Volume & Issue: Volume 3, Issue 3, Summer 2016, Pages 155-191 (15) 
1. Expected Coverage of Perfect Chains in the Hellman Time Memory Trade-Off

Pages 155-162

Naser Hossein Gharavi; Abdorasool Mirghadri; Mohammad Abdollahi Azgomi; Sayyed Ahmad Mousavi


2. Security Analysis of an EPC Class-1 Generation-2 Compliant RFID Authentication Protocol

Pages 163-174

Fereidoun Moradi; Hamid Mala; Behrouz Tork Ladani; Fariba Moradi


3. A New Hybrid Method for VoIP Stream Steganography

Pages 175-182

Hossein Moodi; Ahmad Reza Naghsh-Nilchi


4. Effect of Purposeful Feature Extraction in High-dimensional Kinship Verification Problem

Pages 183-191

Pendar Alirezazadeh; Abdolhossein Fathi; Fardin Abdali-Mohammadi