Number of Articles: 83
26. A Workload-Adaptable Method for Migrated Software to the Cloud

Volume 2, Issue 4, Autumn 2015, Pages 271-279

Zahra Reisi; Omid Bushehrian; Farahnaz Rezaeian Zadeh


27. A Novel Block Cipher Algorithm with Feistel-Like Structure

Volume 3, Issue 1, Winter 2016, Pages 13-26

Mahmood Deypir; Yousef Purebrahim


29. Security Analysis of an EPC Class-1 Generation-2 Compliant RFID Authentication Protocol

Volume 3, Issue 3, Summer 2016, Pages 163-174

Fereidoun Moradi; Hamid Mala; Behrouz Tork Ladani; Fariba Moradi


30. Multicollision Attack on a recently proposed hash function vMDC-2

Volume 3, Issue 4, Autumn 2016, Pages 211-215

Zahra Zolfaghari; Hamid Asadollahi; Nasour Bagheri


32. Capability-Based Team Formation in Researchers Social Networks

Volume 4, Issue 2, Summer and Autumn 2017, Pages 63-79

10.22108/jcs.2018.110888.

Somayeh Tavakoli; Afsaneh Fatemi


33. A Provably Secure Variant of ETRU Based on Extended Ideal Lattices Over Direct Product of Dedekind Domains

Volume 5, Issue 1, Winter and Spring 2018, Pages 13-34

10.22108/jcs.2018.106856.0

Reza Ebrahimi Atani; Shahabaddin Ebrahimi Atani; Amir Hassani Karbasi


35. An Efficient End to End Key Establishment Protocol for Wireless Sensor Networks

Volume 1, Issue 1, Winter 2014, Pages 23-38

Ali Fanian; Mehdi Berenjkoub


36. Evaluating Behavioral Intentions of Tourists in e-Tourism

Volume 1, Issue 2, Spring 2014, Pages 95-109

Fahimeh Parsaei; Mehran Rezaei; Monireh Arabjafari


37. DOPPONENT: A Socially Efficient Preference Model of Opponent in Bilateral Multi Issue Negotiations

Volume 1, Issue 4, Autumn 2014, Pages 283-292

Farhad Zafari; Faria Nassiri-Mofakham; Ali Zeinal Hamadani


38. Comparison of Hybrid and Filter Feature Selection Methods to Identify Candidate Single Nucleotide Polymorphisms

Volume 1, Issue 3, Summer 2014, Pages 205-2013

Farideh Halakou; Mahdi Eftekhari; Ali Esmailizadeh


40. A High-Payload Audio Watermarking Scheme for Real-Time Applications

Volume 2, Issue 2, Spring 2015, Pages 119-127

Ramin Almasi; Hooman Nikmehr


41. Adaptive Interval Type-2 Fuzzy Inference System for Facial Expression Recognition

Volume 2, Issue 3, Summer 2015, Pages 125-207

Mehran Safayani; Vahid Farmani; Maedeh Ahmadi; Abdolreza Mirzaei


42. A Context-Aware Reflective-State Framework to Reconfigure Service-Based Applications

Volume 2, Issue 4, Autumn 2015, Pages 281-292

Yousef Rastegari; Fereidoon Shams


43. Multiple-Fault Tolerant Hardware Structure for Cellular Genetic Algorithm

Volume 3, Issue 1, Winter 2016, Pages 27-42

Peyman Ashooriyan; Yasser Baleghi Damavandi


44. The Diagnosis of Epilepsy by Gravitational Search Algorithm and Support Vector Machines

Volume 3, Issue 2, Spring 2016, Pages 111-125

Zeinab Basereh; Shahram Golzari; Abbas Harifi


45. A New Hybrid Method for VoIP Stream Steganography

Volume 3, Issue 3, Summer 2016, Pages 175-182

Hossein Moodi; Ahmad Reza Naghsh-Nilchi


46. Randomized SVD Based Probabilistic Caching Strategy in Named Data Networks

Volume 3, Issue 4, Autumn 2016, Pages 217-231

Narges Mehran; Naser Movahhedinia


47. An Empirical Study of Students' Perceptions on the Technological Aspects of the E-Learning System

Volume 4, Issue 1, Winter and Spring 2017, Pages 25-38

10.22108/jcs.2018.106885.0

Nadia Parsazadeh; Norziha Megat Mohd Zainuddin; Rosmah Ali; Mehran Rezaei


48. Towards a Model-Driven Framework for Simulating Interactive Emergency Response Environments

Volume 5, Issue 1, Winter and Spring 2018, Pages 35-49

10.22108/jcs.2018.112297.1008

Samaneh HoseinDoost; Afsaneh Fatemi; Bahman Zamani


49. A Survey on Transformation Methods of XML Documents to Ontologies

Volume 4, Issue 2, Summer and Autumn 2017, Pages 81-100

10.22108/jcs.2018.106872.0

Mohammadereza Pourkhani; Bita Shadgar; Alireza Osareh


50. An Extension of CryptoPAi to the Formal Analysis of E-voting Protocols

Volume 6, Issue 1, Winter and Spring 2019, Pages 25-42

10.22108/jcs.2019.113429.1011

Hamid Reza Mahrooghi; Rasool Jalili