 |
Shafieinejad, Alireza
A Secure Auditable Log based on Blockchain [Volume 13, Number 2] |
 |
Eissazadeh, Soheil
A Secure Auditable Log based on Blockchain [Volume 13, Number 2] |
 |
Arabnouri, Arian
A Secure Auditable Log based on Blockchain [Volume 13, Number 2] |
 |
Safkhani, Masoumeh
Violation of Integrity in an End-to-End Privacy-Preserving Protocol in IoT-Based Health Monitoring Systems [Volume 13, Number 2] |
 |
Gholami Sabzevar, Fatemeh
Violation of Integrity in an End-to-End Privacy-Preserving Protocol in IoT-Based Health Monitoring Systems [Volume 13, Number 2] |
 |
Jahanbani, Mohsen
Investigation of Power Analysis Attack on the SPEEDY Block Cipher and Countermeasure Using Domain-Oriented Masking (DOM) Method [Volume 13, Number 2] |
 |
Alizadeh, Javad
Investigation of Power Analysis Attack on the SPEEDY Block Cipher and Countermeasure Using Domain-Oriented Masking (DOM) Method [Volume 13, Number 2] |
 |
Khoormehr, Keivan
Investigation of Power Analysis Attack on the SPEEDY Block Cipher and Countermeasure Using Domain-Oriented Masking (DOM) Method [Volume 13, Number 2] |
 |
Ebrahimi Atani, Reza
Prevention and detection of botnet attacks in IoT using ensemble learning methods [Volume 13, Number 2] |
 |
Pishdad, Fateme
Prevention and detection of botnet attacks in IoT using ensemble learning methods [Volume 13, Number 2] |
 |
Shahgholi Ghahfarokhi, Behrouz
Intelligent Automation of Scenario Execution in Cyber Ranges Using Machine Learning Techniques [Volume 13, Number 2] |
 |
Tork Ladani, Behrouz
Intelligent Automation of Scenario Execution in Cyber Ranges Using Machine Learning Techniques [Volume 13, Number 2] |
 |
Karimi, Farnoosh
Intelligent Automation of Scenario Execution in Cyber Ranges Using Machine Learning Techniques [Volume 13, Number 2] |
 |
Hadavi, Mohammad Ali
Security Analysis of a Lightweight Ownership Transfer Protocol in RFID Systems [Volume 13, Number 2] |
 |
Adeli, Morteza
Security Analysis of a Lightweight Ownership Transfer Protocol in RFID Systems [Volume 13, Number 2] |
 |
Karimi , Ghodsieh
Security Analysis of a Lightweight Ownership Transfer Protocol in RFID Systems [Volume 13, Number 2] |
 |
Sadeghi , Atiye
[Volume 13, Number 2] |
 |
Noroozi, Mahnaz
[Volume 13, Number 2] |
 |
Majidi, Mohammad Hassan
IEPS image encryption: Encryption based on PWLCM and SHA-512 hash function [Volume 13, Number 2] |
 |
Hashemi, Seyed Hesam Odin
IEPS image encryption: Encryption based on PWLCM and SHA-512 hash function [Volume 13, Number 2] |
 |
Tafazoli, Tala
Analysis of strategic issues in the field of general data protection regulations [Volume 13, Number 2] |
 |
ArabSorkhi, Abouzar
Analysis of strategic issues in the field of general data protection regulations [Volume 13, Number 2] |
 |
Kalantari, Reza
The method of risk analysis of communication and information infrastructure modules and the extraction of preventive security requirements [Volume 13, Number 1] |
 |
Arabsorkhi, Abouzar
The method of risk analysis of communication and information infrastructure modules and the extraction of preventive security requirements [Volume 13, Number 1] |
 |
Yadegari, Amir Mansour
The method of risk analysis of communication and information infrastructure modules and the extraction of preventive security requirements [Volume 13, Number 1] |
 |
Taaj, nasrin
The method of risk analysis of communication and information infrastructure modules and the extraction of preventive security requirements [Volume 13, Number 1] |
 |
Rastegari, Parvin
Preserving privacy in the age of information technology development, lessons from the european general data protection regulation [Volume 13, Number 1] |
 |
Siabi, Babak
Preserving privacy in the age of information technology development, lessons from the european general data protection regulation [Volume 13, Number 1] |
 |
Tawakoli, Kasra
FIDO Authentication Standard: Key Applications for Securing Information Exchange [Volume 13, Number 1] |
 |
Zamani, Mohammad Reza
FIDO Authentication Standard: Key Applications for Securing Information Exchange [Volume 13, Number 1] |
 |
Asadi, Morteza
FIDO Authentication Standard: Key Applications for Securing Information Exchange [Volume 13, Number 1] |
 |
Tadayon, Mohammad Hesam
