Abstract is missing.
- Construction of new S-boxes via permuting the inverse mapping on special subsetsSeyed Mojtaba Dehnavi, M. R. Mirzaee Shamsabad, Akbar Mahmoodi Rishakani. 1-6 [doi]
- An identity-based digital signature scheme to detect pollution attacks in intra-session network codingSogand SadrHaghighi, Siavash Khorsandi. 7-12 [doi]
- Counterfeiting attack on adjusted expanded-bit multiscale quantization-based semi-fragile watermarking techniqueSamira Hosseini, Mojtaba Mahdavi. 13-19 [doi]
- A secret key encryption scheme based on 1-level QC-LDPC latticesKhadijeh Bagheri, Mohammad-Reza Sadeghi 0001, Taraneh Eghlidos, Daniel Panario. 20-25 [doi]
- XABA: A zero-knowledge anomaly-based behavioral analysis method to detect insider threatsAbolfazl Zargar, Alireza Nowroozi, Rasool Jalili. 26-31 [doi]
- Feature extraction for detection of watermarking algorithmZahra Hatefi, Mojtaba Mahdavi, Pegah Nikbakht Bideh. 32-37 [doi]
- A new CPA resistant software implementation for symmetric ciphers with smoothed power consumptionMorteza Safaei Pour, Mahmoud Salmasizadeh. 38-45 [doi]
- Biclique cryptanalysis of Twine-128Seyed Reza Hoseini Najarkolaei, Mohammad Zare Ahangarkolaei, Siavash Ahmadi, Mohammad Reza Aref. 46-51 [doi]
- A new lightweight authentication and key agreement protocol for Internet of ThingsSima Arasteh, Seyed Farhad Aghili, Hamid Mala. 52-59 [doi]
- Preserving privacy in location based mobile coupon systems using anonymous authentication schemeMohsen Ahmadi, Behrouz Shahgholi Ghahfarokhi. 60-65 [doi]
- Zero correlation linear attack on reduced round Piccolo-80Mohammad Zare Ahangarkolaei, Seyed Reza Hoseini Najarkolaei, Siavash Ahmadi, Mohammad Reza Aref. 66-71 [doi]
- FMNV continuous non-malleable encoding scheme is more efficient than believedAmir S. Mortazavi, Mahmoud Salmasizadeh, Amir Daneshgar. 72-78 [doi]
- 2entFOX: A framework for high survivable ransomwares detectionMohammad Mehdi Ahmadian, Hamid Reza Shahriari. 79-84 [doi]
- Fine-grained access control for hybrid mobile applications in Android using restricted pathsShahrooz Pooryousef, Morteza Amini. 85-90 [doi]
- PapiaPass: Sentence-based passwords using dependency treesHabib Allah Yajam, Younes Karimi Ahmadabadi, Mohammad Ali Akhaee. 91-96 [doi]
- Video watermarking in the DT-CWT domain using hyperbolic functionMilad Ghalejughi, Mohammad Ali Akhaee. 97-100 [doi]
- Security improvement of FPGA configuration file against the reverse engineering attackSharareh Zamanzadeh, Shahram Shahabi, Ali Jahanian. 101-105 [doi]
- An improved certificateless signcryption schemeParvin Rastegari, Mehdi Berenjkoub. 106-111 [doi]
- A new approach for effective malware detection in Android-based devicesMahmood Deypir. 112-116 [doi]
- Spread spectrum watermarking robust to silk vocoder using sub-optimal detectorsAli Sattari, Mohammad Ali Akhaee. 117-122 [doi]