume 2, Issue 2, 2010, Pages 69-87]
-
Rezaeian Farashahi, R.
Efficient implementation of low time complexity and pipelined bit-parallel polynomial basis multiplier over binary finite fields [Volume 7, Issue 2, 2015, Pages 101-114]
-
Rezaei Shahmirzdi, A.
Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher (Extended Version) [Volume 10, Issue 1, 2018, Pages 3-13]
-
Rezakhani, Afshin
Providing a Hybrid Cryptography Algorithm for Lightweight Authentication Protocol in RFID with Urban Traffic Usage Case [Volume 13, Issue 1, 2021, Pages 73-85]
-
Rezapour, T. Y.
A novel key management scheme for heterogeneous sensor networks based on the position of nodes [Volume 8, Issue 2, 2016, Pages 115-130]
-
Rijmen, V.
Stream ciphers and the eSTREAM project [Volume 2, Issue 1, 2010, Pages 3-11]
-
Rogaway, P.
Constructing cryptographic definitions [Volume 3, Issue 2, 2011, Pages 69-76]
S
-
Saad, Mohamed
Medical Image Compression Based on Region of Interest [Volume 11, Issue 3, 2019, Pages 29-34]
-
Sabeti, V.
Steganalysis of embedding in difference of image pixel pairs by neural network [Volume 1, Issue 1, 2009, Pages 17-26]
-
Sabeti, Vajiheh
New High Secure Network Steganography Method Based on Packet Length [Volume 12, Issue 1, 2020, Pages 24-44]
-
Sabeti, Vajiheh
Secure and Imperceptible Image Steganography in Discrete Wavelet Transform Using the XOR Logical Function and Genetic Algorithm [Volume 14, Issue 2, 2022, Pages 167-179]
-
Sabzinejad Farash, M.
Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC [Volume 5, Issue 1, 2013, Pages 55-70]
-
Sadat Emami, S.
A context-sensitive dynamic role-based access control model for pervasive computing environments [Volume 2, Issue 1, 2010, Pages 47-66]
-
Sadeghi, A.A
Dwarf Frankenstein is still in your memory: tiny code reuse attacks [Volume 9, Issue 1, 2017, Pages 53-72]
-
Sadeghi, F.
Optimizing image steganography by combining the GA and ICA [Volume 7, Issue 1, 2015, Pages 47-58]
-
Sadeghi, H.
Cryptanalysis of some first round CAESAR candidates [Volume 7, Issue 2, 2015, Pages 127-134]
-
Sadeghi, Sadegh
Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants [Volume 12, Issue 1, 2020, Pages 13-23]
-
Sadrnezhad, Z.
Analyzing new features of infected web content in detection of malicious web pages [Volume 9, Issue 2, 2017, Pages 161-181]
-
Saeed, Anwar
An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling [Volume 11, Issue 3, 2019, Pages 145-151]
-
Saeed, Yousaf
Cloud and IoT based Smart Car Parking System by using Mamdani Fuzzy Inference System (MFIS) [Volume 11, Issue 3, 2019, Pages 153-160]
-
Saeed Ali, Twana
The Impact of The Biometric System on Election Fraud Elimination: Case of The North of IRAQ [Volume 11, Issue 3, 2019, Pages 195-207]
-
Saeedi Sadr, Maryam
SecureKV: Secure Searchable Outsourcing of Key-Value Databases to the Public Cloud [Volume 14, Issue 3, 2022, Pages 113-121]
-
Saeidi, Roghaye
Secure FPGA Design by Filling Unused Spaces [Volume 11, Issue 1, 2019, Pages 47-56]
-
Saeidi, Roghaye
Hardware Trojan Prevention and Detection by Filling Unused Space Using Shift registers, Gate-chain and Extra Routing [Volume 13, Issue 1, 2021, Pages 47-57]
-
Safaei Pour, M.
A new CPA resistant software implementation for symmetric ciphers with smoothed power consumption: SIMON case study [Volume 9, Issue 2, 2017, Pages 119-130]
-
Safarzadeh, M.
An automatic test case generator for evaluating implementation of access control policies [Volume 9, Issue 1, 2017, Pages 73-91]
-
Safkhani, M.
