A
-
Abdollahi, Sina
Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT [Volume 15, Issue 1, 2023, Pages 97-110]
-
Aghaee, Hadi
Quantum Multiple Access Wiretap Channel: On the One-Shot Achievable Secrecy Rate Regions [Volume 15, Issue 3, 2023, Pages 19-34]
-
Ahmadi, Siavash
A Semi-Supervised IDS for Cyber-Physical Systems Using a Deep Learning Approach [Volume 15, Issue 3, 2023, Pages 43-50]
-
Ahmadi, Siavash
Private Federated Learning: An Adversarial Sanitizing Perspective [Volume 15, Issue 3, 2023, Pages 67-76]
-
Ahmadi, Siavash
Integral Cryptanalysis of Reduced-Round SAND-64 Based on Bit-Based Division Property [Volume 15, Issue 3, 2023, Pages 139-147]
-
Ahmadian, Zahra
New Variations of Discrete Logarithm Problem [Volume 15, Issue 3, 2023, Pages 91-100]
-
Ahmadian Ramaki, Ali
Towards Event Aggregation for Reducing the Volume of Logged Events During IKC Stages of APT Attacks [Volume 15, Issue 2, 2023, Pages 178-215]
-
Akhaee, Mohammad Ali
Analysis of IOTA Tangle Stability in High Transaction Rates [Volume 15, Issue 2, 2023, Pages 152-162]
-
Akhbari, Bahareh
Quantum Multiple Access Wiretap Channel: On the One-Shot Achievable Secrecy Rate Regions [Volume 15, Issue 3, 2023, Pages 19-34]
-
Alizadeh, Bijan
HyLock: Hybrid Logic Locking Based on Structural Fuzzing for Resisting Learning-based Attacks [Volume 15, Issue 3, 2023, Pages 109-115]
-
Amani, Mohamadreza
A Lightweight Mutual Authentication Scheme for VANETs Between Vehicles and RSUs [Volume 15, Issue 3, 2023, Pages 77-89]
-
Aref, Mohammad Reza
A Semi-Supervised IDS for Cyber-Physical Systems Using a Deep Learning Approach [Volume 15, Issue 3, 2023, Pages 43-50]
-
Aref, Mohammad Reza
Private Federated Learning: An Adversarial Sanitizing Perspective [Volume 15, Issue 3, 2023, Pages 67-76]
-
Aref, Mohammad Reza
Integral Cryptanalysis of Reduced-Round SAND-64 Based on Bit-Based Division Property [Volume 15, Issue 3, 2023, Pages 139-147]
-
Ashouri-Talouki, Maede
Hierarchical Deterministic Wallets for Secure Steganography in Blockchain [Volume 15, Issue 1, 2023, Pages 73-81]
-
Ashouri-Talouki, Maede
An Auto-Encoder based Membership Inference Attack against Generative Adversarial Network [Volume 15, Issue 2, 2023, Pages 240-253]
-
Azadmanesh, Maryam
An Auto-Encoder based Membership Inference Attack against Generative Adversarial Network [Volume 15, Issue 2, 2023, Pages 240-253]
B
-
Bahramian, Mojtaba
Oblivious Transfer Using Generalized Jacobian of Elliptic Curves [Volume 15, Issue 2, 2023, Pages 260-273]
-
Bakhshandeh, Atieh
Using ChatGPT as a Static Application Security Testing Tool [Volume 15, Issue 3, 2023, Pages 51-58]
-
Bayat Sarmadi, Siavash
MISC: Multi-Input Secure Two-Party Computation [Volume 15, Issue 2, 2023, Pages 163-177]
-
Borjal Bayatiani, Fateme
A Lightweight RFID Grouping Proof Protocol With Forward Secrecy and Resistant to Reader Compromised Attack [Volume 15, Issue 3, 2023, Pages 117-128]
D
-
Dadkhah, Parichehr
Security Analysis and Improvement of an Access Control Scheme for Wireless Body Area Networks [Volume 15, Issue 3, 2023, Pages 35-42]
-
Dakhilalian, Mohammad
Security Analysis and Improvement of an Access Control Scheme for Wireless Body Area Networks [Volume 15, Issue 3, 2023, Pages 35-42]
-
Dakhilalian, Mohammad
Post Quantum Digital Signature Based on the McEliece Cryptosystems with Dual Inverse Matrix [Volume 15, Issue 3, 2023, Pages 101-108]
-
Deeb, Hasan Muhammad
A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware [Volume 15, Issue 1, 2023, Pages 59-71]
E
-
Ebrahimi Kiasari, Mohammad Ebrahim
A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem [Volume 15, Issue 1, 2023, Pages 125-135]
