A
-
Abdollahi, Sina
Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT [Volume 15, Issue 1, 2023, Pages 97-110]
-
Ashouri-Talouki, Maede
Hierarchical Deterministic Wallets for Secure Steganography in Blockchain [Volume 15, Issue 1, 2023, Pages 73-81]
D
-
Deeb, Hasan Muhammad
A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware [Volume 15, Issue 1, 2023, Pages 59-71]
E
-
Ebrahimi Kiasari, Mohammad Ebrahim
A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem [Volume 15, Issue 1, 2023, Pages 125-135]
-
Eghlidos, Taraneh
Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon’s Algorithm [Volume 15, Issue 1, 2023, Pages 83-95]
H
-
Hasan, Hayyan Salman
A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware [Volume 15, Issue 1, 2023, Pages 59-71]
K
-
Khosravi, Ali
Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon’s Algorithm [Volume 15, Issue 1, 2023, Pages 83-95]
M
-
Mahdavi, Mojtaba
Hierarchical Deterministic Wallets for Secure Steganography in Blockchain [Volume 15, Issue 1, 2023, Pages 73-81]
-
Mirghadri, Abdolrasoul
A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem [Volume 15, Issue 1, 2023, Pages 125-135]
-
Mirzaei, Arash
4n × 4n Diffusion Layers Based on Multiple 4 × 4 MDS Matrices [Volume 15, Issue 1, 2023, Pages 111-124]
-
Mohajeri, Javad
Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT [Volume 15, Issue 1, 2023, Pages 97-110]
N
-
Nazari, Mojtaba
A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem [Volume 15, Issue 1, 2023, Pages 125-135]
P
-
Pakniat, Nasrollah
A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem [Volume 15, Issue 1, 2023, Pages 125-135]
-
Pericherla, Suryateja Satya
Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art [Volume 15, Issue 1, 2023, Pages 1-58]
R
-
Rashidi, Bahram
Lightweight Cryptographic S-Boxes Based on Efficient Hardware Structures for Block Ciphers [Volume 15, Issue 1, 2023, Pages 137-151]
S
-
Sajadieh, Mahdi
4n × 4n Diffusion Layers Based on Multiple 4 × 4 MDS Matrices [Volume 15, Issue 1, 2023, Pages 111-124]
-
Salmasizadeh, Mahmoud
Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT [Volume 15, Issue 1, 2023, Pages 97-110]
T
-
Torki, Omid
Hierarchical Deterministic Wallets for Secure Steganography in Blockchain [Volume 15, Issue 1, 2023, Pages 73-81]
-
Tork Ladani, Behrouz
A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware [Volume 15, Issue 1, 2023, Pages 59-71]