A note on the security of two improved RFID protocols [Volume 8, Issue 2, 2016, Pages 155-160]
-
Safkhani, Masoumeh
Relaxed Differential Fault Analysis of SHA-3 [Volume 11, Issue 2, 2019, Pages 129-143]
-
Saidi, H.
Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach [Volume 4, Issue 2, 2012, Pages 125-136]
-
Saidi, H.
An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks [Volume 2, Issue 2, 2010, Pages 89-105]
-
Sajadieh, Mahdi
4n × 4n Diffusion Layers Based on Multiple 4 × 4 MDS Matrices [Volume 15, Issue 1, 2023, Pages 111-124]
-
Sajjadi Ghaemmaghami, S.
Traceability improvements of a new RFID protocol based on EPC C1 G2 [Volume 8, Issue 2, 2016, Pages 105-114]
-
Salami, Zeinab
Location Privacy Preservation for Secondary Users in a Database-Driven Cognitive Radio Network [Volume 14, Issue 2, 2022, Pages 215-227]
-
Salarifard, Raziyeh
Secure and Low-Area Implementation of the AES Using FPGA [Volume 14, Issue 3, 2022, Pages 93-99]
-
S. Albulayhi, Mohammed
Open Web Application Security Project Components with Known Vulnerabilities: A Comprehensive Study [Volume 13, Issue 3, 2021, Pages 59-67]
-
Salehi, Z.
DyVSoR: dynamic malware detection based on extracting patterns from value sets of registers [Volume 5, Issue 1, 2013, Pages 71-82]
-
S. Alencar, Marcelo
A Fair Power Allocation for Non-Orthogonal Multiple Access in the Power Domain [Volume 11, Issue 3, 2019, Pages 123-130]
-
S. Alencar, Marcelo
A New Derivation of the Leftover Hash Lemma [Volume 12, Issue 3, 2020, Pages 55-58]
-
Salim, F.
Authorization models for secure information sharing: a survey and research agenda [Volume 2, Issue 2, 2010, Pages 69-87]
-
Salimian, Milad
Intensive Analysis of Physical Parameters of Power Sensors for Remote Side-Channel Attacks [Volume 13, Issue 2, 2021, Pages 163-176]
-
Salmasizadeh, M.
Convertible limited (multi-) verifier signature: new constructions and applications [Volume 5, Issue 2, 2013, Pages 189-208]
-
Salmasizadeh, M.
Total break of Zorro using linear and differential attacks [Volume 6, Issue 1, 2014, Pages 23-34]
-
Salmasizadeh, M.
On the multi _ chi-square tests and their data complexity [Volume 4, Issue 1, 2012, Pages 15-24]
-
Salmasizadeh, M.
A traceable optimistic fair exchange protocol in the standard model [Volume 7, Issue 1, 2015, Pages 3-14]
-
Salmasizadeh, M.
A new security proof for FMNV continuous non-malleable encoding scheme [Volume 9, Issue 1, 2017, Pages 41-51]
-
Salmasizadeh, M.
A new CPA resistant software implementation for symmetric ciphers with smoothed power consumption: SIMON case study [Volume 9, Issue 2, 2017, Pages 119-130]
-
Salmasizadeh, M.
Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher (Extended Version) [Volume 10, Issue 1, 2018, Pages 3-13]
-
Salmasizadeh, Mahmoud
GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication [Volume 12, Issue 2, 2020, Pages 101-111]
-
Salmasizadeh, Mahmoud
Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT [Volume 15, Issue 1, 2023, Pages 97-110]
-
Sam, I.Shatheesh
OT-Feature Extraction on Scrambled Images with Instantaneous Clustering for CBIR Scheme in Cloud Computing [Volume 13, Issue 1, 2021, Pages 1-17]
-
Samavi, Sh.
Steganalysis of embedding in difference of image pixel pairs by neural network [Volume 1, Issue 1, 2009, Pages 17-26]
-
Sami, A.
DyVSoR: dynamic malware detection based on extracting patterns from value sets of registers [Volume 5, Issue 1, 2013, Pages 71-82]
-
Saniee Abadeh, M.
A hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection [Volume 2, Issue 1, 2010, Pages 33-46]
-
Sayedi, S. M.
