Volume 15 (2023)
Volume 14 (2022)
Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
Research Article
Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher (Extended Version)

A. Rezaei Shahmirzdi; A. Azimi; M. Salmasizadeh; J. Mohajeri; M. R. Aref

Volume 10, Issue 1 , January 2018, Pages 3-13


  Impossible differential attack is a well-known mean to examine robustness of block ciphers. Using impossible differential cryptanalysis, we analyze security of a family of lightweight block ciphers, named Midori, that are designed considering low energy consumption. Midori state size can be ...  Read More

Research Article
An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks

A. Mohseni-Ejiyeh; M. Ashouri-Talouki; M. Mahdavi

Volume 10, Issue 1 , January 2018, Pages 15-27


  Due to the explosion of smart devices, data traffic over cellular networks has seen an exponential rise in recent years. This increase in mobile data traffic has caused an immediate need for offloading traffic from operators. Device-to-Device(D2D) communication is a promising solution to boost the ...  Read More

Research Article
Classification of encrypted traffic for applications based on statistical features

A. fanian; E. Mahdavi; H. Hassannejad

Volume 10, Issue 1 , January 2018, Pages 29-43


  Traffic classification plays an important role in many aspects of network management such as identifying type of the transferred data, detection of malware applications, applying policies to restrict network accesses and so on. Basic methods in this field were using some obvious traffic features like ...  Read More

Research Article
NETRU: A Non-commutative and Secure Variant of CTRU Cryptosystem

Reza Ebrahimi Atani; Shahabaddin Ebrahimi Atani; A. Hassani Karbasi

Volume 10, Issue 1 , January 2018, Pages 45-53


  In this paper we present a new finite field-based public key cryptosystem(NETRU) which is a non-commutative variant of CTRU. The original CTRU is defined by the ring of polynomials in one variable over a finite field F2. This system works in the ring R = F2[x]=hxN 􀀀 1i and is already broken ...  Read More

Research Article
BotRevealer: Behavioral Detection of Botnets based on Botnet Life-cycle

E. Khoshhalpour; H. R. Shahriari

Volume 10, Issue 1 , January 2018, Pages 55-61


  Nowadays, botnets are considered as essential tools for planning serious cyber attacks. Botnets are used to perform various malicious activities such as DDoS attacks and sending spam emails. Different approaches are presented to detect botnets; however most of them may be ineffective when ...  Read More

Research Article
A Decentralized Online Sortition Protocol

R. Ramezanian; M. Pourpouneh

Volume 10, Issue 1 , January 2018, Pages 63-69


  We propose a new online sortition protocol which is decentralized. We argue that our protocol has safety, fairness, randomness, non-reputation and openness properties. Sortition is a process that makes random decision and it is used in competitions and lotteries to determine who is the winner. In the ...  Read More