Number of Articles: 88
1. Editorial Note

Volume 1, Issue 1, Winter 2014, Pages 1-2

Ahmad Reza Naghsh-Nilchi

2. Identifying Explicit Features of Persian Comments

Volume 6, Issue 1, Winter and Spring 2019, Pages 1-11


Atefeh Mohammadi; Mohammad-Reza Pajoohan; Morteza Montazeri; MohammadAli Nematbakhsh

3. A Trust-Based Approach for Correctness verification of Query Results in Data Outsourcing

Volume 1, Issue 1, Winter 2014, Pages 3-14

Morteza Noferesti; Simin Ghasemi; Mohammad Ali Hadavi; Rasool Jalili

4. JHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH

Volume 2, Issue 1, Winter 2015, Pages 3-20

Javad Alizadeh; Mohammad Reza Aref; Nasour Bagheri; Alireza Rahimi

5. A CCA2-Secure Incomparable Public Key Encryption Scheme

Volume 3, Issue 1, Winter 2016, Pages 3-12

Bahman Rajabi; Ziba Eslami

6. Verifiable Social Multi-Secret Sharing Secure in Active Adversarial Model

Volume 4, Issue 1, Winter and Spring 2017, Pages 3-12


Nasrollah Pakniat; Ziba Eslami

7. An Improvement Over Lee et al.'s Key Agreement Protocol

Volume 5, Issue 1, Winter and Spring 2018, Pages 3-12


Hossein Oraei; Mohsen Pourpouneh; Rasoul Ramezanian

8. eXtreme Modeling: an approach to agile model-based development

Volume 6, Issue 2, Summer and Autumn 2019, Pages 43-52


Shekoufeh Kolahdouz Rahimi; Kevin Lano; Hessa Alfraihi; Howard P.Haughton

10. Editorial Note

Volume 1, Issue 2, Spring 2014, Pages 81-82

Ahmad Reza Naghsh-Nilchi

11. An Inference Resistant Indexing Technique to Enforce Access Control in Data Outsourcing

Volume 3, Issue 2, Spring 2016, Pages 83-93

Hadi Halvachi; Mohammad Ali Hadavi; Rasool Jalili

12. Privacy-Preserving Fine-grained Correctness Verification of Query Results in Outsourced Databases

Volume 2, Issue 2, Spring 2015, Pages 87-107

Mohammad Ali Hadavi; Rasool Jalili; Javad Ghareh Chamani

13. Expected Coverage of Perfect Chains in the Hellman Time Memory Trade-Off

Volume 3, Issue 3, Summer 2016, Pages 155-162

Naser Hossein Gharavi; Abdorasool Mirghadri; Mohammad Abdollahi Azgomi; Sayyed Ahmad Mousavi

14. Some Primitives Based on Jumping LFSRs with Determined Period

Volume 2, Issue 3, Summer 2015, Pages 175-184

Mahdi Sadjadieh; Arash Mirzaei; Mohammad Dakhilalian

15. A Weak Blind Signature Based on Quantum Key Distribution

Volume 1, Issue 3, Summer 2014, Pages 179-186

Siavash Khodambashi; Ali Zakerolhosseini

16. On the Security of Permutation Based Authentication Protocols for Internet of Things Applications: The Case of Huang et al.'s Protocol

Volume 3, Issue 4, Autumn 2016, Pages 201-209

Samad Rostampour; Nasour Bagheri; Mehdi Hosseinzadeh; Ahmad Khademzadeh

17. Web Service Matchmaking based on Functional Similarity in Service Cloud

Volume 2, Issue 4, Autumn 2015, Pages 257-270

Kourosh Moradyan; Omid Bushehrian

18. PSA: A Hybrid Feature Selection Approach for Persian Text Classification

Volume 1, Issue 4, Autumn 2014, Pages 261-272

Ayoub Bagheri; Mohamad Saraee; Shiva Nadi

20. A Novel Block Cipher Algorithm with Feistel-Like Structure

Volume 3, Issue 1, Winter 2016, Pages 13-26

Mahmood Deypir; Yousef Purebrahim

22. A Provably Secure Variant of ETRU Based on Extended Ideal Lattices Over Direct Product of Dedekind Domains

Volume 5, Issue 1, Winter and Spring 2018, Pages 13-34


Reza Ebrahimi Atani; Shahabaddin Ebrahimi Atani; Amir Hassani Karbasi

24. Unified Byte Permutations for the Block Cipher 3D

Volume 1, Issue 1, Winter 2014, Pages 15-22

Hamid Mala

25. Steganography of Halftone Images by Group Alteration of Grayscale Pixels

Volume 2, Issue 1, Winter 2015, Pages 21-30

Mojtaba Mahdavi; Shadrokh Samavi