Abstract is missing.
- Lurking Eyes: A Method to Detect Side-Channel Attacks on JavaScript and WebAssemblyMohammad Erfan Mazaheri, Farhad Taheri, Siavash Bayat Sarmadi. 1-6 [doi]
- A fast non-interactive publicly verifiable secret sharing schemeShahrooz Janbaz, Rahim Asghari, Bagher Bagherpour, Ali Zaghian. 7-13 [doi]
- A Decentralized App Store Using the Blockchain TechnologyMahsa Monem Moharrer, Sadegh Dorri Nogoorani. 14-21 [doi]
- Cost-Effective and Practical Countermeasure against the Template Side Channel AttackFarshideh Kordi, Hamed Hossein-Talaee, Ali Jahanian 0001. 22-27 [doi]
- Analysis of Geometrical Parameters for Remote Side-Channel Attacks on Multi-Tenant FPGAsMilad Salimian, Ali Jahanian. 28-35 [doi]
- A Secure and Improved Authentication Scheme for Heterogeneous Wireless Sensor Networks in the Internet of Things EnvironmentHamidreza Yazdanpanah, Mahdi Azizi, Seyed Morteza Pournaghi. 36-43 [doi]
- Security Analysis of an Efficient Authentication Scheme for Vehicular Ad Hoc NetworksSaeed Zarbi, Seyed Amir Mortazavi, Pedram Salehpour. 44-47 [doi]
- A Deep Learning-based Malware Hunting Technique to Handle Imbalanced DataZahra Moti, Sattar Hashemi, Amir Namavar Jahromi. 48-53 [doi]
- Improvements on Easypaysy: The Bitcoin's Layer-2 Accounts ProtocolElnaz Ebadi, Habib Yajam, Mohammad Ali Akhaee. 54-59 [doi]
- Detecting Disk Sectors Data Types Using Hidden Markov ModelS. Sadegh Mousavi. 60-64 [doi]
- Enhancing Monkey to trigger malicious payloads in Android malwareHayyan Hasan, Behrouz Tork Ladani, Bahman Zamani. 65-72 [doi]
- An Optimized Structure of State Channel Network to Improve Scalability of Blockchain AlgorithmsAmir Ajorlou, Aliazam Abbasfar. 73-76 [doi]
- A Binary Relevance Adaptive Model-Selection for Ensemble SteganalysisTayebe Abazar, Peyman Masjedi, Mohammad Taheri. 77-81 [doi]
- A New Method for Ransomware Detection Based on PE Header Using Convolutional Neural NetworksFarnoush Manavi, Ali Hamzeh. 82-87 [doi]
- Advantages and disadvantages of using cryptography in steganographyAli Hadipour, Raheleh Afifi. 88-94 [doi]
- On the Security of Some Recently Proposed Certificateless Signcryption SchemesParvin Rastegari. 95-100 [doi]