A Trust-Based Approach for Correctness verification of Query Results in Data Outsourcing
4. A Trust-Based Approach for Correctness verification of Query Results in Data Outsourcing

Morteza Noferesti; Simin Ghasemi; Mohammad Ali Hadavi; Rasool Jalili

Volume 1, Issue 1 , Winter and Spring 2014, , Pages 3-14

Abstract
  Correctness verification of query results is an important security concern in data outsourcing scenarios. In previous approaches, the correctness verification was impossible in real ...  Read More
JHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH
5. JHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH

Javad Alizadeh; Mohammad Reza Aref; Nasour Bagheri; Alireza Rahimi

Volume 2, Issue 1 , Winter and Spring 2015, , Pages 3-20

Abstract
  Authenticated encryption (AE) schemes provide both privacy and integrity ofdata. CAESAR is a competition to design and analysis of the AE schemes. AnAE scheme has two components: a ...  Read More
A CCA2-Secure Incomparable Public Key Encryption Scheme
6. A CCA2-Secure Incomparable Public Key Encryption Scheme

Bahman Rajabi; Ziba Eslami

Volume 3, Issue 1 , Winter and Spring 2016, , Pages 3-12

Abstract
  In 2003, Waters, Felten and Sahai introduced a novel cryptographic primitive called Incomparable Public Key cryptosystem to protect anonymity of message receivers in an untrusted network. ...  Read More
Verifiable Social Multi-Secret Sharing Secure in Active Adversarial Model
7. Verifiable Social Multi-Secret Sharing Secure in Active Adversarial Model

Nasrollah Pakniat; Ziba Eslami

Volume 4, Issue 1 , Winter and Spring 2017, , Pages 3-12

http://dx.doi.org/10.22108/jcs.2018.108395.

Abstract
  Social secret sharing, introduced in 2010 by Nojoumian et al., allows to share a secret among a set of participants whose authorities can vary over time. However, existing social secret ...  Read More
Multi-Constraint Optimal Path Finding for QoS-Enabled Smart Grids: A Combination Approach of Neural Network and Fuzzy System
10. Multi-Constraint Optimal Path Finding for QoS-Enabled Smart Grids: A Combination Approach of Neural Network and Fuzzy System

Razieh Rastgoo; Vahid Sattari-Naeini

Volume 4, Issue 2 , Summer and Autumn 2017, , Pages 47-61

http://dx.doi.org/10.22108/jcs.2018.106871.0

Abstract
  Smart Grid (SG) is an intelligent managed network inclusive various data networks. Due to using the two-way data and electricity flows in SG, relations among the network elements are ...  Read More
An Inference Resistant Indexing Technique to Enforce Access Control in Data Outsourcing
13. An Inference Resistant Indexing Technique to Enforce Access Control in Data Outsourcing

Hadi Halvachi; Mohammad Ali Hadavi; Rasool Jalili

Volume 3, Issue 2 , Winter and Spring 2016, , Pages 83-93

Abstract
  Although data outsourcing provides many benefits, it suffers from privacy and security concerns such as enforcement of access control policies and confidentiality of stored sensitive ...  Read More
Privacy-Preserving Fine-grained Correctness Verification of Query Results in Outsourced Databases
14. Privacy-Preserving Fine-grained Correctness Verification of Query Results in Outsourced Databases

Mohammad Ali Hadavi; Rasool Jalili; Javad Ghareh Chamani

Volume 2, Issue 2 , Winter and Spring 2015, , Pages 87-107

Abstract
  Adoption of data outsourcing to cloud servers is hindered by data integrity issues due to the lack of trust to the servers. Existing solutions to deal with the problem often require ...  Read More
Expected Coverage of Perfect Chains in the Hellman Time Memory Trade-Off
16. Expected Coverage of Perfect Chains in the Hellman Time Memory Trade-Off

Naser Hossein Gharavi; Abdorasool Mirghadri; Mohammad Abdollahi Azgomi; Sayyed Ahmad Mousavi

Volume 3, Issue 3 , Summer and Autumn 2016, , Pages 155-162

Abstract
  Critical overlap situations in the classical Hellman's cryptanalytic time memory trade-off method can be avoided, provided that during the precomputation phase, we generate perfect ...  Read More
Some Primitives Based on Jumping LFSRs with Determined Period
17. Some Primitives Based on Jumping LFSRs with Determined Period

