Number of Articles: 83
1. Editorial Note

Volume 1, Issue 1, Winter 2014, Pages 1-2

Ahmad Reza Naghsh-Nilchi


2. A Trust-Based Approach for Correctness verification of Query Results in Data Outsourcing

Volume 1, Issue 1, Winter 2014, Pages 3-14

Morteza Noferesti; Simin Ghasemi; Mohammad Ali Hadavi; Rasool Jalili


3. Editorial Note

Volume 1, Issue 2, Spring 2014, Pages 81-82

Ahmad Reza Naghsh-Nilchi


4. PSA: A Hybrid Feature Selection Approach for Persian Text Classification

Volume 1, Issue 4, Autumn 2014, Pages 261-272

Ayoub Bagheri; Mohamad Saraee; Shiva Nadi


5. A Weak Blind Signature Based on Quantum Key Distribution

Volume 1, Issue 3, Summer 2014, Pages 179-186

Siavash Khodambashi; Ali Zakerolhosseini


6. JHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH

Volume 2, Issue 1, Winter 2015, Pages 3-20

Javad Alizadeh; Mohammad Reza Aref; Nasour Bagheri; Alireza Rahimi


7. Privacy-Preserving Fine-grained Correctness Verification of Query Results in Outsourced Databases

Volume 2, Issue 2, Spring 2015, Pages 87-107

Mohammad Ali Hadavi; Rasool Jalili; Javad Ghareh Chamani


8. Some Primitives Based on Jumping LFSRs with Determined Period

Volume 2, Issue 3, Summer 2015, Pages 175-184

Mahdi Sadjadieh; Arash Mirzaei; Mohammad Dakhilalian


9. Web Service Matchmaking based on Functional Similarity in Service Cloud

Volume 2, Issue 4, Autumn 2015, Pages 257-270

Kourosh Moradyan; Omid Bushehrian


10. A CCA2-Secure Incomparable Public Key Encryption Scheme

Volume 3, Issue 1, Winter 2016, Pages 3-12

Bahman Rajabi; Ziba Eslami


11. An Inference Resistant Indexing Technique to Enforce Access Control in Data Outsourcing

Volume 3, Issue 2, Spring 2016, Pages 83-93

Hadi Halvachi; Mohammad Ali Hadavi; Rasool Jalili


12. Expected Coverage of Perfect Chains in the Hellman Time Memory Trade-Off

Volume 3, Issue 3, Summer 2016, Pages 155-162

Naser Hossein Gharavi; Abdorasool Mirghadri; Mohammad Abdollahi Azgomi; Sayyed Ahmad Mousavi


13. On the Security of Permutation Based Authentication Protocols for Internet of Things Applications: The Case of Huang et al.'s Protocol

Volume 3, Issue 4, Autumn 2016, Pages 201-209

Samad Rostampour; Nasour Bagheri; Mehdi Hosseinzadeh; Ahmad Khademzadeh


14. Verifiable Social Multi-Secret Sharing Secure in Active Adversarial Model

Volume 4, Issue 1, Winter and Spring 2017, Pages 3-12

10.22108/jcs.2018.108395.

Nasrollah Pakniat; Ziba Eslami


16. An Improvement Over Lee et al.'s Key Agreement Protocol

Volume 5, Issue 1, Winter and Spring 2018, Pages 3-12

10.22108/jcs.2018.106883.0

Hossein Oraei; Mohsen Pourpouneh; Rasoul Ramezanian


17. eXtreme Modeling: an approach to agile model-based development

Articles in Press, Accepted Manuscript, Available Online from 06 October 2019

10.22108/jcs.2019.115445.1018

Shekoufeh Kolahdouz Rahimi; Kevin Lano; Hessa Alfraihi; Howard P.Haughton


18. Identifying Explicit Features of Persian Comments

Volume 6, Issue 1, Winter and Spring 2019, Pages 1-11

10.22108/jcs.2019.112489.1009

Atefeh Mohammadi; Mohammad-Reza Pajoohan; Morteza Montazeri; MohammadAli Nematbakhsh


19. Unified Byte Permutations for the Block Cipher 3D

Volume 1, Issue 1, Winter 2014, Pages 15-22

Hamid Mala


20. Ranking of Common Architectural Styles Based on Availability, Security and Performance Quality Attributes

Volume 1, Issue 2, Spring 2014, Pages 83-93

Safieh Tahmasebipour; Seyed Morteza Babamir


21. Improving Semi-supervised Constrained k-Means Clustering Method Using User Feedback

Volume 1, Issue 4, Autumn 2014, Pages 273-261

Kavan Fatehi; Arastoo Bozorgi; Mohammad Sadegh Zahedi; Ehsan Asgarian


22. Demand based Resource Allocation to Balance the Utilization and User Level Fairness in Femtocell Networks

Volume 1, Issue 3, Summer 2014, Pages 187-204

Omid Fallah-Mehrjardi; Behrouz Shahgholi Ghahfarokhi; Hamid Mala; Naser Movahhedinia


23. Steganography of Halftone Images by Group Alteration of Grayscale Pixels

Volume 2, Issue 1, Winter 2015, Pages 21-30

Mojtaba Mahdavi; Shadrokh Samavi


24. Robust Cooperative Spectrum Sensing under Primary User Emulation Attack in Cognitive Radio Networks

Volume 2, Issue 2, Spring 2015, Pages 109-117

Abbas Ali Sharifi; Mir Javad Musevi Niya


25. Improved Secure and Privacy Preserving Keyword Searching Cryptography

Volume 2, Issue 3, Summer 2015, Pages 185-194

Mohammad Mahdi Tajiki; Mohammad Ali Akhaee; Behnam Bahrak