Number of Articles: 95
-49. Editorial Note

Volume 1, Issue 1, Winter 2014, Pages 1-2

Ahmad Reza Naghsh-Nilchi


-48. Vol. 6, No. 1, 2019

Volume 6, Issue 1, Winter and Spring 2019, Pages 1-42

10.22108/jcs.2019.24649


-47. Vol. 7, No. 1, 2020

Volume 7, Issue 1, Winter and Spring 2020, Pages 1-94

10.22108/jcs.2020.24831


-46. A Trust-Based Approach for Correctness verification of Query Results in Data Outsourcing

Volume 1, Issue 1, Winter 2014, Pages 3-14

Morteza Noferesti; Simin Ghasemi; Mohammad Ali Hadavi; Rasool Jalili


-45. JHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH

Volume 2, Issue 1, Winter 2015, Pages 3-20

Javad Alizadeh; Mohammad Reza Aref; Nasour Bagheri; Alireza Rahimi


-44. A CCA2-Secure Incomparable Public Key Encryption Scheme

Volume 3, Issue 1, Winter 2016, Pages 3-12

Bahman Rajabi; Ziba Eslami


-43. Verifiable Social Multi-Secret Sharing Secure in Active Adversarial Model

Volume 4, Issue 1, Winter and Spring 2017, Pages 3-12

10.22108/jcs.2018.108395.

Nasrollah Pakniat; Ziba Eslami


-42. Vol. 5, No. 1, 2018

Volume 5, Issue 1, Winter and Spring 2018, Pages 3-56

10.22108/jcs.2018.24660


-41. Vol. 6, No. 2, 2019

Volume 6, Issue 2, Summer and Autumn 2019, Pages 43-80

10.22108/jcs.2019.24648


-39. Vol. 5, No. 2, 2018

Volume 5, Issue 2, Summer and Autumn 2018, Pages 59-89

10.22108/jcs.2018.24659


-38. Editorial Note

Volume 1, Issue 2, Spring 2014, Pages 81-82

Ahmad Reza Naghsh-Nilchi


-37. An Inference Resistant Indexing Technique to Enforce Access Control in Data Outsourcing

Volume 3, Issue 2, Spring 2016, Pages 83-93

Hadi Halvachi; Mohammad Ali Hadavi; Rasool Jalili


-36. Privacy-Preserving Fine-grained Correctness Verification of Query Results in Outsourced Databases

Volume 2, Issue 2, Spring 2015, Pages 87-107

Mohammad Ali Hadavi; Rasool Jalili; Javad Ghareh Chamani


-35. Expected Coverage of Perfect Chains in the Hellman Time Memory Trade-Off

Volume 3, Issue 3, Summer 2016, Pages 155-162

Naser Hossein Gharavi; Abdorasool Mirghadri; Mohammad Abdollahi Azgomi; Sayyed Ahmad Mousavi


-34. Some Primitives Based on Jumping LFSRs with Determined Period

Volume 2, Issue 3, Summer 2015, Pages 175-184

Mahdi Sadjadieh; Arash Mirzaei; Mohammad Dakhilalian


-33. A Weak Blind Signature Based on Quantum Key Distribution

Volume 1, Issue 3, Summer 2014, Pages 179-186

Siavash Khodambashi; Ali Zakerolhosseini


-32. On the Security of Permutation Based Authentication Protocols for Internet of Things Applications: The Case of Huang et al.'s Protocol

Volume 3, Issue 4, Autumn 2016, Pages 201-209

Samad Rostampour; Nasour Bagheri; Mehdi Hosseinzadeh; Ahmad Khademzadeh


-31. Web Service Matchmaking based on Functional Similarity in Service Cloud

Volume 2, Issue 4, Autumn 2015, Pages 257-270

Kourosh Moradyan; Omid Bushehrian


-30. PSA: A Hybrid Feature Selection Approach for Persian Text Classification

Volume 1, Issue 4, Autumn 2014, Pages 261-272

Ayoub Bagheri; Mohamad Saraee; Shiva Nadi


-29. Identifying Explicit Features of Persian Comments

Volume 6, Issue 1, Winter and Spring 2019, Pages 1-11

10.22108/jcs.2019.112489.1009

Atefeh Mohammadi; Mohammad-Reza Pajoohan; Morteza Montazeri; MohammadAli Nematbakhsh


-27. An Improvement Over Lee et al.'s Key Agreement Protocol

Volume 5, Issue 1, Winter and Spring 2018, Pages 3-12

10.22108/jcs.2018.106883.0

Hossein Oraei; Mohsen Pourpouneh; Rasoul Ramezanian


-26. A Novel Block Cipher Algorithm with Feistel-Like Structure

Volume 3, Issue 1, Winter 2016, Pages 13-26

Mahmood Deypir; Yousef Purebrahim