An Overview of Physical-Layer Authentication Methods, Performance Metrics, and Their Vulnerabilities to Attacks [Volume 13, Number 1] |
 |
Razavizadeh, Seyed Mohammad
An Overview of Physical-Layer Authentication Methods, Performance Metrics, and Their Vulnerabilities to Attacks [Volume 13, Number 1] |
 |
Rajabi, Parsa
An Overview of Physical-Layer Authentication Methods, Performance Metrics, and Their Vulnerabilities to Attacks [Volume 13, Number 1] |
 |
Rajabzadeh Asaar, Maryam
A review of blockchain-based data auditing protocols and analyzing their general framework [Volume 13, Number 1] |
 |
Banaeian Far, Saeed
A review of blockchain-based data auditing protocols and analyzing their general framework [Volume 13, Number 1] |
 |
Ahmadian Attari, Mahmoud
A Survey Of Code-Based Cryptography Schemes and the Standardization Process of Post-Quantum Cryptography: The Beginning of a New Era [Volume 13, Number 1] |
 |
Zali, Amirhossein
A Survey Of Code-Based Cryptography Schemes and the Standardization Process of Post-Quantum Cryptography: The Beginning of a New Era [Volume 13, Number 1] |
 |
Khalvan, Arash
A Survey Of Code-Based Cryptography Schemes and the Standardization Process of Post-Quantum Cryptography: The Beginning of a New Era [Volume 13, Number 1] |
 |
Sadeghi, Sadegh
A Comprehensive Exploration of Deep Learning Approaches in Differential Cryptanalysis of Lightweight Block Ciphers [Volume 12, Number 1] |
 |
Bagheri, Nasour
A Comprehensive Exploration of Deep Learning Approaches in Differential Cryptanalysis of Lightweight Block Ciphers [Volume 12, Number 1] |
 |
Mirzaali Mazandarani, Iman
A Comprehensive Exploration of Deep Learning Approaches in Differential Cryptanalysis of Lightweight Block Ciphers [Volume 12, Number 1] |
 |
Amini, Morteza
Integrity checking of outsourced computations [Volume 12, Number 1] |
 |
Dolatnezhad Samarin, Somayeh
Integrity checking of outsourced computations [Volume 12, Number 1] |
 |
Ali, Mohammad
Privacy-preserving data and function in cloud environments using homomorphic encryption [Volume 12, Number 1] |
 |
Rahmati, Farhad
Privacy-preserving data and function in cloud environments using homomorphic encryption [Volume 12, Number 1] |
 |
Hosseingholizadeh, Amin
Privacy-preserving data and function in cloud environments using homomorphic encryption [Volume 12, Number 1] |
 |
Pirmoradian, Fatemeh
Methods of analyzing and proving the security of security protocols [Volume 12, Number 1] |
 |
Safkhani, Masomeh
Methods of analyzing and proving the security of security protocols [Volume 12, Number 1] |
 |
Dakhilalian, MOhammad
Methods of analyzing and proving the security of security protocols [Volume 12, Number 1] |
 |
Sadeghi, Sadegh
An overview of secure authentication methods using ECG biometrics with deep learning algorithms [Volume 12, Number 1] |
 |
Safari, Amirhossein
An overview of secure authentication methods using ECG biometrics with deep learning algorithms [Volume 12, Number 1] |
 |
Mokhtari, Narges
An overview of secure authentication methods using ECG biometrics with deep learning algorithms [Volume 12, Number 1] |
 |
Bagheri, Nasour
Review of the security models with emphasis on leakage-resilient key exchange protocols [Volume 12, Number 1] |
 |
Zaeembashi, Ali
Review of the security models with emphasis on leakage-resilient key exchange protocols [Volume 12, Number 1] |
 |
Zarbi, Nasser
Review of the security models with emphasis on leakage-resilient key exchange protocols [Volume 12, Number 1] |
 |
Mala, Hamid
Verifiable Database Supporting Range Query [Volume 12, Number 2] |
 |
Tahami, Seyed Hossein
Verifiable Database Supporting Range Query [Volume 12, Number 2] |
 |
Jahanian, Ali
FPGA Implementation of Polynomial Multiplication in NTRU Prime PQC Algorithms [Volume 12, Number 2] |
 |
Salarifard , Raziyeh
FPGA Implementation of Polynomial Multiplication in NTRU Prime PQC Algorithms [Volume 12, Number 2] |
 |
Rashidian, Reza
FPGA Implementation of Polynomial Multiplication in NTRU Prime PQC Algorithms [Volume 12, Number 2] |
 |
Noorani Asl, Seyyed Hadi
Practical key recovery attack on authentication and key agreement protocol SecAuthUAV in a network of drones and provide an
improved protocol [Volume 12, Number 2] |
 |
Alizadeh, Javad