-
Eghlidos, Taraneh
Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon’s Algorithm [Volume 15, Issue 1, 2023, Pages 83-95]
-
Eghlidos, Taraneh
Private Federated Learning: An Adversarial Sanitizing Perspective [Volume 15, Issue 3, 2023, Pages 67-76]
-
Eslami, Ziba
Designated-Server Hierarchical Searchable Encryption in Identity-Based Setting [Volume 15, Issue 3, 2023, Pages 1-17]
G
-
Ghaemi-Bafghi, Abbas
Towards Event Aggregation for Reducing the Volume of Logged Events During IKC Stages of APT Attacks [Volume 15, Issue 2, 2023, Pages 178-215]
-
Gulliver, Thomas Aaron
Post Quantum Digital Signature Based on the McEliece Cryptosystems with Dual Inverse Matrix [Volume 15, Issue 3, 2023, Pages 101-108]
H
-
Haidary Makoui, Farshid
Post Quantum Digital Signature Based on the McEliece Cryptosystems with Dual Inverse Matrix [Volume 15, Issue 3, 2023, Pages 101-108]
-
Hasan, Hayyan Salman
A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware [Volume 15, Issue 1, 2023, Pages 59-71]
J
-
Jafarian, Iman
An Efficient Scheme for Secure Medical Data Sharing in the Cloud [Volume 15, Issue 3, 2023, Pages 59-66]
-
Jahanian, Ali
Cross-Device Deep Learning Side-Channel Attacks using Filter and Autoencoder [Volume 15, Issue 3, 2023, Pages 149-158]
K
-
Keramatfar, Abdalsamad
Using ChatGPT as a Static Application Security Testing Tool [Volume 15, Issue 3, 2023, Pages 51-58]
-
Khaleghifard, Sahar
New Variations of Discrete Logarithm Problem [Volume 15, Issue 3, 2023, Pages 91-100]
-
Khalesi, Akram
Reverse Engineering of Authentication Protocol in DesFire [Volume 15, Issue 2, 2023, Pages 254-259]
-
Khorsandi, Siavash
An Efficient Scheme for Secure Medical Data Sharing in the Cloud [Volume 15, Issue 3, 2023, Pages 59-66]
-
Khosravi, Ali
Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon’s Algorithm [Volume 15, Issue 1, 2023, Pages 83-95]
L
-
Labbafniya, Mansoureh
Reverse Engineering of Authentication Protocol in DesFire [Volume 15, Issue 2, 2023, Pages 254-259]
M
-
Mahdavi, Mojtaba
Hierarchical Deterministic Wallets for Secure Steganography in Blockchain [Volume 15, Issue 1, 2023, Pages 73-81]
-
Mahdavi Oliaee, Mahdi
New Variations of Discrete Logarithm Problem [Volume 15, Issue 3, 2023, Pages 91-100]
-
Mala, Hamid
Secure Outsourcing of Two Standard Identity-Based Cryptosystems [Volume 15, Issue 2, 2023, Pages 216-229]
-
Mala, Hamid
A Lightweight RFID Grouping Proof Protocol With Forward Secrecy and Resistant to Reader Compromised Attack [Volume 15, Issue 3, 2023, Pages 117-128]
-
M. Chekidehkhoun, Mohammad
Using ChatGPT as a Static Application Security Testing Tool [Volume 15, Issue 3, 2023, Pages 51-58]
-
Mirghadri, Abdolrasoul
A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem [Volume 15, Issue 1, 2023, Pages 125-135]
-
Mirzaei, Arash
4n × 4n Diffusion Layers Based on Multiple 4 × 4 MDS Matrices [Volume 15, Issue 1, 2023, Pages 111-124]
-
Mirzaei, Arash
New Directions in the Design of Binary Matrices for SPN Block Ciphers [Volume 15, Issue 3, 2023, Pages 129-138]
-
Mirzaie, Atiyeh
Integral Cryptanalysis of Reduced-Round SAND-64 Based on Bit-Based Division Property [Volume 15, Issue 3, 2023, Pages 139-147]
-
Mohajeri, Javad
Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT [Volume 15, Issue 1, 2023, Pages 97-110]
-
Mohajeri, Javad
A Lightweight Mutual Authentication Scheme for VANETs Between Vehicles and RSUs [Volume 15, Issue 3, 2023, Pages 77-89]
-
Moradi Shahmiri, Mohammad
HyLock: Hybrid Logic Locking Based on Structural Fuzzing for Resisting Learning-based Attacks [Volume 15, Issue 3, 2023, Pages 109-115]
N
-
Nazari, Mojtaba
