| 1 | -- | 2 | Mohammad Reza Aref. Editorial |
| 3 | -- | 24 | Mohsen Pourpouneh, Rasoul Ramezanian. A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving |
| 25 | -- | 38 | Hamidreza Amini Khorasgani, Saba Asaad, Hossein Pilaram, Taraneh Eghlidos, Mohammad Reza Aref. On the design and security of a lattice-based threshold secret sharing scheme |
| 39 | -- | 52 | Farzane Aminmansour, Hamid Reza Shahriari. Aggrandizing the beast's limbs: patulous code reuse attack on ARM architecture |
| 53 | -- | 60 | Sharareh Zamanzadeh, Ali Jahanian 0001. Self authentication path insertion in FPGA-based design flow for tamper-resistant purpose |
| 61 | -- | 71 | Meisam Kamarei, Ahmad Patooghy, Mahdi Fazeli. Unauthenticated event detection in wireless sensor networks using sensors co-coverage |
| 73 | -- | 84 | Akram Khalesi, Hossein Bahramgiri, Davod Mansuri. A new method for accelerating impossible differential cryptanalysis and its application on LBlock |