A

  • Abdollahi, Sina Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT [Volume 15, Issue 1, 2023, Pages 97-110]

  • Ashouri-Talouki, Maede Hierarchical Deterministic Wallets for Secure Steganography in Blockchain [Volume 15, Issue 1, 2023, Pages 73-81]

D

  • Deeb, Hasan Muhammad A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware [Volume 15, Issue 1, 2023, Pages 59-71]

E

  • Ebrahimi Kiasari, Mohammad Ebrahim A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem [Volume 15, Issue 1, 2023, Pages 125-135]

  • Eghlidos, Taraneh Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon’s Algorithm [Volume 15, Issue 1, 2023, Pages 83-95]

H

  • Hasan, Hayyan Salman A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware [Volume 15, Issue 1, 2023, Pages 59-71]

K

  • Khosravi, Ali Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon’s Algorithm [Volume 15, Issue 1, 2023, Pages 83-95]

M

  • Mahdavi, Mojtaba Hierarchical Deterministic Wallets for Secure Steganography in Blockchain [Volume 15, Issue 1, 2023, Pages 73-81]

  • Mirghadri, Abdolrasoul A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem [Volume 15, Issue 1, 2023, Pages 125-135]

  • Mirzaei, Arash 4n × 4n Diffusion Layers Based on Multiple 4 × 4 MDS Matrices [Volume 15, Issue 1, 2023, Pages 111-124]

  • Mohajeri, Javad Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT [Volume 15, Issue 1, 2023, Pages 97-110]

N

  • Nazari, Mojtaba A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem [Volume 15, Issue 1, 2023, Pages 125-135]

P

  • Pakniat, Nasrollah A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem [Volume 15, Issue 1, 2023, Pages 125-135]

  • Pericherla, Suryateja Satya Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art [Volume 15, Issue 1, 2023, Pages 1-58]

R

  • Rashidi, Bahram Lightweight Cryptographic S-Boxes Based on Efficient Hardware Structures for Block Ciphers [Volume 15, Issue 1, 2023, Pages 137-151]

S

  • Sajadieh, Mahdi 4n × 4n Diffusion Layers Based on Multiple 4 × 4 MDS Matrices [Volume 15, Issue 1, 2023, Pages 111-124]

  • Salmasizadeh, Mahmoud Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT [Volume 15, Issue 1, 2023, Pages 97-110]

T

  • Torki, Omid Hierarchical Deterministic Wallets for Secure Steganography in Blockchain [Volume 15, Issue 1, 2023, Pages 73-81]

  • Tork Ladani, Behrouz A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware [Volume 15, Issue 1, 2023, Pages 59-71]