A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem [Volume 15, Issue 1, 2023, Pages 125-135]
-
Norouzi, Amir
Using ChatGPT as a Static Application Security Testing Tool [Volume 15, Issue 3, 2023, Pages 51-58]
P
-
Pakniat, Nasrollah
A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem [Volume 15, Issue 1, 2023, Pages 125-135]
-
Pakniat, Nasrollah
Designated-Server Hierarchical Searchable Encryption in Identity-Based Setting [Volume 15, Issue 3, 2023, Pages 1-17]
-
Pericherla, Suryateja Satya
Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art [Volume 15, Issue 1, 2023, Pages 1-58]
R
-
Rashidi, Bahram
Lightweight Cryptographic S-Boxes Based on Efficient Hardware Structures for Block Ciphers [Volume 15, Issue 1, 2023, Pages 137-151]
-
Rasoolzadegan, Abbas
Towards Event Aggregation for Reducing the Volume of Logged Events During IKC Stages of APT Attacks [Volume 15, Issue 2, 2023, Pages 178-215]
-
Rasouli, Faeze
A Fragile Watermarking by Hamming Code on Distributed Pixels with Perfect Recovery for Small Tampers [Volume 15, Issue 2, 2023, Pages 230-239]
-
Rastegari, Parvin
Security Analysis and Improvement of an Access Control Scheme for Wireless Body Area Networks [Volume 15, Issue 3, 2023, Pages 35-42]
-
Rezaei Kashi, Maryam
Oblivious Transfer Using Generalized Jacobian of Elliptic Curves [Volume 15, Issue 2, 2023, Pages 260-273]
-
Rohani Sarvestani, Reza
A Fragile Watermarking by Hamming Code on Distributed Pixels with Perfect Recovery for Small Tampers [Volume 15, Issue 2, 2023, Pages 230-239]
S
-
Saeidi, Mohammad Reza
Secure Outsourcing of Two Standard Identity-Based Cryptosystems [Volume 15, Issue 2, 2023, Pages 216-229]
-
Sajadieh, Mahdi
4n × 4n Diffusion Layers Based on Multiple 4 × 4 MDS Matrices [Volume 15, Issue 1, 2023, Pages 111-124]
-
Sajadieh, Mahdi
New Directions in the Design of Binary Matrices for SPN Block Ciphers [Volume 15, Issue 3, 2023, Pages 129-138]
-
Salehi, Amirhosein
A Semi-Supervised IDS for Cyber-Physical Systems Using a Deep Learning Approach [Volume 15, Issue 3, 2023, Pages 43-50]
-
Salmasizadeh, Mahmoud
Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT [Volume 15, Issue 1, 2023, Pages 97-110]
-
Salmasizadeh, Mahmoud
A Lightweight Mutual Authentication Scheme for VANETs Between Vehicles and RSUs [Volume 15, Issue 3, 2023, Pages 77-89]
-
Shahgholi Ghahfarokhi, Behrouz
An Auto-Encoder based Membership Inference Attack against Generative Adversarial Network [Volume 15, Issue 2, 2023, Pages 240-253]
-
Shiraly, Danial
Designated-Server Hierarchical Searchable Encryption in Identity-Based Setting [Volume 15, Issue 3, 2023, Pages 1-17]
-
Shirinjani, Mojtaba
Private Federated Learning: An Adversarial Sanitizing Perspective [Volume 15, Issue 3, 2023, Pages 67-76]
T
-
Tabaeifard, Maryam
Cross-Device Deep Learning Side-Channel Attacks using Filter and Autoencoder [Volume 15, Issue 3, 2023, Pages 149-158]
-
Taheri, Mohammad
A Fragile Watermarking by Hamming Code on Distributed Pixels with Perfect Recovery for Small Tampers [Volume 15, Issue 2, 2023, Pages 230-239]
-
Taheri Ardakani, Farhad
MISC: Multi-Input Secure Two-Party Computation [Volume 15, Issue 2, 2023, Pages 163-177]
-
Torki, Omid
Hierarchical Deterministic Wallets for Secure Steganography in Blockchain [Volume 15, Issue 1, 2023, Pages 73-81]
-
Tork Ladani, Behrouz
A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware [Volume 15, Issue 1, 2023, Pages 59-71]
Y
-
Yajam, Habibullah
Analysis of IOTA Tangle Stability in High Transaction Rates [Volume 15, Issue 2, 2023, Pages 152-162]
-
Yusefi, Hamed
Reverse Engineering of Authentication Protocol in DesFire [Volume 15, Issue 2, 2023, Pages 254-259]