Practical key recovery attack on authentication and key agreement protocol SecAuthUAV in a network of drones and provide an
improved protocol [Volume 12, Number 2] |
 |
Samiei, Mahdiyeh
A comprehensive evaluation of deep learning based steganalysis performance in detecting spatial methods [Volume 12, Number 2] |
 |
Sabeti, Vajiheh
A comprehensive evaluation of deep learning based steganalysis performance in detecting spatial methods [Volume 12, Number 2] |
 |
Bagheri, Nasour
Electrocardiogram Signal Authentication System based on Deep Learning [Volume 12, Number 2] |
 |
Beigi, Akram
Electrocardiogram Signal Authentication System based on Deep Learning [Volume 12, Number 2] |
 |
Maleki Lonbar, Sajjad
Electrocardiogram Signal Authentication System based on Deep Learning [Volume 12, Number 2] |
 |
Tadayon, Mohammad Hesam
Analysis of global trends in providing educational frameworks for training cyber security professionals [Volume 12, Number 2] |
 |
Rahdari, Ahmad
Analysis of global trends in providing educational frameworks for training cyber security professionals [Volume 12, Number 2] |
 |
Niksefat, Salman
A New Mixing Scheme to Improve Privacy in Bitcoin Cryptocurrency Transactions [Volume 12, Number 2] |
 |
Norouzi Cholcheh, Hadi
A New Mixing Scheme to Improve Privacy in Bitcoin Cryptocurrency Transactions [Volume 12, Number 2] |
 |
Erfani, Hossein
A Secure Authentication and Key Agreement Scheme for LoRaWAN [Volume 12, Number 2] |
 |
Hajian, Rahman
A Secure Authentication and Key Agreement Scheme for LoRaWAN [Volume 12, Number 2] |
 |
sabaei, Mohamadamin
A Secure Authentication and Key Agreement Scheme for LoRaWAN [Volume 12, Number 2] |
 |
Palimi, Sahar
A Secure Authentication and Key Agreement Scheme for LoRaWAN [Volume 12, Number 2] |
 |
Jafari, Zahra
A Secure Authentication and Key Agreement Scheme for LoRaWAN [Volume 12, Number 2] |
 |
Aref, Mohammadreza
Consensus Method with High Security and Low Communication Load [Volume 11, Number 2] |
 |
Mohajery, Javad
Consensus Method with High Security and Low Communication Load [Volume 11, Number 2] |
 |
Hediehloo, Alireza
Consensus Method with High Security and Low Communication Load [Volume 11, Number 2] |
 |
Houshmand , Monireh
Multi-Party Quantum Dialogue with the Capability to Expand the Number of Users at Runtime [Volume 11, Number 2] |
 |
Homaei , Hossein
Multi-Party Quantum Dialogue with the Capability to Expand the Number of Users at Runtime [Volume 11, Number 2] |
 |
Khazaei, Ali
Multi-Party Quantum Dialogue with the Capability to Expand the Number of Users at Runtime [Volume 11, Number 2] |
 |
Sadeghigol, Zahra
An Overview of Security Standards in the Field of ICT in order to Determining the Appropriate Methodology for the Security Evaluation of Equipment Related to Information and Communication Technology in the Power Industry [Volume 11, Number 1] |
 |
Nobakht, Vida
An Overview of Security Standards in the Field of ICT in order to Determining the Appropriate Methodology for the Security Evaluation of Equipment Related to Information and Communication Technology in the Power Industry [Volume 11, Number 1] |
 |
Rahmani, Mahsa
An Overview of Security Standards in the Field of ICT in order to Determining the Appropriate Methodology for the Security Evaluation of Equipment Related to Information and Communication Technology in the Power Industry [Volume 11, Number 1] |
 |
Ahanj , Sofia
An Overview of Security Standards in the Field of ICT in order to Determining the Appropriate Methodology for the Security Evaluation of Equipment Related to Information and Communication Technology in the Power Industry [Volume 11, Number 1] |
 |
Sedighian Kashi, Saeed
Inventing a Method to Save the Fog Node from Attacks [Volume 11, Number 1] |
 |
Khasteh, Seyed Hossein
Inventing a Method to Save the Fog Node from Attacks [Volume 11, Number 1] |
 |
Azarkasb, Seyed Omid
Inventing a Method to Save the Fog Node from Attacks [Volume 11, Number 1] |
 |
Ghasemi Gol, Mohammad
Providing an RPL-based Reliable Routing Method in the Internet of Things [Volume 11, Number 1] |
 |
Khatouni, Reza
Providing an RPL-based Reliable Routing Method in the Internet of Things [Volume 11, Number 1] |
 |
Salarifard, Raziyeh
A High-Speed Systolic Field Multiplication for Edwards 25519 Curve [Volume 11, Number 1] |
 |