Mahdi Sadjadieh; Arash Mirzaei; Mohammad Dakhilalian

Volume 2, Issue 3 , Summer and Autumn 2015, , Pages 175-184

Abstract
  Linear feedback shift registers (LFSRs) are used in manystream ciphers because of their maximal period and good statistical prop-erties. Due to the linearity of the LFSR, its output ...  Read More
A Weak Blind Signature Based on Quantum Key Distribution
18. A Weak Blind Signature Based on Quantum Key Distribution

Siavash Khodambashi; Ali Zakerolhosseini

Volume 1, Issue 3 , Summer and Autumn 2014, , Pages 179-186

Abstract
  Recently, the laws of quantum physics have amazed classical cryptography and aided researchers to provide secure communications in presence of adversaries. In this paper we present ...  Read More
On the Security of Permutation Based Authentication Protocols for Internet of Things Applications: The Case of Huang et al.'s Protocol
19. On the Security of Permutation Based Authentication Protocols for Internet of Things Applications: The Case of Huang et al.'s Protocol

Samad Rostampour; Nasour Bagheri; Mehdi Hosseinzadeh; Ahmad Khademzadeh

Volume 3, Issue 4 , Summer and Autumn 2016, , Pages 201-209

Abstract
  The Internet of Things (IoT) is a new technology, which enables objects to exchange data via the Internet. Authentication process is a method to prevent an unauthorized access to the ...  Read More
Web Service Matchmaking based on Functional Similarity in Service Cloud
20. Web Service Matchmaking based on Functional Similarity in Service Cloud

Kourosh Moradyan; Omid Bushehrian

Volume 2, Issue 4 , Summer and Autumn 2015, , Pages 257-270

Abstract
  Nowadays increasing use of web as a means to accomplish daily tasks by calling web services, makes web services more and more significant. Users make a query on the Internet to find ...  Read More
PSA: A Hybrid Feature Selection Approach for Persian Text Classification
21. PSA: A Hybrid Feature Selection Approach for Persian Text Classification

Ayoub Bagheri; Mohamad Saraee; Shiva Nadi

Volume 1, Issue 4 , Summer and Autumn 2014, , Pages 261-272

Abstract
  In recent decades, as enormous amount of data being accumulated, the number of text documents is increasing vastly. E-mails, web pages, texts, news and articles are only part of this ...  Read More
Identifying Explicit Features of Persian Comments
22. Identifying Explicit Features of Persian Comments

Atefeh Mohammadi; Mohammad-Reza Pajoohan; Morteza Montazeri; MohammadAli Nematbakhsh

Volume 6, Issue 1 , Winter and Spring 2019, , Pages 1-11

http://dx.doi.org/10.22108/jcs.2019.112489.1009

Abstract
  Recently, the approach towards mining various opinions on weblogs, forums and websites has gained attentions and interests of numerous researchers. In this regard, feature-based opinion ...  Read More
Generating dynamical S-boxes using 1D Chebyshev chaotic maps
23. Generating dynamical S-boxes using 1D Chebyshev chaotic maps

Ali Shakiba

Volume 7, Issue 1 , Winter and Spring 2020, , Pages 1-17

http://dx.doi.org/10.22108/jcs.2020.116547.1023

Abstract
  This paper considers the construction of chaotic dynamic substitution boxes (S-boxes) using chaotic Chebyshev polynomials of the first kind. The proposed algorithm provides dynamic ...  Read More
An Improvement Over Lee et al.'s Key Agreement Protocol
24. An Improvement Over Lee et al.'s Key Agreement Protocol

Hossein Oraei; Mohsen Pourpouneh; Rasoul Ramezanian

Volume 5, Issue 1 , Winter and Spring 2018, , Pages 3-12

http://dx.doi.org/10.22108/jcs.2018.106883.0

Abstract
  In 2004, Hwang et al. proposed a group key exchange protocol for sharing a secure key in a group. Their protocol is an extension from the two party key exchange protocol to the group ...  Read More
A Novel Block Cipher Algorithm with Feistel-Like Structure
25. A Novel Block Cipher Algorithm with Feistel-Like Structure

Mahmood Deypir; Yousef Purebrahim

Volume 3, Issue 1 , Winter and Spring 2016, , Pages 13-26

Abstract
  Block ciphers have wide applications for hardware and software implementations. In this paper, a new block cipher algorithm with provable security is proposed. The whole structure of ...  Read More