A

  • Ahmadian Attari, M. Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC [Volume 5, Issue 1, 2013, Pages 55-70]

  • Akhaee, M. A. A Survey on Digital Data Hiding Schemes: Principals, Algorithms, and Applications [Volume 5, Issue 1, 2013, Pages 5-36]

  • Akhaee, M. A. Robust multiplicative video watermarking using statistical modeling [Volume 5, Issue 1, 2013, Pages 83-95]

  • Amini, M. A semantic-aware role-based access control model for pervasive computing environments [Volume 5, Issue 2, 2013, Pages 119-140]

  • Amoozgar, M. A computational model and convergence theorem for rumor dissemination in social networks [Volume 5, Issue 2, 2013, Pages 141-154]

  • Avizheh, S. Convertible limited (multi-) verifier signature: new constructions and applications [Volume 5, Issue 2, 2013, Pages 189-208]

  • Azmi, R. STLR: a novel danger theory based structural TLR algorithm [Volume 5, Issue 2, 2013, Pages 209-225]

D

  • Diyanat, A. Robust multiplicative video watermarking using statistical modeling [Volume 5, Issue 1, 2013, Pages 83-95]

E

  • Eshghi, M. Image encryption based on chaotic tent map in time and frequency domains [Volume 5, Issue 1, 2013, Pages 97-110]

  • Ezhei, M. GTrust: a group based trust model [Volume 5, Issue 2, 2013, Pages 155-170]

G

  • Ghaemi Bafghi, A. Design and formal verification of DZMBE+ [Volume 5, Issue 1, 2013, Pages 37-53]

  • Ghaemmaghami, Sh. Robust multiplicative video watermarking using statistical modeling [Volume 5, Issue 1, 2013, Pages 83-95]

  • Ghiasi, M. DyVSoR: dynamic malware detection based on extracting patterns from value sets of registers [Volume 5, Issue 1, 2013, Pages 71-82]

H

  • Hassani, E. Image encryption based on chaotic tent map in time and frequency domains [Volume 5, Issue 1, 2013, Pages 97-110]

J

  • Jalili, R. Editorial [Volume 5, Issue 1, 2013, Pages 1-3]

  • Jalili, R. Editorial [Volume 5, Issue 2, 2013, Pages 117-118]

  • Javadi, A. A semantic-aware role-based access control model for pervasive computing environments [Volume 5, Issue 2, 2013, Pages 119-140]

M

  • Marvasti, F. A Survey on Digital Data Hiding Schemes: Principals, Algorithms, and Applications [Volume 5, Issue 1, 2013, Pages 5-36]

  • Mohammadhassanzadeh, H. Prediction of user's trustworthiness in web-based social networks via text mining [Volume 5, Issue 2, 2013, Pages 171-187]

P

  • Pishgoo, B. STLR: a novel danger theory based structural TLR algorithm [Volume 5, Issue 2, 2013, Pages 209-225]

R

  • Rajabzadeh Asaar, M. Convertible limited (multi-) verifier signature: new constructions and applications [Volume 5, Issue 2, 2013, Pages 189-208]

  • Ramezanian, R. A computational model and convergence theorem for rumor dissemination in social networks [Volume 5, Issue 2, 2013, Pages 141-154]

S

  • Sabzinejad Farash, M. Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC [Volume 5, Issue 1, 2013, Pages 55-70]

  • Salehi, Z. DyVSoR: dynamic malware detection based on extracting patterns from value sets of registers [Volume 5, Issue 1, 2013, Pages 71-82]

  • Salmasizadeh, M. Convertible limited (multi-) verifier signature: new constructions and applications [Volume 5, Issue 2, 2013, Pages 189-208]

  • Sami, A. DyVSoR: dynamic malware detection based on extracting patterns from value sets of registers [Volume 5, Issue 1, 2013, Pages 71-82]

  • Shahriari, H. R. Prediction of user's trustworthiness in web-based social networks via text mining [Volume 5, Issue 2, 2013, Pages 171-187]

  • Soodkhah Mohammadi, M. Design and formal verification of DZMBE+ [Volume 5, Issue 1, 2013, Pages 37-53]

T

  • Tork Ladani, B. GTrust: a group based trust model [Volume 5, Issue 2, 2013, Pages 155-170]