| 1 | -- | 2 | Rasool Jalili. Editorial |
| 3 | -- | 22 | Saeed Shokrollahi, Fereidoon Shams, Javad Esmaeili. Access control in ultra-large-scale systems using a data-centric middleware |
| 23 | -- | 34 | Shahram Rasoolzadeh, Zahra Ahmadian, Mahmoud Salmasizadeh, Mohammad Reza Aref. Total break of Zorro using linear and differential attacks |
| 35 | -- | 52 | Fatemeh Raji, Ali Miri, Mohammad Davarpanah Jazi. A centralized privacy-preserving framework for online social networks |
| 53 | -- | 66 | Hamzeh Ghasemzadeh, Ali Payandeh, Mohammad Reza Aref. Toward an energy efficient PKC-based key management system for wireless sensor networks |
| 67 | -- | 76 | Asghar Tavakoly, Reza Ebrahimi Atani. Improving Tor security against timing and traffic analysis attacks with fair randomization |
| 77 | -- | 89 | Mahdieh Zabihi, Majid Vafaei Jahan, Javad Hamidzadeh. A density based clustering approach to distinguish between web robot and human requests to a web server |