A
-
Ahmadian Attari, M.
Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC [Volume 5, Issue 1, 2013, Pages 55-70]
-
Akhaee, M. A.
A survey on digital data hiding schemes: principals, algorithms, and applications [Volume 5, Issue 1, 2013, Pages 5-36]
-
Akhaee, M. A.
Robust multiplicative video watermarking using statistical modeling [Volume 5, Issue 1, 2013, Pages 83-95]
-
Amini, M.
A semantic-aware role-based access control model for pervasive computing environments [Volume 5, Issue 2, 2013, Pages 119-140]
-
Amoozgar, M.
A computational model and convergence theorem for rumor dissemination in social networks [Volume 5, Issue 2, 2013, Pages 141-154]
-
Avizheh, S.
Convertible limited (multi-) verifier signature: new constructions and applications [Volume 5, Issue 2, 2013, Pages 189-208]
-
Azmi, R.
STLR: a novel danger theory based structural TLR algorithm [Volume 5, Issue 2, 2013, Pages 209-225]
D
-
Diyanat, A.
Robust multiplicative video watermarking using statistical modeling [Volume 5, Issue 1, 2013, Pages 83-95]
E
-
Eshghi, M.
Image encryption based on chaotic tent map in time and frequency domains [Volume 5, Issue 1, 2013, Pages 97-110]
-
Ezhei, M.
GTrust: a group based trust model [Volume 5, Issue 2, 2013, Pages 155-170]
G
-
Ghaemi Bafghi, A.
Design and formal verification of DZMBE+ [Volume 5, Issue 1, 2013, Pages 37-53]
-
Ghaemmaghami, Sh.
Robust multiplicative video watermarking using statistical modeling [Volume 5, Issue 1, 2013, Pages 83-95]
-
Ghiasi, M.
DyVSoR: dynamic malware detection based on extracting patterns from value sets of registers [Volume 5, Issue 1, 2013, Pages 71-82]
H
-
Hassani, E.
Image encryption based on chaotic tent map in time and frequency domains [Volume 5, Issue 1, 2013, Pages 97-110]
J
-
Jalili, R.
Editorial [Volume 5, Issue 1, 2013, Pages 1-3]
-
Jalili, R.
Editorial [Volume 5, Issue 2, 2013, Pages 117-118]
-
Javadi, A.
A semantic-aware role-based access control model for pervasive computing environments [Volume 5, Issue 2, 2013, Pages 119-140]
M
-
Marvasti, F.
A survey on digital data hiding schemes: principals, algorithms, and applications [Volume 5, Issue 1, 2013, Pages 5-36]
-
Mohammadhassanzadeh, H.
Prediction of user's trustworthiness in web-based social networks via text mining [Volume 5, Issue 2, 2013, Pages 171-187]
P
-
Pishgoo, B.
STLR: a novel danger theory based structural TLR algorithm [Volume 5, Issue 2, 2013, Pages 209-225]
R
-
Rajabzadeh Asaar, M.
Convertible limited (multi-) verifier signature: new constructions and applications [Volume 5, Issue 2, 2013, Pages 189-208]
-
Ramezanian, R.
A computational model and convergence theorem for rumor dissemination in social networks [Volume 5, Issue 2, 2013, Pages 141-154]
S
-
Sabzinejad Farash, M.
Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC [Volume 5, Issue 1, 2013, Pages 55-70]
-
Salehi, Z.
DyVSoR: dynamic malware detection based on extracting patterns from value sets of registers [Volume 5, Issue 1, 2013, Pages 71-82]
-
Salmasizadeh, M.
Convertible limited (multi-) verifier signature: new constructions and applications [Volume 5, Issue 2, 2013, Pages 189-208]
-
Sami, A.
DyVSoR: dynamic malware detection based on extracting patterns from value sets of registers [Volume 5, Issue 1, 2013, Pages 71-82]
-
Shahriari, H. R.
Prediction of user's trustworthiness in web-based social networks via text mining [Volume 5, Issue 2, 2013, Pages 171-187]
-
Soodkhah Mohammadi, M.
Design and formal verification of DZMBE+ [Volume 5, Issue 1, 2013, Pages 37-53]
T
-
Tork Ladani, B.
GTrust: a group based trust model [Volume 5, Issue 2, 2013, Pages 155-170]