Akhoundi Zardeyni, Muhammad Rasoul
A High-Speed Systolic Field Multiplication for Edwards 25519 Curve [Volume 11, Number 1] |
 |
Tork Ladani, Behrouz
A Tool for Detecting Man in the Browser (MitB) Attacks using Dynamic Analysis of Web Pages [Volume 11, Number 1] |
 |
Iranpour Mobarakeh, Majid
A Tool for Detecting Man in the Browser (MitB) Attacks using Dynamic Analysis of Web Pages [Volume 11, Number 1] |
 |
Dorri Nogoorani , Sadegh
Management of Electronic Health Records with Preservation of Privacy using the Blockchain Technology [Volume 11, Number 1] |
 |
Rezaei, Mahsa
Management of Electronic Health Records with Preservation of Privacy using the Blockchain Technology [Volume 11, Number 1] |
 |
Jadidi, Mohammad
Masking Midori64 against Correlation Power Analysis Attack [Volume 11, Number 1] |
 |
Khadem, Behrooz
Masking Midori64 against Correlation Power Analysis Attack [Volume 11, Number 1] |
 |
Ghanbari , Hamid
Masking Midori64 against Correlation Power Analysis Attack [Volume 11, Number 1] |
 |
Moazami, Farokhlagha
Lightweight and Secure Authentication Key Agreement Protocol for Smart Grid [Volume 11, Number 1] |
 |
Baghestani , Seyed Hamid
Lightweight and Secure Authentication Key Agreement Protocol for Smart Grid [Volume 11, Number 1] |
 |
Alizadeh, Bijan
Vulnerability Analysis of Digital Circuits against Capacitor-based Timing Hardware Trojan [Volume 11, Number 1] |
 |
Khormizi, Fatemeh
Vulnerability Analysis of Digital Circuits against Capacitor-based Timing Hardware Trojan [Volume 11, Number 1] |
 |
Hamian, Negin
Unmanned Cyber Security Requirements in sub-Transmission Substation [Volume 11, Number 1] |
 |
Zafari, Leila
Unmanned Cyber Security Requirements in sub-Transmission Substation [Volume 11, Number 1] |
 |
Mozafari , Azam
Unmanned Cyber Security Requirements in sub-Transmission Substation [Volume 11, Number 1] |
 |
Alizadeh, Javad
Key Discovery and Forgery Attack on a Key Agreement Protocol with Authentication for Wireless Sensor Network [Volume 11, Number 1] |
 |
Allahdadi Ghiyasabadi , Amir
Key Discovery and Forgery Attack on a Key Agreement Protocol with Authentication for Wireless Sensor Network [Volume 11, Number 1] |
 |
Sobhani, Masomeh
Wavelet-based Image Steganography using the Idea of Embedding in Areas of High Frequency Subbands with Large Variations [Volume 11, Number 2] |
 |
Sabeti , Vajiheh
Wavelet-based Image Steganography using the Idea of Embedding in Areas of High Frequency Subbands with Large Variations [Volume 11, Number 2] |
 |
Hadavi, Mohammad Ali
Modeling Attacker’s Capability Level Focusing on Injection Attacks on Web Applications [Volume 11, Number 2] |
 |
Moqimi , Sara
Modeling Attacker’s Capability Level Focusing on Injection Attacks on Web Applications [Volume 11, Number 2] |
 |
Moazzami, Farrokhlagha
Security Analysis of an Anonymous Authentication and Key Agreement Scheme in Wireless Body Area Network [Volume 11, Number 2] |
 |
Marandi, Saba
Security Analysis of an Anonymous Authentication and Key Agreement Scheme in Wireless Body Area Network [Volume 11, Number 2] |
 |
Bamdad Moghaddam, Azadeh
Designing and Implementing two Laboratory Samples of the Intelligent System for Detecting Encrypted VoIP Skype Traffic and the Lantern Escape Tool using Deep Learning Method [Volume 11, Number 2] |
 |
Taaj, Nasrin
Designing and Implementing two Laboratory Samples of the Intelligent System for Detecting Encrypted VoIP Skype Traffic and the Lantern Escape Tool using Deep Learning Method [Volume 11, Number 2] |
 |
saeidi, Mahmoud
Designing and Implementing two Laboratory Samples of the Intelligent System for Detecting Encrypted VoIP Skype Traffic and the Lantern Escape Tool using Deep Learning Method [Volume 11, Number 2] |
 |
Sadeghiyan, Babak
Electronic Money Laundering Detection in Transactions of Payment Service Providers [Volume 11, Number 2] |
 |
Nazari, Ali
Electronic Money Laundering Detection in Transactions of Payment Service Providers [Volume 11, Number 2] |
 |
Elmi sola, Yaser
overview of ways to enhance the security of video surveillance networks using blockchain [Volume 9, Number 2] |
 |
Samouti, Ali
overview of ways to enhance the security of video surveillance networks using blockchain [Volume 9, Number 2] |
 |
Moghaddam, Matineh
