Abstract is missing.
- Statistical properties of square and square root mapsSeyed Mojtaba Dehnavi, M. R. Mirzaee Shamsabad, Akbar Mahmoodi Rishakani, Einollah Pasha. 1-5 [doi]
- Generalization of differential criteria for SboxesSeyed Mojtaba Dehnavi, M. R. Mirzaee Shamsabad, Akbar Mahmoodi Rishakani, Einollah Pasha. 6-9 [doi]
- Secure positioning for shipping containers in ports and terminals using WSNTaha Yasin Rezapour, Reza Ebrahimi Atani, Meer Soheil Abolghasemi. 10-14 [doi]
- m) for elliptic curve cryptosystemsBahram Rashidi, Reza Rezaeian Farashahi, Sayed Masoud Sayedi. 15-20 [doi]
- Tazhi: A novel technique for hunting trampoline gadgets of jump oriented programming (A class of code reuse attacks)AliAkbar Sadeghi, Farzane Aminmansour, Hamid Reza Shahriari. 21-26 [doi]
- New concepts in design of lightweight MDS diffusion layersAkbar Mahmoodi Rishakani, Seyed Mojtaba Dehnavi, M. R. Mirzaee Shamsabad, Hamidreza Maimani, Einollah Pasha. 27-32 [doi]
- Stereo image watermarking method based on binocular just noticeable differenceSepideh Akhavan Bitaghsir, Nader Karimi, Shekoofeh Azizi, Shadrokh Samavi. 33-38 [doi]
- A practical time complexity analysis of fuzzy rainbow tradeoffMahmoud Haghighi, Mohammad Dakhilalian. 39-43 [doi]
- CVC: Chaotic visual cryptography to enhance steganographyMelika Mostaghim, Reza Boostani. 44-48 [doi]
- Random data and key generation evaluation of some commercial tokens and smart cardsAhmad Boorghany, Siavash Bayat Sarmadi, Pamian Yousefi, Pouneh Gorji, Rasool Jalili. 49-54 [doi]
- Petri net model of insider attacks in SCADA systemPayam Mahmoudi Nasr, Ali Yazdian Varjani. 55-60 [doi]
- DoS and port scan attack detection in high speed networksMasoud Hasanifard, Behrouz Tork Ladani. 61-66 [doi]
- A mafia and distance fraud high-resistance RFID distance bounding protocolRahim Entezari, Hossein Bahramgiri, Mahnaz Tajamolian. 67-72 [doi]
- A malware propagation model considering software diversity and topology dynamicsSoodeh Hosseini, Mohammad Abdollahi Azgomi, Adel Torkaman Rahmani. 73-78 [doi]
- Impossible differential cryptanalysis of LBlock through breaking down the key spaceAkram Khalesi, Hossein Bahramgiri, Davod Mansuri. 79-83 [doi]
- Security analysis of CLEFIA-128Siavash Ahmadi, Mahshid Delavar, Javad Mohajeri, Mohammad Reza Aref. 84-88 [doi]
- Impossible differential cryptanalysis of Piccolo lightweight block cipherSeyyed Arash Azimi, Zahra Ahmadian, Javad Mohajeri, Mohammad Reza Aref. 89-94 [doi]
- Primality test for mersenne numbers using elliptic curvesHassan Daghigh, Amir Mehdi Yazdani kashani, Ruholla Khodakaramian Gilan. 95-97 [doi]
- Cube and dynamic cube attacks on SIMON32/64Reyhaneh Rabaninejad, Zahra Ahmadian, Mahmoud Salmasizadeh, Mohammad Reza Aref. 98-103 [doi]
- Reducing the key length of mceliece cryptosystem using polar codesReza Hooshmand, M. Koochak Shooshtari, Taraneh Eghlidos, Mohammad Reza Aref. 104-108 [doi]
- Comparison-based agent partitioning with learning automata: A trust model for service-oriented environmentsAmir Khoshkbarchi, Hamid Reza Shahriari, Mehdi Amjadi. 109-114 [doi]
- Anomaly detection in embedded systems using simultaneous power and temperature monitoringZeinab Abbasi, Mehdi Kargahi, Morteza Mohaqeqi. 115-119 [doi]
- A threatened-based software security evaluation methodMohammad Reza Razian, Hasan Mokhtari Sangchi. 120-125 [doi]
- Classifying IDS alerts automatically for use in correlation systemsMohammad MirShahJafari, Hamed Ghavamnia. 126-130 [doi]
- A method for modeling and evaluation of the security of cyber-physical systemsHamed Orojloo, Mohammad Abdollahi Azgomi. 131-136 [doi]
- Privacy analysis and improvements of two recent RFID authentication protocolsKarim Baghery, Behzad Abdolmaleki, Bahareh Akhbari, Mohammad Reza Aref. 137-142 [doi]
- A multi-signer convertible limited multi-verifier signature scheme in the standard modelParvin Rastegari, Mehdi Berenjkoub. 143-148 [doi]
- A modular two-layer system for accurate and fast traffic classificationFateme Hajikarami, Mehdi Berenjkoub, Mohammad Hossein Manshaei. 149-154 [doi]
- A new linguistic steganography scheme based on lexical substitutionHabib Allah Yajam, Azadeh Sadat Mousavi, Maryam Amirmazlaghani. 155-160 [doi]
- A traceable optimistic fair exchange protocolRamin Ganjavi, Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh. 161-166 [doi]
- CR-SMTC: Privacy preserving collusion-resistant multi-party trust computationZohre Fath Fathabadi, Sadegh Dorri Nogoorani, Ali Mohammad Hemmatyar. 167-172 [doi]
- A lattice-based threshold secret sharing schemeHamidreza Amini Khorasgani, Saba Asaad, Taraneh Eghlidos, Mohammad Reza Aref. 173-179 [doi]
- Web driven alert verificationAbolfazl Najafi, Ahamd Sepahi, Rasool Jalili. 180-185 [doi]
- Considering temporal and environmental characteristics of vulnerabilities in network security risk assessmentMasoud Khosravi Farmad, Razieh Rezaee, Abbas Ghaemi Bafghi. 186-191 [doi]
- Scalable, high-throughput and modular hardware-based string matching algorithmMohammad Hossein Hajiabadi, Hossein Saidi 0001, Mohammad Behdadfar. 192-198 [doi]
- Security analysis of SKI protocolPouria Babvey, Habib Allah Yajam, Taraneh Eghlidos. 199-203 [doi]
- Iterative constraint satisfaction method for microaggregation problemReza Mortazavi, Saeed Jalili. 204-209 [doi]
- A generalized multi-layer information hiding scheme using wet paper codingAmir Bidokhti, Shahrokh Ghaemmaghami. 210-213 [doi]
- Mid-defense: Mitigating protocol-level attacks in TOR using indistinguishability obfuscationMahdi Soltani, Sina Najafi, Rasool Jalili. 214-219 [doi]
- Towards a process-oriented framework for improving trust and security in migration to cloudSara Saadat, Hamid Reza Shahriari. 220-225 [doi]
- Secure and privacy preserving keyword searching cryptographyMohammad Mahdi Tajiki, Mohammad Ali Akhaee. 226-230 [doi]