Efficient implementation of low time complexity and pipelined bit-parallel polynomial basis multiplier over binary finite fields [Volume 7, Issue 2, 2015, Pages 101-114]
-
Sayyadabdi, Amirhosein
Towards a Formal Approach for Detection of Vulnerabilities in the Android Permissions System [Volume 14, Issue 3, 2022, Pages 61-69]
-
Sedaghatbaf, A.
Quantitative evaluation of software security: an approach based on UML/SecAM and evidence theory [Volume 8, Issue 2, 2016, Pages 141-153]
-
Seddigh, Milad
Enhanced Flush+Reload Attack on AES [Volume 12, Issue 2, 2020, Pages 81-89]
-
Selvaraj, S.
Security testing of session initiation protocol implementations [Volume 1, Issue 2, 2009, Pages 91-103]
-
Serkani, Elham
Anomaly Detection Using SVM as Classifier and Decision Tree for Optimizing Feature Vectors [Volume 11, Issue 2, 2019, Pages 159-171]
-
Shaaban, Dalia
Medical Image Compression Based on Region of Interest [Volume 11, Issue 3, 2019, Pages 29-34]
-
Shaban Al-Ani, Muzhir
Face Recognition Based Rank Reduction SVD Approach [Volume 11, Issue 3, 2019, Pages 39-50]
-
Shabani, Ahmad
Mutual Lightweight PUF-Based Authentication Scheme Using Random Key Management Mechanism for Resource-Constrained IoT Devices [Volume 14, Issue 3, 2022, Pages 1-8]
-
Shafieinejad, Alireza
Attribute-Based Encryption with Efficient Attribute Revocation, Decryption Outsourcing, and Multi-Keyword Searching in Cloud Storage [Volume 14, Issue 3, 2022, Pages 135-149]
-
Shahgholi Ghahfarokhi, Behrouz
An Auto-Encoder based Membership Inference Attack against Generative Adversarial Network [(Articles in Press)]
-
Shahriari, H. R.
Aggrandizing the beast's limbs: patulous code reuse attack on ARM architecture [Volume 8, Issue 1, 2016, Pages 39-52]
-
Shahriari, H. R.
Prediction of user's trustworthiness in web-based social networks via text mining [Volume 5, Issue 2, 2013, Pages 171-187]
-
Shahriari, H. R.
A hybrid approach for database intrusion detection at transaction and inter-transaction levels [Volume 6, Issue 2, 2014, Pages 155-167]
-
Shahriari, H. R.
BotRevealer: Behavioral Detection of Botnets based on Botnet Life-cycle [Volume 10, Issue 1, 2018, Pages 55-61]
-
Shahriari, H.R.
Dwarf Frankenstein is still in your memory: tiny code reuse attacks [Volume 9, Issue 1, 2017, Pages 53-72]
-
Shahriari, H.R.
A Survey of Anomaly Detection Approaches in Internet of Things [Volume 10, Issue 2, 2018, Pages 79-92]
-
Shaikh, Asadullah
Aspect Oriented UML to ECORE Model Transformation [Volume 11, Issue 3, 2019, Pages 97-103]
-
Shakeri, E.
An extended feature set for blind image steganalysis in contourlet domain [Volume 6, Issue 2, 2014, Pages 169-181]
-
Shakeri, H.
A confidence-aware interval-based trust model [Volume 4, Issue 2, 2012, Pages 151-165]
-
Shamaei, Sh.
A two-phase wormhole attack detection scheme in MANETs [Volume 6, Issue 2, 2014, Pages 183-191]
-
Shams, F.
Access control in ultra-large-scale systems using a data-centric middleware [Volume 6, Issue 1, 2014, Pages 3-22]
-
Sheidani, Sorour
Blind Multipurpose Image Watermarking with Perfect Security [Volume 13, Issue 2, 2021, Pages 145-156]
-
Shekofte, Nastaran
A Trusted Design Platform for Trojan Detection in FPGA Bitstreams Using Partial Reconfiguration [Volume 13, Issue 1, 2021, Pages 29-45]
-
Shirani, Sh.
