A
-
Abdolmaleki, B.
Enhancing privacy of recent authentication schemes for low-cost RFID systems [Volume 7, Issue 2, 2015, Pages 135-149]
-
Akhbari, B.
Enhancing privacy of recent authentication schemes for low-cost RFID systems [Volume 7, Issue 2, 2015, Pages 135-149]
-
Alizadeh, J.
Cryptanalysis of some first round CAESAR candidates [Volume 7, Issue 2, 2015, Pages 127-134]
-
Amini, M.
A combination of semantic and attribute-based access control model for virtual organizations [Volume 7, Issue 1, 2015, Pages 27-45]
-
Arasteh, M.
A combination of semantic and attribute-based access control model for virtual organizations [Volume 7, Issue 1, 2015, Pages 27-45]
-
Aref, M. R.
Cryptanalysis of some first round CAESAR candidates [Volume 7, Issue 2, 2015, Pages 127-134]
-
Aref, M. R.
Enhancing privacy of recent authentication schemes for low-cost RFID systems [Volume 7, Issue 2, 2015, Pages 135-149]
B
-
Bagheri, N.
Cryptanalysis of some first round CAESAR candidates [Volume 7, Issue 2, 2015, Pages 127-134]
-
Baghery, K.
Enhancing privacy of recent authentication schemes for low-cost RFID systems [Volume 7, Issue 2, 2015, Pages 135-149]
D
-
Dorri Nogoorani, S.
A collusion mitigation scheme for reputation systems [Volume 7, Issue 2, 2015, Pages 151-166]
E
-
Ebrahimi Atani, R.
EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations [Volume 7, Issue 2, 2015, Pages 115-126]
-
Ebrahimi Atani, Sh.
EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations [Volume 7, Issue 2, 2015, Pages 115-126]
G
-
Ganjavi, R.
A traceable optimistic fair exchange protocol in the standard model [Volume 7, Issue 1, 2015, Pages 3-14]
-
Ghasemi, S.
GGRA: a grouped gossip-based reputation aggregation algorithm [Volume 7, Issue 1, 2015, Pages 59-74]
-
Ghasemi Falavarjani, S.
GGRA: a grouped gossip-based reputation aggregation algorithm [Volume 7, Issue 1, 2015, Pages 59-74]
H
-
Hassani Karbasi, A.
EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations [Volume 7, Issue 2, 2015, Pages 115-126]
J
-
Jahanian, A.
Security-aware register placement to hinder malicious hardware updating and improve Trojan detectability [Volume 7, Issue 1, 2015, Pages 75-81]
-
Jalili, R.
Editorial [Volume 7, Issue 1, 2015, Pages 1-2]
-
Jalili, R.
Editorial [Volume 7, Issue 2, 2015, Pages 89-90]
-
Jalili, R.
A collusion mitigation scheme for reputation systems [Volume 7, Issue 2, 2015, Pages 151-166]
-
Jalili, S.
A novel local search method for microaggregation [Volume 7, Issue 1, 2015, Pages 15-26]
K
-
Kuchaki Rafsanjani, M.
Optimizing image steganography by combining the GA and ICA [Volume 7, Issue 1, 2015, Pages 47-58]
M
-
Mashhadi, S.
Computationally secure multiple secret sharing: models, schemes, and formal security analysis [Volume 7, Issue 2, 2015, Pages 91-99]
-
Mortazavi, R.
A novel local search method for microaggregation [Volume 7, Issue 1, 2015, Pages 15-26]
N
-
Niknafs, M.
A collusion mitigation scheme for reputation systems [Volume 7, Issue 2, 2015, Pages 151-166]
R
-
Rajabzadeh Asaar, M.
A traceable optimistic fair exchange protocol in the standard model [Volume 7, Issue 1, 2015, Pages 3-14]
-
Rashidi, B.
Efficient implementation of low time complexity and pipelined bit-parallel polynomial basis multiplier over binary finite fields [Volume 7, Issue 2, 2015, Pages 101-114]
-
Rezaeian Farashahi, R.
Efficient implementation of low time complexity and pipelined bit-parallel polynomial basis multiplier over binary finite fields [Volume 7, Issue 2, 2015, Pages 101-114]
S
-
Sadeghi, F.
Optimizing image steganography by combining the GA and ICA [Volume 7, Issue 1, 2015, Pages 47-58]
-
Sadeghi, H.
Cryptanalysis of some first round CAESAR candidates [Volume 7, Issue 2, 2015, Pages 127-134]
-
Salmasizadeh, M.
A traceable optimistic fair exchange protocol in the standard model [Volume 7, Issue 1, 2015, Pages 3-14]
-
Sayedi, S. M.
Efficient implementation of low time complexity and pipelined bit-parallel polynomial basis multiplier over binary finite fields [Volume 7, Issue 2, 2015, Pages 101-114]
T
-
Tork Ladani, Behrouz
GGRA: a grouped gossip-based reputation aggregation algorithm [Volume 7, Issue 1, 2015, Pages 59-74]
V
-
Vosoughi, M.
Security-aware register placement to hinder malicious hardware updating and improve Trojan detectability [Volume 7, Issue 1, 2015, Pages 75-81]
Z
-
Zarisfi Kermani, F.
Optimizing image steganography by combining the GA and ICA [Volume 7, Issue 1, 2015, Pages 47-58]