| 1 | -- | 8 | Amir Ashtari, Ahmad Shabani, Bijan Alizadeh. Mutual Lightweight PUF-Based Authentication Scheme Using Random Key Management Mechanism for Resource-Constrained IoT Devices |
| 9 | -- | 19 | Navid Vafaei, Maryam Porkar, Hamed Ramzanipour, Nasour Bagheri. Practical Differential Fault Analysis on SKINNY |
| 21 | -- | 31 | Hamed Ramzanipour, Navid Vafaei, Nasour Bagheri. Practical Differential Fault Analysis on CRAFT, a Lightweight Block Cipher |
| 33 | -- | 42 | Seyed Salar Ghazi, Haleh Amintoosi, Sahar Pilevar Moakhar. On the Suitability of Improved TrustChain for Smartphones |
| 43 | -- | 49 | Mohammad Ali 0003. Attribute-Based Remote Data Auditing and User Authentication for Cloud Storage Systems |
| 51 | -- | 60 | Fatemeh Deldar, Mahdi Abadi, Mohammad Ebrahimifard. Android Malware Detection Using One-Class Graph Neural Networks |
| 61 | -- | 69 | Amirhosein Sayyadabdi, Behrouz Tork Ladani, Bahman Zamani. Towards a Formal Approach for Detection of Vulnerabilities in the Android Permissions System |
| 71 | -- | 80 | Hadi Aghaee, Bahareh Akhbari. One-Shot Achievable Secrecy Rate Regions for Quantum Interference Wiretap Channel |
| 81 | -- | 92 | Somayeh Mozafari, Amir Jalaly Bidgoly. Lightweight Identification of Android Malware with Knowledge Distillation and Deep Learning Approach |
| 93 | -- | 99 | Muhamadali Hajisoltani, Raziyeh Salarifard, Hadi Soleimany. Secure and Low-Area Implementation of the AES Using FPGA |
| 101 | -- | 112 | Afshin Karampour, Maede Ashouri-Talouki, Behrouz Tork Ladani. Light-Weight Privacy-Preserving Data Aggregation Protocols in Smart Grid Metering Networks |
| 113 | -- | 121 | Maryam Saeedi Sadr, Mohammad Ali Hadavi. SecureKV: Secure Searchable Outsourcing of Key-Value Databases to the Public Cloud |
| 123 | -- | 133 | Sepehr Damavandi, Sadegh Dorri Nogoorani. An Electronic Voting Scheme Based on Blockchain Technology and Zero-Knowledge Proofs |
| 135 | -- | 149 | Sajjad Palanki, Alireza Shafieinejad. Attribute-Based Encryption with Efficient Attribute Revocation, Decryption Outsourcing, and Multi-Keyword Searching in Cloud Storage |