Number of Articles: 97
26. Unified Byte Permutations for the Block Cipher 3D

Volume 1, Issue 1, Winter and Spring 2014, Pages 15-22

Hamid Mala


27. Steganography of Halftone Images by Group Alteration of Grayscale Pixels

Volume 2, Issue 1, Winter and Spring 2015, Pages 21-30

Mojtaba Mahdavi; Shadrokh Samavi


28. eXtreme Modeling: an approach to agile model-based development

Volume 6, Issue 2, Summer and Autumn 2019, Pages 43-52

10.22108/jcs.2019.115445.1018

Shekoufeh Kolahdouz Rahimi; Kevin Lano; Hessa Alfraihi; Howard P.Haughton


29. Security Analysis of Two Lightweight Certificateless Signature Schemes

Volume 5, Issue 2, Summer and Autumn 2018, Pages 59-65

10.22108/jcs.2019.110889.

Nasrollah Pakniat


30. Capability-Based Team Formation in Researchers Social Networks

Volume 4, Issue 2, Summer and Autumn 2017, Pages 63-79

10.22108/jcs.2018.110888.

Somayeh Tavakoli; Afsaneh Fatemi


31. Ranking of Common Architectural Styles Based on Availability, Security and Performance Quality Attributes

Volume 1, Issue 2, Winter and Spring 2014, Pages 83-93

Safieh Tahmasebipour; Seyed Morteza Babamir


33. Robust Cooperative Spectrum Sensing under Primary User Emulation Attack in Cognitive Radio Networks

Volume 2, Issue 2, Winter and Spring 2015, Pages 109-117

Abbas Ali Sharifi; Mir Javad Musevi Niya


34. Security Analysis of an EPC Class-1 Generation-2 Compliant RFID Authentication Protocol

Volume 3, Issue 3, Summer and Autumn 2016, Pages 163-174

Fereidoun Moradi; Hamid Mala; Behrouz Tork Ladani; Fariba Moradi


35. Improved Secure and Privacy Preserving Keyword Searching Cryptography

Volume 2, Issue 3, Summer and Autumn 2015, Pages 185-194

Mohammad Mahdi Tajiki; Mohammad Ali Akhaee; Behnam Bahrak


36. Demand based Resource Allocation to Balance the Utilization and User Level Fairness in Femtocell Networks

Volume 1, Issue 3, Summer and Autumn 2014, Pages 187-204

Omid Fallah-Mehrjardi; Behrouz Shahgholi Ghahfarokhi; Hamid Mala; Naser Movahhedinia


37. Multicollision Attack on a recently proposed hash function vMDC-2

Volume 3, Issue 4, Summer and Autumn 2016, Pages 211-215

Zahra Zolfaghari; Hamid Asadollahi; Nasour Bagheri


38. A Workload-Adaptable Method for Migrated Software to the Cloud

Volume 2, Issue 4, Summer and Autumn 2015, Pages 271-279

Zahra Reisi; Omid Bushehrian; Farahnaz Rezaeian Zadeh


39. Improving Semi-supervised Constrained k-Means Clustering Method Using User Feedback

Volume 1, Issue 4, Summer and Autumn 2014, Pages 273-261

Kavan Fatehi; Arastoo Bozorgi; Mohammad Sadegh Zahedi; Ehsan Asgarian


40. A Provably Secure Variant of ETRU Based on Extended Ideal Lattices Over Direct Product of Dedekind Domains

Volume 5, Issue 1, Winter and Spring 2018, Pages 13-34

10.22108/jcs.2018.106856.0

Reza Ebrahimi Atani; Shahabaddin Ebrahimi Atani; Amir Hassani Karbasi


42. A Risk Estimation Framework for Security Threats in Computer Networks

Volume 7, Issue 1, Winter and Spring 2020, Pages 19-33

10.22108/jcs.2020.120412.1038

Razieh Rezaee; Abbas Ghaemi Bafghi


43. An Efficient End to End Key Establishment Protocol for Wireless Sensor Networks

Volume 1, Issue 1, Winter and Spring 2014, Pages 23-38

Ali Fanian; Mehdi Berenjkoub


44. An Empirical Study of Students' Perceptions on the Technological Aspects of the E-Learning System

Volume 4, Issue 1, Winter and Spring 2017, Pages 25-38

10.22108/jcs.2018.106885.0

Nadia Parsazadeh; Norziha Megat Mohd Zainuddin; Rosmah Ali; Mehran Rezaei


45. Multiple-Fault Tolerant Hardware Structure for Cellular Genetic Algorithm

Volume 3, Issue 1, Winter and Spring 2016, Pages 27-42

Peyman Ashooriyan; Yasser Baleghi Damavandi


47. CSE: A Novel Dynamic Obfuscation Based on Control Flow, Signals and Encryption

Volume 6, Issue 2, Summer and Autumn 2019, Pages 53-63

10.22108/jcs.2020.115402.1017

Bahare Hashemzade; Majid Abdolrazzagh-Nezhad


49. A Survey on Transformation Methods of XML Documents to Ontologies

Volume 4, Issue 2, Summer and Autumn 2017, Pages 81-100

10.22108/jcs.2018.106872.0

Mohammadereza Pourkhani; Bita Shadgar; Alireza Osareh


50. Evaluating Behavioral Intentions of Tourists in e-Tourism

Volume 1, Issue 2, Winter and Spring 2014, Pages 95-109

Fahimeh Parsaei; Mehran Rezaei; Monireh Arabjafari