Provide a New Way to Detect emails's Spam and Phishing and Bank Phishing Using Genetic Algorithms and Prohibited Search [Volume 9, Number 2] |
 |
Torabi, MohammadAmin
Provide a New Way to Detect emails's Spam and Phishing and Bank Phishing Using Genetic Algorithms and Prohibited Search [Volume 9, Number 2] |
 |
Fani, Majid
Provide a New Way to Detect emails's Spam and Phishing and Bank Phishing Using Genetic Algorithms and Prohibited Search [Volume 9, Number 2] |
 |
Alimoradi, Reza
Browse searchable encryption schemes: Classification, methods and recent developments [Volume 9, Number 2] |
 |
Gholami, Ahmad
Browse searchable encryption schemes: Classification, methods and recent developments [Volume 9, Number 2] |
 |
Noorallahzadeh, Mohammad Hossein
Browse searchable encryption schemes: Classification, methods and recent developments [Volume 9, Number 2] |
 |
porghahramani, babak
Analysis of Cybercrime and Cyber Attacks during the COVID-19 Pandemic [Volume 9, Number 2] |
 |
katanchi, elnaz
Analysis of Cybercrime and Cyber Attacks during the COVID-19 Pandemic [Volume 9, Number 2] |
 |
Nobakht, Veda
Determining the appropriate methodology for the security evaluation of equipment related to information and communication technology in the power industry [Volume 9, Number 2] |
 |
Sadeghigole, Zahra
Determining the appropriate methodology for the security evaluation of equipment related to information and communication technology in the power industry [Volume 9, Number 2] |
 |
Rahmani, Mahsa
Determining the appropriate methodology for the security evaluation of equipment related to information and communication technology in the power industry [Volume 9, Number 2] |
 |
Ahanj, Sofia
Determining the appropriate methodology for the security evaluation of equipment related to information and communication technology in the power industry [Volume 9, Number 2] |
 |
Ferdosi, Zahra
Evaluating Challenges of the National Cryptocurrency [Volume 9, Number 1] |
 |
Bahrololum, Marjan
Evaluating Challenges of the National Cryptocurrency [Volume 9, Number 1] |
 |
Orumiehchiha, Mohammad Ali
Security of Sponge structures [Volume 9, Number 1] |
 |
Khalesi, Akram
Security of Sponge structures [Volume 9, Number 1] |
 |
Shokrollahi, Saeed
A Review of Intrusion Detection Defense Solutions Based on Software Defined Network [Volume 9, Number 1] |
 |
Mohammadalipour, Masoud
A Review of Intrusion Detection Defense Solutions Based on Software Defined Network [Volume 9, Number 1] |
 |
Sakhidek Hovshin, Mohammad
A New Model for Email Spam Detection using Hybrid of Magnetic Optimization Algorithm with Harmony Search Algorithm [Volume 9, Number 1] |
 |
Soleimanian Gharehchopogh, farhad
A New Model for Email Spam Detection using Hybrid of Magnetic Optimization Algorithm with Harmony Search Algorithm [Volume 9, Number 1] |
 |
Mohammadi, HamidReza
A survey on the wi-fi wireless network systems penetration approaches [Volume 9, Number 1] |
 |
bag-mohammadi, Mozafar
A survey on RPL attacks and their countermeasures [Volume 9, Number 1] |
 |
Seifi, Younes
A survey on RPL attacks and their countermeasures [Volume 9, Number 1] |
 |
Pishdar, Mohammad
A survey on RPL attacks and their countermeasures [Volume 9, Number 1] |
 |
nazari, fariba
Identification and ranking of occupational and technical stress factors of information security in Aghajari oil and gas Exploitation Company [Volume 8, Number 2] |
 |
jari, mohamad
Identification and ranking of occupational and technical stress factors of information security in Aghajari oil and gas Exploitation Company [Volume 8, Number 2] |
 |
Parsa, aeed
An automated approach to analysis and classification of Crypto-ransomwares’ family [Volume 8, Number 2] |
 |
Alaeiyan, Mohammadhadi
An automated approach to analysis and classification of Crypto-ransomwares’ family [Volume 8, Number 2] |
 |
S. jafari, Seyed Ata
An automated approach to analysis and classification of Crypto-ransomwares’ family [Volume 8, Number 2] |
 |
Soleimany, Hadi
An Introduction to Differential Computation Analysis (DCA) on the withe-box cryptography algorithms [Volume 8, Number 2] |
 |
Seddighi, Mohsen
An Introduction to Differential Computation Analysis (DCA) on the withe-box cryptography algorithms [Volume 8, Number 2] |
 |
Alizadeh, Javad
