| 87 | -- | 100 | Aniseh Najafi, Majid Bayat, Hamid Haj Seyyed Javadi. Privacy Preserving Attribute-Based Encryption with Conjunctive Keyword Search for E-health Records in Cloud |
| 101 | -- | 116 | Mina Erfan, Saeed Jalili. File Fragment Type Classification by Bag-Of-Visual-Words |
| 117 | -- | 129 | Mohammad Ali Hadavi, Arash Bagherdaei, Simin Ghasemi. IDOT: Black-Box Detection of Access Control Violations in Web Applications |
| 131 | -- | 143 | Hayyan Hasan, Behrouz Tork Ladani, Bahman Zamani. Curious-Monkey: Evolved Monkey for Triggering Malicious Payloads in Android Malware |
| 145 | -- | 156 | Sorour Sheidani, Ziba Eslami. Blind Multipurpose Image Watermarking with Perfect Security |
| 157 | -- | 162 | Mansoureh Labafniya, Shahram Etemadi Borujeni. An Obfuscation Method Based on CFGLUTs for Security of FPGAs |
| 163 | -- | 176 | Milad Salimian, Ali Jahanian 0001. Intensive Analysis of Physical Parameters of Power Sensors for Remote Side-Channel Attacks |
| 177 | -- | 208 | Gholam Reza Moghissi, Ali Payandeh. Better Sampling Method of Enumeration Solution for BKZ-Simulation |