A
-
Abdollahi, Sina
Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT [Volume 15, Issue 1, 2023, Pages 97-110]
-
Aghaee, Hadi
Quantum Multiple Access Wiretap Channel: On the One-Shot Achievable Secrecy Rate Regions [Volume 15, Issue 3, 2023]
-
Ahmadi, Siavash
A Semi-Supervised IDS for Cyber-Physical Systems Using a Deep Learning Approach [Volume 15, Issue 3, 2023]
-
Ahmadi, Siavash
Private Federated Learning: An Adversarial Sanitizing Perspective [Volume 15, Issue 3, 2023]
-
Ahmadian, Zahra
New Variations of Discrete Logarithm Problem [Volume 15, Issue 3, 2023]
-
Ahmadian Ramaki, Ali
Towards Event Aggregation for Reducing the Volume of Logged Events During IKC Stages of APT Attacks [Volume 15, Issue 2, 2023, Pages 178-215]
-
Akhaee, Mohammad Ali
Analysis of IOTA Tangle Stability in High Transaction Rates [Volume 15, Issue 2, 2023, Pages 152-162]
-
Akhbari, Bahareh
Quantum Multiple Access Wiretap Channel: On the One-Shot Achievable Secrecy Rate Regions [Volume 15, Issue 3, 2023]
-
Amani, Mohamadreza
A Lightweight Mutual Authentication Scheme for VANETs Between Vehicles and RSUs [Volume 15, Issue 3, 2023]
-
Aref, Mohammad Reza
A Semi-Supervised IDS for Cyber-Physical Systems Using a Deep Learning Approach [Volume 15, Issue 3, 2023]
-
Aref, Mohammad Reza
Private Federated Learning: An Adversarial Sanitizing Perspective [Volume 15, Issue 3, 2023]
-
Ashouri-Talouki, Maede
Hierarchical Deterministic Wallets for Secure Steganography in Blockchain [Volume 15, Issue 1, 2023, Pages 73-81]
-
Ashouri-Talouki, Maede
An Auto-Encoder based Membership Inference Attack against Generative Adversarial Network [Volume 15, Issue 2, 2023, Pages 240-253]
-
Azadmanesh, Maryam
An Auto-Encoder based Membership Inference Attack against Generative Adversarial Network [Volume 15, Issue 2, 2023, Pages 240-253]
B
-
Bahramian, Mojtaba
Oblivious Transfer Using Generalized Jacobian of Elliptic Curves [Volume 15, Issue 2, 2023, Pages 260-273]
-
Bakhshandeh, Atieh
Using ChatGPT as a Static Application Security Testing Tool [Volume 15, Issue 3, 2023]
-
Bayat Sarmadi, Siavash
MISC: Multi-Input Secure Two-Party Computation [Volume 15, Issue 2, 2023, Pages 163-177]
D
-
Dadkhah, Parichehr
Security Analysis and Improvement of an Access Control Scheme for Wireless Body Area Networks [Volume 15, Issue 3, 2023]
-
Dakhilalian, Mohammad
Security Analysis and Improvement of an Access Control Scheme for Wireless Body Area Networks [Volume 15, Issue 3, 2023]
-
Deeb, Hasan Muhammad
A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware [Volume 15, Issue 1, 2023, Pages 59-71]
E
-
Ebrahimi Kiasari, Mohammad Ebrahim
A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem [Volume 15, Issue 1, 2023, Pages 125-135]
-
Eghlidos, Taraneh
Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon’s Algorithm [Volume 15, Issue 1, 2023, Pages 83-95]
-
Eghlidos, Taraneh
Private Federated Learning: An Adversarial Sanitizing Perspective [Volume 15, Issue 3, 2023]
-
Eslami, Ziba
Designated-Server Hierarchical Searchable Encryption in Identity-Based Setting [Volume 15, Issue 3, 2023, Pages 1-16]
G
-
Ghaemi-Bafghi, Abbas
Towards Event Aggregation for Reducing the Volume of Logged Events During IKC Stages of APT Attacks [Volume 15, Issue 2, 2023, Pages 178-215]
H
-
Hasan, Hayyan Salman
A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware [Volume 15, Issue 1, 2023, Pages 59-71]
J
-
Jafarian, Iman
An Efficient Scheme for Secure Medical Data Sharing in the Cloud [Volume 15, Issue 3, 2023]
K
-
Keramatfar, Abdalsamad
Using ChatGPT as a Static Application Security Testing Tool [Volume 15, Issue 3, 2023]
-
Khaleghifard, Sahar
New Variations of Discrete Logarithm Problem [Volume 15, Issue 3, 2023]
-
Khalesi, Akram
Reverse Engineering of Authentication Protocol in DesFire [Volume 15, Issue 2, 2023, Pages 254-259]
-
Khorsandi, Siavash
An Efficient Scheme for Secure Medical Data Sharing in the Cloud [Volume 15, Issue 3, 2023]
-
Khosravi, Ali
Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon’s Algorithm [Volume 15, Issue 1, 2023, Pages 83-95]
L
-
Labbafniya, Mansoureh
Reverse Engineering of Authentication Protocol in DesFire [Volume 15, Issue 2, 2023, Pages 254-259]
M
-
Mahdavi, Mojtaba