An Introduction to Differential Computation Analysis (DCA) on the withe-box cryptography algorithms [Volume 8, Number 2] |
 |
Saleh Esfahani, Mahmoud
A survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions [Volume 8, Number 2] |
 |
Hasani Ahangar, Mohammad Reza
A survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions [Volume 8, Number 2] |
 |
Pourshams, AmirHossein
A survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions [Volume 8, Number 2] |
 |
Soleimany, Hadi
Threshold Implementation as a Countermeasure against Power Analysis Attacks [Volume 8, Number 2] |
 |
Zarei , Sara
Threshold Implementation as a Countermeasure against Power Analysis Attacks [Volume 8, Number 2] |
 |
ghayoori, majid
Intrusion Detection Using Evolutionary Hidden Markov Model [Volume 8, Number 2] |
 |
darvishi, mohammad
Intrusion Detection Using Evolutionary Hidden Markov Model [Volume 8, Number 2] |
 |
Jalaly Bidgoly, Amir
A survey of rumor detection methods in social networks [Volume 8, Number 1] |
 |
Sadeghi, Fariba
A survey of rumor detection methods in social networks [Volume 8, Number 1] |
 |
Soleimanian Gharehchopogh, farhad
A New Hybrid Approach of K-Nearest Neighbors Algorithm with Particle Swarm Optimization for E-Mail Spam Detection [Volume 8, Number 1] |
 |
Mortazavi, Atefeh
A New Hybrid Approach of K-Nearest Neighbors Algorithm with Particle Swarm Optimization for E-Mail Spam Detection [Volume 8, Number 1] |
 |
shayeghbrojeni, hamidreza
A Review of Consensus Algorithms in Blockchain [Volume 8, Number 1] |
 |
bahri, jamileh
A Review of Consensus Algorithms in Blockchain [Volume 8, Number 1] |
 |
Abbasi, Mahdi
A Performance Survey of Meta-Heuristic And Brute-Force Search Algorithms to Cryptanalysis The SDES Encryption Algorithm
[Volume 7, Number 2] |
 |
Moradi, Meysam
A Performance Survey of Meta-Heuristic And Brute-Force Search Algorithms to Cryptanalysis The SDES Encryption Algorithm
[Volume 7, Number 2] |
 |
pazhouhesh, amin
Fundamental Issues in Criminalization of Virtal Cybercrime
[Volume 7, Number 2] |
 |
zamani, afsaneh
Fundamental Issues in Criminalization of Virtal Cybercrime
[Volume 7, Number 2] |
 |
ghayoori sales, majid
Overview of Intrusion Detection Techniques in Database
[Volume 7, Number 2] |
 |
moradi, javad
Overview of Intrusion Detection Techniques in Database
[Volume 7, Number 2] |
 |
Deypir, Mahmood
Survey the Security Function of Integration of vehicular ad hoc Networks with Software-defiend Networks [Volume 7, Number 2] |
 |
ghasabi, Mozhgan
Survey the Security Function of Integration of vehicular ad hoc Networks with Software-defiend Networks [Volume 7, Number 2] |
 |
Moazemi, Farokh Lagha
Investigating Methods of Kleptography [Volume 7, Number 2] |
 |
Soleimany, Hadi
Investigating Methods of Kleptography [Volume 7, Number 2] |
 |
Shajari, Mehdi
IEC 60870-5-104 Protocol Security Challenges and Countermeasures Identification [Volume 7, Number 2] |
 |
Ahmadian, Mohammad mehdi
IEC 60870-5-104 Protocol Security Challenges and Countermeasures Identification [Volume 7, Number 2] |
 |
zamani, afsaneh
Prevention Management of Realization and continuity of the futile cycle of cyber-crimes [Volume 7, Number 1] |
 |
pazhouhesh, amin
Prevention Management of Realization and continuity of the futile cycle of cyber-crimes [Volume 7, Number 1] |
 |
Asgari Mehr, Masoud
Check the Safe coding standards in language C++ [Volume 7, Number 1] |
 |
mohammadnia, mousa
Check the Safe coding standards in language C++ [Volume 7, Number 1] |
 |
moammer, morteza
Check the Safe coding standards in language C++ [Volume 7, Number 1] |
 |
amiri, Mohammed Mohsen
Check the Safe coding standards in language C++ [Volume 7, Number 1] |
 |
Haj Seyyed Javadi, Hamid
Search over Encrypted Data: Functionalities and Challenges [Volume 7, Number 1] |
 |
Bayat, Majid
Search over Encrypted Data: Functionalities and Challenges [Volume 7, Number 1] |
 |
Najafi, Aniseh
Search over Encrypted Data: Functionalities and Challenges [Volume 7, Number 1] |
 |
Sadeghi, Mohammad Reaza
Approaches and challenges of the white-box model of the block cipher schemes implementation [Volume 7, Number 1] |
 |
Soleimany, Hadi
Approaches and challenges of the white-box model of the block cipher schemes implementation [Volume 7, Number 1] |
 |
MoradAfifi, Raheleh