Steganalysis of embedding in difference of image pixel pairs by neural network [Volume 1, Issue 1, 2009, Pages 17-26]
-
Shiri, Mohammad Ebrahim
Detection of Fake Accounts in Social Networks Based on One Class Classification [Volume 11, Issue 2, 2019, Pages 173-183]
-
Shoaei, Minoo
New High Secure Network Steganography Method Based on Packet Length [Volume 12, Issue 1, 2020, Pages 24-44]
-
Shokrollahi, S.
Access control in ultra-large-scale systems using a data-centric middleware [Volume 6, Issue 1, 2014, Pages 3-22]
-
Shorim, Nada
Hand Gestures Classification with Multi-Core DTW [Volume 11, Issue 3, 2019, Pages 91-96]
-
Shraideh, Marwin
Critical Success Factors for Data Virtualization: A Literature Review [Volume 11, Issue 3, 2019, Pages 131-137]
-
Siavashi, Mohammad
Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems [Volume 12, Issue 2, 2020, Pages 129-140]
-
Singh, Pitam
A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications [Volume 11, Issue 2, 2019, Pages 113-128]
-
S. Jumaa, Shereen
Fuzzy Histogram Equalization and Computer Vision Automated Identification of Microcalcifications in Breast Cancer [Volume 12, Issue 3, 2020, Pages 73-79]
-
Sokiyna, Munsif
Human Activity Recognition Based on Multi-Sensors in a Smart Home Using Deep Learning [Volume 13, Issue 3, 2021, Pages 69-78]
-
Soleimany, H.
Impossible Differential Cryptanalysis on Deoxys-BC-256 [Volume 10, Issue 2, 2018, Pages 93-105]
-
Soleimany, Hadi
Enhanced Flush+Reload Attack on AES [Volume 12, Issue 2, 2020, Pages 81-89]
-
Soleimany, Hadi
Evict+Time Attack on Intel CPUs without Explicit Knowledge of Address Offsets [Volume 13, Issue 1, 2021, Pages 19-27]
-
Soleimany, Hadi
Secure and Low-Area Implementation of the AES Using FPGA [Volume 14, Issue 3, 2022, Pages 93-99]
-
Soltani, N.
Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version) [Volume 10, Issue 2, 2018, Pages 129-139]
-
Soltani, S.
Separating indexes from data: a distributed scheme for secure database outsourcing [Volume 3, Issue 2, 2011, Pages 121-133]
-
Soodkhah Mohammadi, M.
Design and formal verification of DZMBE+ [Volume 5, Issue 1, 2013, Pages 37-53]
T
-
Taghizadeh, M.
An automatic test case generator for evaluating implementation of access control policies [Volume 9, Issue 1, 2017, Pages 73-91]
-
Tahboush, Muhannad
A Hybrid Encryption Algorithm for Mitigating the Effects of Attacks in Ad Hoc Networks [Volume 12, Issue 3, 2020, Pages 19-27]
-
Taheri, M.
Improving security of double random phase encoding with chaos theory using fractal images [Volume 4, Issue 2, 2012, Pages 115-124]
-
Taheri, Mohammad
A Binary Relevance Adaptive Model-Selection for Ensemble Steganalysis [Volume 14, Issue 1, 2022, Pages 105-113]
-
Taheri, Mohammad
Perfect Recovery of Small Tampers Using a Novel Fragile Watermarking Technique Based on Distributed Hamming Code [Volume 14, Issue 2, 2022, Pages 147-156]
-
Taheri Ardakani, Farhad
A Study of Timing Side-Channel Attacks and Countermeasures on JavaScript and WebAssembly [Volume 14, Issue 1, 2022, Pages 27-46]
-
Tajik Khasss, M.
Cipher text only attack on speech time scrambling systems using correction of audio spectrogram [Volume 9, Issue 2, 2017, Pages 131-145]
-
Tam, A.
Security testing of session initiation protocol implementations [Volume 1, Issue 2, 2009, Pages 91-103]
-
Tan, Qing
A Sudy on Information Privacy Issue on Social Networks [Volume 11, Issue 3, 2019, Pages 19-27]
-
Tariq Banday, M.
Image flip CAPTCHA [Volume 1, Issue 2, 2009, Pages 105-123]
-
Tavakoly, A.
