| 1 | -- | 2 | Mohammad Reza Aref. Editorial |
| 3 | -- | 16 | Parvin Rastegari, Mehdi Berenjkoub. An efficient certificateless signcryption scheme in the standard model |
| 17 | -- | 26 | Ehsan Aerabi, Mahdi Kaykha, Mahdi Fazeli, Ahmad Patooghy, Ahmad Akbari. Side channel parameter characteristics of code injection attacks |
| 27 | -- | 39 | Alireza Ahadipour, Alireza Keshavarz-Haddad. LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring |
| 41 | -- | 51 | Amir S. Mortazavi, Mahmoud Salmasizadeh, Amir Daneshgar. A new security proof for FMNV continuous non-malleable encoding scheme |
| 53 | -- | 72 | AliAkbar Sadeghi, Farzane Aminmansour, Hamid Reza Shahriari. Dwarf Frankenstein is still in your memory: tiny code reuse attacks |
| 73 | -- | 91 | Marzieh Safarzadeh, Mahboubeh Taghizadeh, Bahman Zamani, Behrouz Tork Ladani. An automatic test case generator for evaluating implementation of access control policies |