A

  • Abdollahi, Sina Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT [Volume 15, Issue 1, 2023, Pages 97-110]

  • Aghaee, Hadi Quantum Multiple Access Wiretap Channel: On the One-Shot Achievable Secrecy Rate Regions [Volume 15, Issue 3, 2023, Pages 19-34]

  • Ahmadi, Siavash A Semi-Supervised IDS for Cyber-Physical Systems Using a Deep Learning Approach [Volume 15, Issue 3, 2023, Pages 43-50]

  • Ahmadi, Siavash Private Federated Learning: An Adversarial Sanitizing Perspective [Volume 15, Issue 3, 2023, Pages 67-76]

  • Ahmadi, Siavash Integral Cryptanalysis of Reduced-Round SAND-64 Based on Bit-Based Division Property [Volume 15, Issue 3, 2023, Pages 139-147]

  • Ahmadian, Zahra New Variations of Discrete Logarithm Problem [Volume 15, Issue 3, 2023, Pages 91-100]

  • Ahmadian Ramaki, Ali Towards Event Aggregation for Reducing the Volume of Logged Events During IKC Stages of APT Attacks [Volume 15, Issue 2, 2023, Pages 178-215]

  • Akhaee, Mohammad Ali Analysis of IOTA Tangle Stability in High Transaction Rates [Volume 15, Issue 2, 2023, Pages 152-162]

  • Akhbari, Bahareh Quantum Multiple Access Wiretap Channel: On the One-Shot Achievable Secrecy Rate Regions [Volume 15, Issue 3, 2023, Pages 19-34]

  • Alizadeh, Bijan HyLock: Hybrid Logic Locking Based on Structural Fuzzing for Resisting Learning-based Attacks [Volume 15, Issue 3, 2023, Pages 109-115]

  • Amani, Mohamadreza A Lightweight Mutual Authentication Scheme for VANETs Between Vehicles and RSUs [Volume 15, Issue 3, 2023, Pages 77-89]

  • Aref, Mohammad Reza A Semi-Supervised IDS for Cyber-Physical Systems Using a Deep Learning Approach [Volume 15, Issue 3, 2023, Pages 43-50]

  • Aref, Mohammad Reza Private Federated Learning: An Adversarial Sanitizing Perspective [Volume 15, Issue 3, 2023, Pages 67-76]

  • Aref, Mohammad Reza Integral Cryptanalysis of Reduced-Round SAND-64 Based on Bit-Based Division Property [Volume 15, Issue 3, 2023, Pages 139-147]

  • Ashouri-Talouki, Maede Hierarchical Deterministic Wallets for Secure Steganography in Blockchain [Volume 15, Issue 1, 2023, Pages 73-81]

  • Ashouri-Talouki, Maede An Auto-Encoder based Membership Inference Attack against Generative Adversarial Network [Volume 15, Issue 2, 2023, Pages 240-253]

  • Azadmanesh, Maryam An Auto-Encoder based Membership Inference Attack against Generative Adversarial Network [Volume 15, Issue 2, 2023, Pages 240-253]

B

  • Bahramian, Mojtaba Oblivious Transfer Using Generalized Jacobian of Elliptic Curves [Volume 15, Issue 2, 2023, Pages 260-273]

  • Bakhshandeh, Atieh Using ChatGPT as a Static Application Security Testing Tool [Volume 15, Issue 3, 2023, Pages 51-58]

  • Bayat Sarmadi, Siavash MISC: Multi-Input Secure Two-Party Computation [Volume 15, Issue 2, 2023, Pages 163-177]

  • Borjal Bayatiani, Fateme A Lightweight RFID Grouping Proof Protocol With Forward Secrecy and Resistant to Reader Compromised Attack [Volume 15, Issue 3, 2023, Pages 117-128]

D

  • Dadkhah, Parichehr Security Analysis and Improvement of an Access Control Scheme for Wireless Body Area Networks [Volume 15, Issue 3, 2023, Pages 35-42]

  • Dakhilalian, Mohammad Security Analysis and Improvement of an Access Control Scheme for Wireless Body Area Networks [Volume 15, Issue 3, 2023, Pages 35-42]

  • Dakhilalian, Mohammad Post Quantum Digital Signature Based on the McEliece Cryptosystems with Dual Inverse Matrix [Volume 15, Issue 3, 2023, Pages 101-108]

  • Deeb, Hasan Muhammad A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware [Volume 15, Issue 1, 2023, Pages 59-71]

E

  • Ebrahimi Kiasari, Mohammad Ebrahim A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem [Volume 15, Issue 1, 2023, Pages 125-135]