Improving Tor security against timing and traffic analysis attacks with fair randomization [Volume 6, Issue 1, 2014, Pages 67-76]
-
Tayarani-N, M.
Analyzing new features of infected web content in detection of malicious web pages [Volume 9, Issue 2, 2017, Pages 161-181]
-
Thumbur, Gowri
An Efficient Pairing-Free Identity Based Proxy Blind Signature Scheme with Message Recovery [Volume 13, Issue 1, 2021, Pages 59-72]
-
Toreini, E.
SEIMCHA: a new semantic image CAPTCHA using geometric transformations [Volume 4, Issue 1, 2012, Pages 63-76]
-
Torki, Omid
Hierarchical Deterministic Wallets for Secure Steganography in Blockchain [Volume 15, Issue 1, 2023, Pages 73-81]
-
Tork Ladani, B.
GTrust: a group based trust model [Volume 5, Issue 2, 2013, Pages 155-170]
-
Tork Ladani, B.
A model for specification, composition and verification of access control policies and its application to web services [Volume 3, Issue 2, 2011, Pages 103-120]
-
Tork Ladani, B.
An automatic test case generator for evaluating implementation of access control policies [Volume 9, Issue 1, 2017, Pages 73-91]
-
Tork Ladani, Behrouz
GGRA: a grouped gossip-based reputation aggregation algorithm [Volume 7, Issue 1, 2015, Pages 59-74]
-
Tork Ladani, Behrouz
Interdependent Security Game Design over Constrained Linear Influence Networks [Volume 11, Issue 2, 2019, Pages 95-111]
-
Tork Ladani, Behrouz
Curious-Monkey: Evolved Monkey for Triggering Malicious Payloads in Android Malware [Volume 13, Issue 2, 2021, Pages 131-143]
-
Tork Ladani, Behrouz
SANT: Static Analysis of Native Threads for Security Vetting of Android Applications [Volume 14, Issue 1, 2022, Pages 13-25]
-
Tork Ladani, Behrouz
A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware [Volume 15, Issue 1, 2023, Pages 59-71]
-
Tork Ladani, Behrouz
Towards a Formal Approach for Detection of Vulnerabilities in the Android Permissions System [Volume 14, Issue 3, 2022, Pages 61-69]
-
Tork Ladani, Behrouz
Light-Weight Privacy-Preserving Data Aggregation Protocols in Smart Grid Metering Networks [Volume 14, Issue 3, 2022, Pages 101-112]
-
TOUHAMI, Rachida
Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns [Volume 11, Issue 3, 2019, Pages 9-17]
-
Tridane, Malika
The Establishment of a Distance Training Device within the Regional Center of the Taza Education and Training: Administrative Cycle Case [Volume 12, Issue 3, 2020, Pages 87-93]
V
-
Vafaei, Navid
Practical Differential Fault Analysis on SKINNY [Volume 14, Issue 3, 2022, Pages 9-19]
-
Vafaei, Navid
Practical Differential Fault Analysis on CRAFT, a Lightweight Block Cipher [Volume 14, Issue 3, 2022, Pages 21-31]
-
Vafaei, Vajiheh
Modified Sliding-Mode Control Method for Synchronization a Class of Chaotic Fractional-Order Systems with Application in Encryption [Volume 12, Issue 1, 2020, Pages 55-66]
-
Vafaei Jahan, M.
A density based clustering approach to distinguish between web robot and human requests to a web server [Volume 6, Issue 1, 2014, Pages 77-89]
-
Vafaei Jahan, Majid
Analyzing new features of infected web content in detection of malicious web pages [Volume 9, Issue 2, 2017, Pages 161-181]
-
Vardasbi, A.
Cryptanalysis of GSM encryption algorithm A5/1 [Volume 4, Issue 2, 2012, Pages 107-114]
-
Vardasbi, A.
On the multi _ chi-square tests and their data complexity [Volume 4, Issue 1, 2012, Pages 15-24]
-
V. dos Santos Filho, José
A Fair Power Allocation for Non-Orthogonal Multiple Access in the Power Domain [Volume 11, Issue 3, 2019, Pages 123-130]
-
Venter, H. S.
Analyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications [Volume 4, Issue 2, 2012, Pages 137-150]
-
Vosoughi, M.
