Number of Articles: 87
1. Editorial Note

Volume 1, Issue 1, Winter 2014, Pages 1-2

Ahmad Reza Naghsh-Nilchi


2. Identifying Explicit Features of Persian Comments

Volume 6, Issue 1, Winter and Spring 2019, Pages 1-11

10.22108/jcs.2019.112489.1009

Atefeh Mohammadi; Mohammad-Reza Pajoohan; Morteza Montazeri; MohammadAli Nematbakhsh


3. A Trust-Based Approach for Correctness verification of Query Results in Data Outsourcing

Volume 1, Issue 1, Winter 2014, Pages 3-14

Morteza Noferesti; Simin Ghasemi; Mohammad Ali Hadavi; Rasool Jalili


4. JHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH

Volume 2, Issue 1, Winter 2015, Pages 3-20

Javad Alizadeh; Mohammad Reza Aref; Nasour Bagheri; Alireza Rahimi


5. A CCA2-Secure Incomparable Public Key Encryption Scheme

Volume 3, Issue 1, Winter 2016, Pages 3-12

Bahman Rajabi; Ziba Eslami


6. Verifiable Social Multi-Secret Sharing Secure in Active Adversarial Model

Volume 4, Issue 1, Winter and Spring 2017, Pages 3-12

10.22108/jcs.2018.108395.

Nasrollah Pakniat; Ziba Eslami


7. An Improvement Over Lee et al.'s Key Agreement Protocol

Volume 5, Issue 1, Winter and Spring 2018, Pages 3-12

10.22108/jcs.2018.106883.0

Hossein Oraei; Mohsen Pourpouneh; Rasoul Ramezanian


8. eXtreme Modeling: an approach to agile model-based development

Volume 6, Issue 2, Summer and Autumn 2019, Pages 43-52

10.22108/jcs.2019.115445.1018

Shekoufeh Kolahdouz Rahimi; Kevin Lano; Hessa Alfraihi; Howard P.Haughton


10. Editorial Note

Volume 1, Issue 2, Spring 2014, Pages 81-82

Ahmad Reza Naghsh-Nilchi


11. An Inference Resistant Indexing Technique to Enforce Access Control in Data Outsourcing

Volume 3, Issue 2, Spring 2016, Pages 83-93

Hadi Halvachi; Mohammad Ali Hadavi; Rasool Jalili


12. Privacy-Preserving Fine-grained Correctness Verification of Query Results in Outsourced Databases

Volume 2, Issue 2, Spring 2015, Pages 87-107

Mohammad Ali Hadavi; Rasool Jalili; Javad Ghareh Chamani


13. Expected Coverage of Perfect Chains in the Hellman Time Memory Trade-Off

Volume 3, Issue 3, Summer 2016, Pages 155-162

Naser Hossein Gharavi; Abdorasool Mirghadri; Mohammad Abdollahi Azgomi; Sayyed Ahmad Mousavi


14. Some Primitives Based on Jumping LFSRs with Determined Period

Volume 2, Issue 3, Summer 2015, Pages 175-184

Mahdi Sadjadieh; Arash Mirzaei; Mohammad Dakhilalian


15. A Weak Blind Signature Based on Quantum Key Distribution

Volume 1, Issue 3, Summer 2014, Pages 179-186

Siavash Khodambashi; Ali Zakerolhosseini


16. On the Security of Permutation Based Authentication Protocols for Internet of Things Applications: The Case of Huang et al.'s Protocol

Volume 3, Issue 4, Autumn 2016, Pages 201-209

Samad Rostampour; Nasour Bagheri; Mehdi Hosseinzadeh; Ahmad Khademzadeh


17. Web Service Matchmaking based on Functional Similarity in Service Cloud

Volume 2, Issue 4, Autumn 2015, Pages 257-270

Kourosh Moradyan; Omid Bushehrian


18. PSA: A Hybrid Feature Selection Approach for Persian Text Classification

Volume 1, Issue 4, Autumn 2014, Pages 261-272

Ayoub Bagheri; Mohamad Saraee; Shiva Nadi


20. A Novel Block Cipher Algorithm with Feistel-Like Structure

Volume 3, Issue 1, Winter 2016, Pages 13-26

Mahmood Deypir; Yousef Purebrahim


22. A Provably Secure Variant of ETRU Based on Extended Ideal Lattices Over Direct Product of Dedekind Domains

Volume 5, Issue 1, Winter and Spring 2018, Pages 13-34

10.22108/jcs.2018.106856.0

Reza Ebrahimi Atani; Shahabaddin Ebrahimi Atani; Amir Hassani Karbasi


24. Unified Byte Permutations for the Block Cipher 3D

Volume 1, Issue 1, Winter 2014, Pages 15-22

Hamid Mala


25. Steganography of Halftone Images by Group Alteration of Grayscale Pixels

Volume 2, Issue 1, Winter 2015, Pages 21-30

Mojtaba Mahdavi; Shadrokh Samavi