  • Eghlidos, Taraneh Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon’s Algorithm [Volume 15, Issue 1, 2023, Pages 83-95]

  • Eghlidos, Taraneh Private Federated Learning: An Adversarial Sanitizing Perspective [Volume 15, Issue 3, 2023, Pages 67-76]

  • Eslami, Ziba Designated-Server Hierarchical Searchable Encryption in Identity-Based Setting [Volume 15, Issue 3, 2023, Pages 1-17]

G

  • Ghaemi-Bafghi, Abbas Towards Event Aggregation for Reducing the Volume of Logged Events During IKC Stages of APT Attacks [Volume 15, Issue 2, 2023, Pages 178-215]

  • Gulliver, Thomas Aaron Post Quantum Digital Signature Based on the McEliece Cryptosystems with Dual Inverse Matrix [Volume 15, Issue 3, 2023, Pages 101-108]

H

  • Haidary Makoui, Farshid Post Quantum Digital Signature Based on the McEliece Cryptosystems with Dual Inverse Matrix [Volume 15, Issue 3, 2023, Pages 101-108]

  • Hasan, Hayyan Salman A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware [Volume 15, Issue 1, 2023, Pages 59-71]

J

  • Jafarian, Iman An Efficient Scheme for Secure Medical Data Sharing in the Cloud [Volume 15, Issue 3, 2023, Pages 59-66]

  • Jahanian, Ali Cross-Device Deep Learning Side-Channel Attacks using Filter and Autoencoder [Volume 15, Issue 3, 2023, Pages 149-158]

K

  • Keramatfar, Abdalsamad Using ChatGPT as a Static Application Security Testing Tool [Volume 15, Issue 3, 2023, Pages 51-58]

  • Khaleghifard, Sahar New Variations of Discrete Logarithm Problem [Volume 15, Issue 3, 2023, Pages 91-100]

  • Khalesi, Akram Reverse Engineering of Authentication Protocol in DesFire [Volume 15, Issue 2, 2023, Pages 254-259]

  • Khorsandi, Siavash An Efficient Scheme for Secure Medical Data Sharing in the Cloud [Volume 15, Issue 3, 2023, Pages 59-66]

  • Khosravi, Ali Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon’s Algorithm [Volume 15, Issue 1, 2023, Pages 83-95]

L

  • Labbafniya, Mansoureh Reverse Engineering of Authentication Protocol in DesFire [Volume 15, Issue 2, 2023, Pages 254-259]

M

  • Mahdavi, Mojtaba Hierarchical Deterministic Wallets for Secure Steganography in Blockchain [Volume 15, Issue 1, 2023, Pages 73-81]

  • Mahdavi Oliaee, Mahdi New Variations of Discrete Logarithm Problem [Volume 15, Issue 3, 2023, Pages 91-100]

  • Mala, Hamid Secure Outsourcing of Two Standard Identity-Based Cryptosystems [Volume 15, Issue 2, 2023, Pages 216-229]

  • Mala, Hamid A Lightweight RFID Grouping Proof Protocol With Forward Secrecy and Resistant to Reader Compromised Attack [Volume 15, Issue 3, 2023, Pages 117-128]

  • M. Chekidehkhoun, Mohammad Using ChatGPT as a Static Application Security Testing Tool [Volume 15, Issue 3, 2023, Pages 51-58]

  • Mirghadri, Abdolrasoul A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem [Volume 15, Issue 1, 2023, Pages 125-135]

  • Mirzaei, Arash 4n × 4n Diffusion Layers Based on Multiple 4 × 4 MDS Matrices [Volume 15, Issue 1, 2023, Pages 111-124]

  • Mirzaei, Arash New Directions in the Design of Binary Matrices for SPN Block Ciphers [Volume 15, Issue 3, 2023, Pages 129-138]

  • Mirzaie, Atiyeh Integral Cryptanalysis of Reduced-Round SAND-64 Based on Bit-Based Division Property [Volume 15, Issue 3, 2023, Pages 139-147]

  • Mohajeri, Javad Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT [Volume 15, Issue 1, 2023, Pages 97-110]

  • Mohajeri, Javad A Lightweight Mutual Authentication Scheme for VANETs Between Vehicles and RSUs [Volume 15, Issue 3, 2023, Pages 77-89]

  • Moradi Shahmiri, Mohammad HyLock: Hybrid Logic Locking Based on Structural Fuzzing for Resisting Learning-based Attacks [Volume 15, Issue 3, 2023, Pages 109-115]