Security-aware register placement to hinder malicious hardware updating and improve Trojan detectability [Volume 7, Issue 1, 2015, Pages 75-81]
W
-
Waqas, Muhammad
Evaluation of Planet Factors of Smart City through Multi-layer Fuzzy Logic (MFL) [Volume 11, Issue 3, 2019, Pages 51-58]
X
-
Xu, Qiang
Face Recognition Based Rank Reduction SVD Approach [Volume 11, Issue 3, 2019, Pages 39-50]
Y
-
Yahyazadeh, M.
BotOnus: an online unsupervised method for Botnet detection [Volume 4, Issue 1, 2012, Pages 51-62]
-
Yakovlev, Viktor
Algebraic Matching of Vulnerabilities in a Low-Level Code [Volume 11, Issue 3, 2019, Pages 1-7]
-
Yousif, Muhammad
An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling [Volume 11, Issue 3, 2019, Pages 145-151]
-
Yousif Mahdi, Yaqoob
Indexed View Technique to Speed-up Data Warehouse Query Processing [Volume 12, Issue 3, 2020, Pages 81-85]
Z
-
Zabihi, M.
A density based clustering approach to distinguish between web robot and human requests to a web server [Volume 6, Issue 1, 2014, Pages 77-89]
-
Zaghian, Ali
A Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions [Volume 12, Issue 2, 2020, Pages 91-99]
-
Zahednejad, Behnam
A Privacy Preserving Mutual Authentication Scheme Suitable for IoT-Based Medical Systems [Volume 14, Issue 1, 2022, Pages 57-68]
-
Zahir-Azami, B.
Intelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms [Volume 3, Issue 1, 2011, Pages 51-66]
-
Zakerolhosseini, A.
An efficient blind signature scheme based on the elliptic curve discrete logarithm problem [Volume 1, Issue 2, 2009, Pages 125-131]
-
Zakerolhosseini, A.
QTRU: quaternionic version of the NTRU public-key cryptosystems [Volume 3, Issue 1, 2011, Pages 29-42]
-
Zali, Z.
Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach [Volume 4, Issue 2, 2012, Pages 125-136]
-
Zamani, B.
An automatic test case generator for evaluating implementation of access control policies [Volume 9, Issue 1, 2017, Pages 73-91]
-
Zamani, Bahman
Curious-Monkey: Evolved Monkey for Triggering Malicious Payloads in Android Malware [Volume 13, Issue 2, 2021, Pages 131-143]
-
Zamani, Bahman
Towards a Formal Approach for Detection of Vulnerabilities in the Android Permissions System [Volume 14, Issue 3, 2022, Pages 61-69]
-
Zamanzadeh, Sh.
Self authentication path insertion in FPGA-based design flow for tamper-resistant purpose [Volume 8, Issue 1, 2016, Pages 53-60]
-
Zamanzadeh, Sh.
ASIC design protection against reverse engineering during the fabrication process using automatic netlist obfuscation design flow [Volume 8, Issue 2, 2016, Pages 93-104]
-
Zare Jousheghani, Zahra
A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications [Volume 11, Issue 2, 2019, Pages 113-128]
-
Zarezadeh, Maryam
Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems [Volume 12, Issue 2, 2020, Pages 129-140]
-
Zarisfi Kermani, F.
Optimizing image steganography by combining the GA and ICA [Volume 7, Issue 1, 2015, Pages 47-58]
-
Zarmehi, N.
Optimum decoder for multiplicative spread spectrum image watermarking with Laplacian modeling [Volume 8, Issue 2, 2016, Pages 131-139]
-
Zeebaree, Mosleh
A Comparison Study between Intelligent Decision Support Systems and Decision Support Systems [Volume 11, Issue 3, 2019, Pages 187-194]
-
Zendaoui, Fairouz
Considering Uncertainty in Modeling Historical Knowledge [Volume 11, Issue 3, 2019, Pages 59-65]
-
Ziti, Cherif
The Use of Local Sensitive Hashing for E-learner Face Identification [Volume 12, Issue 3, 2020, Pages 1-5]
-
Zokaei, S.
A context-sensitive dynamic role-based access control model for pervasive computing environments [Volume 2, Issue 1, 2010, Pages 47-66]