Jump Index in T-functions for designing a new basic structure of stream ciphers [Volume 5, Number 1] |
 |
Sajadieh, Seyed Mahdi
Jump Index in T-functions for designing a new basic structure of stream ciphers [Volume 5, Number 1] |
 |
Hadipour, Ali
Jump Index in T-functions for designing a new basic structure of stream ciphers [Volume 5, Number 1] |
 |
golbaghi, hadi
Metamorphic Malware Identification Combining Static and Dynamic Analyzes [Volume 7, Number 1] |
 |
khalilian, alireza
Metamorphic Malware Identification Combining Static and Dynamic Analyzes [Volume 7, Number 1] |
 |
vahidi asl, mojtaba
Metamorphic Malware Identification Combining Static and Dynamic Analyzes [Volume 7, Number 1] |
 |
Nowroozi, Alireza
A review of privacy in online social networks [Volume 6, Number 2] |
 |
Ghezavati, Kamaleddin
A review of privacy in online social networks [Volume 6, Number 2] |
 |
Naderi, Shaghayegh
Risk Management in Local Search Engine Systems [Volume 6, Number 2] |
 |
Koushkaki, Hassan
Risk Management in Local Search Engine Systems [Volume 6, Number 2] |
 |
Taj Neyshabouri, Nasrin
Risk Management in Local Search Engine Systems [Volume 6, Number 2] |
 |
Omidvar Sarkandi, Mahsa
Risk Management in Local Search Engine Systems [Volume 6, Number 2] |
 |
Kaedi, Marjan
A Review on Website Fingerprinting Attacks [Volume 6, Number 2] |
 |
Bohlooli, Ali
A Review on Website Fingerprinting Attacks [Volume 6, Number 2] |
 |
Taebi, Maryam
A Review on Website Fingerprinting Attacks [Volume 6, Number 2] |
 |
Shakeri, Hassan
A Confidence-Aware Trust Approach for Detecting Indirect Sybil Attacks in Wireless Sensor Networks Considering Time Factor [Volume 6, Number 2] |
 |
Tabatabaei Parsa, Sayed Mohammad
A Confidence-Aware Trust Approach for Detecting Indirect Sybil Attacks in Wireless Sensor Networks Considering Time Factor [Volume 6, Number 2] |
 |
Zaghyan, Ali
Survey of Electronic Election Based on HomomorphicEncryption [Volume 6, Number 2] |
 |
Sajjadieh, Seyed Mahdi
Survey of Electronic Election Based on HomomorphicEncryption [Volume 6, Number 2] |
 |
Rezaee Adaryani, Sajad
Survey of Electronic Election Based on HomomorphicEncryption [Volume 6, Number 2] |
 |
Norozi, Zeinolabedin
A Survey on Lightweight Hardware Implementation of AES [Volume 6, Number 2] |
 |
Bagheri, Nasour
A Survey on Lightweight Hardware Implementation of AES [Volume 6, Number 2] |
 |
Jahanbani, Mohsen
A Survey on Lightweight Hardware Implementation of AES [Volume 6, Number 2] |
 |
Naderi, Shaghayegh
Security Indexes of Development Life Cycle of Local
Search Engines
[Volume 6, Number 1] |
 |
Koushkaki, Hassan
Security Indexes of Development Life Cycle of Local
Search Engines
[Volume 6, Number 1] |
 |
Omidvar Sarkandi, Mahsa
Security Indexes of Development Life Cycle of Local
Search Engines
[Volume 6, Number 1] |
 |
Taj Neyshabouri, Nasrin
Security Indexes of Development Life Cycle of Local
Search Engines
[Volume 6, Number 1] |
 |
Zolfaghari, Zahra
Introduction of TMTO attack on Hash Functions [Volume 6, Number 1] |
 |
Bagheri, Nasour
Introduction of TMTO attack on Hash Functions [Volume 6, Number 1] |
 |
mala, hamid
Survey of Secure Multiparty Summation protocols and their challenges [Volume 6, Number 1] |
 |
ashouri talouki, maede
Survey of Secure Multiparty Summation protocols and their challenges [Volume 6, Number 1] |
 |
azizi, shadi
Survey of Secure Multiparty Summation protocols and their challenges [Volume 6, Number 1] |
 |
mala, hamid
Survey of group location privacy approaches in location-based services and its challenges [Volume 5, Number 2] |
 |
Ashouri-Talouki, maede
Survey of group location privacy approaches in location-based services and its challenges [Volume 5, Number 2] |
 |
azizi, shadi
Survey of group location privacy approaches in location-based services and its challenges [Volume 5, Number 2] |
 |
alipour, elahe
Review of Image Steganography Based on LSB and Pixel Classification and Providing a New Method in This Area [Volume 5, Number 2] |
 |
rajabloo, samira
Review of Image Steganography Based on LSB and Pixel Classification and Providing a New Method in This Area [Volume 5, Number 2] |
 |
fateh, mansoor
Review of Image Steganography Based on LSB and Pixel Classification and Providing a New Method in This Area [Volume 5, Number 2] |