Hierarchical Deterministic Wallets for Secure Steganography in Blockchain [Volume 15, Issue 1, 2023, Pages 73-81]
-
Mahdavi Oliaee, Mahdi
New Variations of Discrete Logarithm Problem [Volume 15, Issue 3, 2023]
-
Mala, Hamid
Secure Outsourcing of Two Standard Identity-Based Cryptosystems [Volume 15, Issue 2, 2023, Pages 216-229]
-
M. Chekidehkhoun, Mohammad
Using ChatGPT as a Static Application Security Testing Tool [Volume 15, Issue 3, 2023]
-
Mirghadri, Abdolrasoul
A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem [Volume 15, Issue 1, 2023, Pages 125-135]
-
Mirzaei, Arash
4n × 4n Diffusion Layers Based on Multiple 4 × 4 MDS Matrices [Volume 15, Issue 1, 2023, Pages 111-124]
-
Mohajeri, Javad
Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT [Volume 15, Issue 1, 2023, Pages 97-110]
-
Mohajeri, Javad
A Lightweight Mutual Authentication Scheme for VANETs Between Vehicles and RSUs [Volume 15, Issue 3, 2023]
N
-
Nazari, Mojtaba
A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem [Volume 15, Issue 1, 2023, Pages 125-135]
-
Norouzi, Amir
Using ChatGPT as a Static Application Security Testing Tool [Volume 15, Issue 3, 2023]
P
-
Pakniat, Nasrollah
A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem [Volume 15, Issue 1, 2023, Pages 125-135]
-
Pakniat, Nasrollah
Designated-Server Hierarchical Searchable Encryption in Identity-Based Setting [Volume 15, Issue 3, 2023, Pages 1-16]
-
Pericherla, Suryateja Satya
Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art [Volume 15, Issue 1, 2023, Pages 1-58]
R
-
Rashidi, Bahram
Lightweight Cryptographic S-Boxes Based on Efficient Hardware Structures for Block Ciphers [Volume 15, Issue 1, 2023, Pages 137-151]
-
Rasoolzadegan, Abbas
Towards Event Aggregation for Reducing the Volume of Logged Events During IKC Stages of APT Attacks [Volume 15, Issue 2, 2023, Pages 178-215]
-
Rasouli, Faeze
A Fragile Watermarking by Hamming Code on Distributed Pixels with Perfect Recovery for Small Tampers [Volume 15, Issue 2, 2023, Pages 230-239]
-
Rastegari, Parvin
Security Analysis and Improvement of an Access Control Scheme for Wireless Body Area Networks [Volume 15, Issue 3, 2023]
-
Rezaei Kashi, Maryam
Oblivious Transfer Using Generalized Jacobian of Elliptic Curves [Volume 15, Issue 2, 2023, Pages 260-273]
-
Rohani Sarvestani, Reza
A Fragile Watermarking by Hamming Code on Distributed Pixels with Perfect Recovery for Small Tampers [Volume 15, Issue 2, 2023, Pages 230-239]
S
-
Saeidi, Mohammad Reza
Secure Outsourcing of Two Standard Identity-Based Cryptosystems [Volume 15, Issue 2, 2023, Pages 216-229]
-
Sajadieh, Mahdi
4n × 4n Diffusion Layers Based on Multiple 4 × 4 MDS Matrices [Volume 15, Issue 1, 2023, Pages 111-124]
-
Salehi, Amirhosein
A Semi-Supervised IDS for Cyber-Physical Systems Using a Deep Learning Approach [Volume 15, Issue 3, 2023]
-
Salmasizadeh, Mahmoud
Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT [Volume 15, Issue 1, 2023, Pages 97-110]
-
Salmasizadeh, Mahmoud
A Lightweight Mutual Authentication Scheme for VANETs Between Vehicles and RSUs [Volume 15, Issue 3, 2023]
-
Shahgholi Ghahfarokhi, Behrouz
An Auto-Encoder based Membership Inference Attack against Generative Adversarial Network [Volume 15, Issue 2, 2023, Pages 240-253]
-
Shiraly, Danial
Designated-Server Hierarchical Searchable Encryption in Identity-Based Setting [Volume 15, Issue 3, 2023, Pages 1-16]
-
Shirinjani, Mojtaba
Private Federated Learning: An Adversarial Sanitizing Perspective [Volume 15, Issue 3, 2023]
T
-
Taheri, Mohammad
A Fragile Watermarking by Hamming Code on Distributed Pixels with Perfect Recovery for Small Tampers [Volume 15, Issue 2, 2023, Pages 230-239]
-
Taheri Ardakani, Farhad
MISC: Multi-Input Secure Two-Party Computation [Volume 15, Issue 2, 2023, Pages 163-177]
-
Torki, Omid
Hierarchical Deterministic Wallets for Secure Steganography in Blockchain [Volume 15, Issue 1, 2023, Pages 73-81]
-
Tork Ladani, Behrouz
A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware [Volume 15, Issue 1, 2023, Pages 59-71]
Y
-
Yajam, Habibullah
Analysis of IOTA Tangle Stability in High Transaction Rates [Volume 15, Issue 2, 2023, Pages 152-162]
-
Yusefi, Hamed
Reverse Engineering of Authentication Protocol in DesFire [Volume 15, Issue 2, 2023, Pages 254-259]