Abstract is missing.
- Blockchain for steganography: advantages, new algorithms and open challengesOmid Torki, Maede Ashouri-Talouki, Mojtaba Mahdavi. 1-5  [doi]
- Secure Parameterized Multi-Pattern Matching in Multi-Text Owner SettingMaryam Zarezadeh, Hamid Mala. 6-12  [doi]
- A White-Box Generator Membership Inference Attack Against Generative ModelsMaryam Azadmanesh, Behrouz Shahgholi Ghahfarokhi, Maede Ashouri-Talouki. 13-17  [doi]
- A Perfect Recovery for Fragile Watermarking by Hamming Code on Distributed PixelsFaeze Rasouli, Mohammad Taheri. 18-22  [doi]
- A Trust-Based Vulnerability Analysis in Signed Social NetworksMansooreh Mirzaie, Maryam Nooraei Abadeh. 23-27  [doi]
- A machine learning approach for detecting and categorizing evasion sources in Android malwareHasan Deeb, Hayyan Hasan, Behrouz Tork Ladani, Bahman Zamani. 28-34  [doi]
- Using Deep Reinforcement Learning to Evade Web Application FirewallsMojtaba Hemmati, Mohammad Ali Hadavi. 35-41  [doi]
- Secure Outsourcing of Boneh-Franklin Identity-Based Encryption SchemeMohammad Reza Saeidi, Hamid Mala. 42-49  [doi]
- On Relaxation of Simon's AlgorithmAli Khosravi, Taraneh Eghlidos. 50-56  [doi]
- Cryptanalysis and Improvement of an Access Control Protocol for Wireless Body Area NetworksParvin Rastegari, Mojtaba Khalili. 57-62  [doi]
- Integral Analysis of Saturnin Using Bit-Based Division PropertyAkram Khalesi, Zahra Ahmadian. 63-67  [doi]
- Analysis and Improvement of the SPACF Scheme in Vehicular Ad-hoc NetworksOmid Mirzamohammadi, Alireza Aghabagherloo, Javad Mohajeri, Mahmoud Salmasizadeh, Mohammad Reza Aref. 68-74  [doi]
- Side-Channel based Disassembler for AVR Micro-Controllers using Convolutional Neural NetworksPouya Narimani, Mohammad Ali Akhaee, Seyed Amin Habibi. 75-80  [doi]
- Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoTSina Abdollahi, Javad Mohajeri, Mahmoud Salmasizadeh. 81-88  [doi]
- Optimum Group Pixel Matching Strategies for Image SteganographyAlireza Shahanaghi, Mohammad Ali Akhaee, Saeed Sarreshtedari, Ramin Toosi. 89-94  [doi]