 |
Ebrahimi Atani, Reza
An overview of privacy preserving Data Publishing Techniques [Volume 5, Number 2] |
 |
Sadeghpour, Mehdi
An overview of privacy preserving Data Publishing Techniques [Volume 5, Number 2] |
 |
Goharei, Mohammad Reza
Overview of Jamming Operation in Smart Network [Volume 5, Number 2] |
 |
Arghavani, Mohamadamin
A Survey of Cube, Differential Fault Analysis Attacks and Linear Structures on Keccak Hash Function (SHA-3) [Volume 5, Number 2] |
 |
Safkhani, Masoumeh
A Survey of Cube, Differential Fault Analysis Attacks and Linear Structures on Keccak Hash Function (SHA-3) [Volume 5, Number 2] |
 |
Bayat, Majid
A review on attribute based access control in cloud environment [Volume 5, Number 1] |
 |
Doostari, Mohammad Ali
A review on attribute based access control in cloud environment [Volume 5, Number 1] |
 |
Rezaei, Saeid
A review on attribute based access control in cloud environment [Volume 5, Number 1] |
 |
mansoori, parvaneh
Performance assessment Bio- Inspired algorithms for solving backpack in the form of objective function minimization. [Volume 5, Number 1] |
 |
moradi, meysam
Performance assessment Bio- Inspired algorithms for solving backpack in the form of objective function minimization. [Volume 5, Number 1] |
 |
roozbahani, mahtab
Performance assessment Bio- Inspired algorithms for solving backpack in the form of objective function minimization. [Volume 5, Number 1] |
 |
Shakeri, Hassan
A Trust Management Approach for Sybil Attack Detection in Wireless Sensor Networks [Volume 5, Number 1] |
 |
Tabatabaei parsa, Sayed Mohamamd
A Trust Management Approach for Sybil Attack Detection in Wireless Sensor Networks [Volume 5, Number 1] |
 |
Ghasabi, Mozhgan
Security challenges and solutions in software defined networks [Volume 5, Number 1] |
 |
Deypir, Mahmood
Security challenges and solutions in software defined networks [Volume 5, Number 1] |
 |
Jafari Navimipour, Nima
[Volume 5, Number 1] |
 |
Mohammadi, Seyedeh Zeinab
[Volume 5, Number 1] |
 |
Feili, Mina
Awareness and Standards in the Field of Information Security_ [Volume 4, Number 2] |
 |
esmaeilpour, mansour
Awareness and Standards in the Field of Information Security_ [Volume 4, Number 2] |
 |
Ebrahimi Atani, Reza
An Overview of Security attacks and Software Implementation of Authenticated Encryption Algorithms in CAESAR Competition [Volume 4, Number 2] |
 |
Rezaei, Mohsen
An Overview of Security attacks and Software Implementation of Authenticated Encryption Algorithms in CAESAR Competition [Volume 4, Number 2] |
 |
alimoradi, reza
Hyper Elliptic Curve In Cryptography [Volume 4, Number 2] |
 |
moradi, meysam
Evaluate The Performance Of Meta-heuristic Different Algorithms in the Discovery of the Cryption Key Vigenere Encryption Algorithm [Volume 4, Number 1] |
 |
ahmadipari, mahdi
Evaluate The Performance Of Meta-heuristic Different Algorithms in the Discovery of the Cryption Key Vigenere Encryption Algorithm [Volume 4, Number 1] |
 |
nazari farokhi, ebrahim
Provida Method Based onSupport VectorMachinesForIntrusion DetectioninComputer Networks [Volume 3, Number 2] |
 |
nazari farokhi, Mohammad
Provida Method Based onSupport VectorMachinesForIntrusion DetectioninComputer Networks [Volume 3, Number 2] |
 |
salehpour, narges
Provida Method Based onSupport VectorMachinesForIntrusion DetectioninComputer Networks [Volume 3, Number 2] |
 |
javan, mohammadreza
Relay Selection for Secure Device to Device Communications [Volume 3, Number 2] |
 |
naderi, sonia
Relay Selection for Secure Device to Device Communications [Volume 3, Number 2] |
 |
Aghamohammadi, Reza
[Volume 3, Number 2] |
 |
Bagheri, Nasoor
[Volume 3, Number 2] |
 |
Nasiri, Hamid
An overview of software protection techniques against static and dynamic Attacks [Volume 4, Number 1] |
 |
Ebrahimi Atani, Reza
An overview of software protection techniques against static and dynamic Attacks [Volume 4, Number 1] |
 |
Rashidi, Afshin
An overview of software protection techniques against static and dynamic Attacks [Volume 4, Number 1] |
 |
Ebrahimi Atani, Reza
A review of the smart phone botnets and their confronting Techniques [Volume 4, Number 1] |
 |
Abed, Elham
A review of the smart phone botnets and their confronting Techniques [Volume 4, Number 1] |