Abstract is missing.
- Blind Multipurpose Image Watermarking Based on Secret SharingSorour Sheidani, Ziba Eslami. 1-8 [doi]
- Improvement of Digest Based Authentication Scheme for Biometric VerificationFaezeh Sadat Babamir, Murvet Kirci. 9-14 [doi]
- GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M CommunicationMohammad Mahdi Modiri, Javad Mohajeri, Mahmoud Salmasizadeh. 15-20 [doi]
- A New RF-PUF Based Authentication of Internet of Things Using Random Forest ClassificationAmir Ashtari, Ahmad Shabani, Bijan Alizadeh. 21-26 [doi]
- An Ultra-Lightweight RFID Mutual Authentication ProtocolAbbas Rahnama, Mohammad Beheshti-Atashgah, Taraneh Eghlidos, Mohammad Reza Aref. 27-32 [doi]
- Investigating the Streaming Algorithms Usage in Website Fingerprinting Attack Against Tor Privacy Enhancing TechnologyReyhane Attarian, Sattar Hashemi. 33-38 [doi]
- A Lightweight Anonymous Authentication Protocol For IoT Wireless Sensor NetworksAbbas Rahnama, Mohammad Beheshti-Atashgah, Taraneh Eghlidos, Mohammad Reza Aref. 39-44 [doi]
- 2DAS and 3PDA, Two Data Aggregation Schemes for Smart GridHamid Amiryousefi, Zahra Ahmadian. 45-48 [doi]
- A Novel Steganography Algorithm using Edge Detection and MPC AlgorithmAref Rezaei, Leili Farzinvash, Ali Farzamnia. 49-54 [doi]
- Lightweight Involutive Components for Symmetric CryptographySeyed Mojtaba Dehnavi, M. R. Mirzaee Shamsabad, Akbar Mahmoodi Rishakani. 61-66 [doi]
- Cryptanalysis of a Certificateless Signcryption SchemeParvin Rastegari, Mohammad Dakhilalian. 67-71 [doi]
- Ransomware detection using process mining and classification algorithmsAla Bahrani, Amir Jalaly Bidgly. 73-77 [doi]
- Inferring API Correct Usage Rules: A Tree-based ApproachMajid Zolfaghari, Solmaz Salimi, Mehdi Kharrazi. 78-84 [doi]
- An Anonymous Attribute-based Access Control System Supporting Access Structure UpdateMostafa Chegenizadeh, Mohammad Ali, Javad Mohajeri, Mohammad Reza Aref. 85-91 [doi]
- Threat Extraction in IoT-Based Systems Focusing on Smart CitiesAbbas Nejatifar, Mohammad Ali Hadavi. 92-98 [doi]
- Classical-Quantum Multiple Access Wiretap ChannelHadi Aghaee, Bahareh Akhbari. 99-103 [doi]
- Fault tolerant non-linear techniques for scalar multiplication in ECCZahra Saffar, Siamak Mohammadi. 104-113 [doi]
- IoT-Based Anonymous Authentication Protocol Using Biometrics in Smart HomesMehranpoor. Shayan, Mohammadzadeh. Naser, Gharaee. Hossein. 114-121 [doi]
- An efficient secret sharing-based storage system for cloud-based IoTsMajid Farhadi, Hamideh Bypour, Reza Mortazavi. 122-127 [doi]
- Analysis of Machine Learning Techniques for Ransomware DetectionFakhroddin Noorbehbahani, Farzaneh Rasouli, Mohammad Saberi. 128-133 [doi]
- CRT-Based Robust Data Hiding Method by Extracting Features in DCT DomainAlireza Ghaemi, Habibollah Danyali. 134-138 [doi]
- SANUB: A new method for Sharing and Analyzing News Using BlockchainArian Balouchestani, Mojtaba Mahdavi, Yeganeh Hallaj, Delaram Javdani. 139-143 [doi]