N

  • Nazari, Mojtaba A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem [Volume 15, Issue 1, 2023, Pages 125-135]

  • Norouzi, Amir Using ChatGPT as a Static Application Security Testing Tool [Volume 15, Issue 3, 2023, Pages 51-58]

P

  • Pakniat, Nasrollah A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem [Volume 15, Issue 1, 2023, Pages 125-135]

  • Pakniat, Nasrollah Designated-Server Hierarchical Searchable Encryption in Identity-Based Setting [Volume 15, Issue 3, 2023, Pages 1-17]

  • Pericherla, Suryateja Satya Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art [Volume 15, Issue 1, 2023, Pages 1-58]

R

  • Rashidi, Bahram Lightweight Cryptographic S-Boxes Based on Efficient Hardware Structures for Block Ciphers [Volume 15, Issue 1, 2023, Pages 137-151]

  • Rasoolzadegan, Abbas Towards Event Aggregation for Reducing the Volume of Logged Events During IKC Stages of APT Attacks [Volume 15, Issue 2, 2023, Pages 178-215]

  • Rasouli, Faeze A Fragile Watermarking by Hamming Code on Distributed Pixels with Perfect Recovery for Small Tampers [Volume 15, Issue 2, 2023, Pages 230-239]

  • Rastegari, Parvin Security Analysis and Improvement of an Access Control Scheme for Wireless Body Area Networks [Volume 15, Issue 3, 2023, Pages 35-42]

  • Rezaei Kashi, Maryam Oblivious Transfer Using Generalized Jacobian of Elliptic Curves [Volume 15, Issue 2, 2023, Pages 260-273]

  • Rohani Sarvestani, Reza A Fragile Watermarking by Hamming Code on Distributed Pixels with Perfect Recovery for Small Tampers [Volume 15, Issue 2, 2023, Pages 230-239]

S

  • Saeidi, Mohammad Reza Secure Outsourcing of Two Standard Identity-Based Cryptosystems [Volume 15, Issue 2, 2023, Pages 216-229]

  • Sajadieh, Mahdi 4n × 4n Diffusion Layers Based on Multiple 4 × 4 MDS Matrices [Volume 15, Issue 1, 2023, Pages 111-124]

  • Sajadieh, Mahdi New Directions in the Design of Binary Matrices for SPN Block Ciphers [Volume 15, Issue 3, 2023, Pages 129-138]

  • Salehi, Amirhosein A Semi-Supervised IDS for Cyber-Physical Systems Using a Deep Learning Approach [Volume 15, Issue 3, 2023, Pages 43-50]

  • Salmasizadeh, Mahmoud Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT [Volume 15, Issue 1, 2023, Pages 97-110]

  • Salmasizadeh, Mahmoud A Lightweight Mutual Authentication Scheme for VANETs Between Vehicles and RSUs [Volume 15, Issue 3, 2023, Pages 77-89]

  • Shahgholi Ghahfarokhi, Behrouz An Auto-Encoder based Membership Inference Attack against Generative Adversarial Network [Volume 15, Issue 2, 2023, Pages 240-253]

  • Shiraly, Danial Designated-Server Hierarchical Searchable Encryption in Identity-Based Setting [Volume 15, Issue 3, 2023, Pages 1-17]

  • Shirinjani, Mojtaba Private Federated Learning: An Adversarial Sanitizing Perspective [Volume 15, Issue 3, 2023, Pages 67-76]

T

  • Tabaeifard, Maryam Cross-Device Deep Learning Side-Channel Attacks using Filter and Autoencoder [Volume 15, Issue 3, 2023, Pages 149-158]

  • Taheri, Mohammad A Fragile Watermarking by Hamming Code on Distributed Pixels with Perfect Recovery for Small Tampers [Volume 15, Issue 2, 2023, Pages 230-239]

  • Taheri Ardakani, Farhad MISC: Multi-Input Secure Two-Party Computation [Volume 15, Issue 2, 2023, Pages 163-177]

  • Torki, Omid Hierarchical Deterministic Wallets for Secure Steganography in Blockchain [Volume 15, Issue 1, 2023, Pages 73-81]

  • Tork Ladani, Behrouz A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware [Volume 15, Issue 1, 2023, Pages 59-71]

Y

  • Yajam, Habibullah Analysis of IOTA Tangle Stability in High Transaction Rates [Volume 15, Issue 2, 2023, Pages 152-162]

  • Yusefi, Hamed Reverse Engineering of Authentication Protocol in DesFire [Volume 15, Issue 2, 2023, Pages 254-259]