A Trust-Based Approach for Correctness verification of Query Results in Data Outsourcing
A Trust-Based Approach for Correctness verification of Query Results in Data Outsourcing

Morteza Noferesti; Simin Ghasemi; Mohammad Ali Hadavi; Rasool Jalili

Volume 1, Issue 1 , January 2014, , Pages 3-14

Abstract
  Correctness verification of query results is an important security concern in data outsourcing scenarios. In previous approaches, the correctness verification was impossible in real ...  Read More
JHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH
JHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH

Javad Alizadeh; Mohammad Reza Aref; Nasour Bagheri; Alireza Rahimi

Volume 2, Issue 1 , January 2015, , Pages 3-20

Abstract
  Authenticated encryption (AE) schemes provide both privacy and integrity ofdata. CAESAR is a competition to design and analysis of the AE schemes. AnAE scheme has two components: a ...  Read More
A CCA2-Secure Incomparable Public Key Encryption Scheme
A CCA2-Secure Incomparable Public Key Encryption Scheme

Bahman Rajabi; Ziba Eslami

Volume 3, Issue 1 , January 2016, , Pages 3-12

Abstract
  In 2003, Waters, Felten and Sahai introduced a novel cryptographic primitive called Incomparable Public Key cryptosystem to protect anonymity of message receivers in an untrusted network. ...  Read More
Verifiable Social Multi-Secret Sharing Secure in Active Adversarial Model
Verifiable Social Multi-Secret Sharing Secure in Active Adversarial Model

Nasrollah Pakniat; Ziba Eslami

Volume 4, Issue 1 , January 2017, , Pages 3-12

http://dx.doi.org/10.22108/jcs.2018.108395.

Abstract
  Social secret sharing, introduced in 2010 by Nojoumian et al., allows to share a secret among a set of participants whose authorities can vary over time. However, existing social secret ...  Read More
Multi-Constraint Optimal Path Finding for QoS-Enabled Smart Grids: A Combination Approach of Neural Network and Fuzzy System
Multi-Constraint Optimal Path Finding for QoS-Enabled Smart Grids: A Combination Approach of Neural Network and Fuzzy System

Razieh Rastgoo; Vahid Sattari-Naeini

Volume 4, Issue 2 , July 2017, , Pages 47-61

http://dx.doi.org/10.22108/jcs.2018.106871.0

Abstract
  Smart Grid (SG) is an intelligent managed network inclusive various data networks. Due to using the two-way data and electricity flows in SG, relations among the network elements are ...  Read More
An Inference Resistant Indexing Technique to Enforce Access Control in Data Outsourcing
An Inference Resistant Indexing Technique to Enforce Access Control in Data Outsourcing

Hadi Halvachi; Mohammad Ali Hadavi; Rasool Jalili

Volume 3, Issue 2 , April 2016, , Pages 83-93

Abstract
  Although data outsourcing provides many benefits, it suffers from privacy and security concerns such as enforcement of access control policies and confidentiality of stored sensitive ...  Read More
Privacy-Preserving Fine-grained Correctness Verification of Query Results in Outsourced Databases
Privacy-Preserving Fine-grained Correctness Verification of Query Results in Outsourced Databases

Mohammad Ali Hadavi; Rasool Jalili; Javad Ghareh Chamani

Volume 2, Issue 2 , April 2015, , Pages 87-107

Abstract
  Adoption of data outsourcing to cloud servers is hindered by data integrity issues due to the lack of trust to the servers. Existing solutions to deal with the problem often require ...  Read More
Expected Coverage of Perfect Chains in the Hellman Time Memory Trade-Off
Expected Coverage of Perfect Chains in the Hellman Time Memory Trade-Off

Naser Hossein Gharavi; Abdorasool Mirghadri; Mohammad Abdollahi Azgomi; Sayyed Ahmad Mousavi

Volume 3, Issue 3 , July 2016, , Pages 155-162

Abstract
  Critical overlap situations in the classical Hellman's cryptanalytic time memory trade-off method can be avoided, provided that during the precomputation phase, we generate perfect ...  Read More
Some Primitives Based on Jumping LFSRs with Determined Period
Some Primitives Based on Jumping LFSRs with Determined Period

Mahdi Sadjadieh; Arash Mirzaei; Mohammad Dakhilalian

Volume 2, Issue 3 , July 2015, , Pages 175-184

Abstract
  Linear feedback shift registers (LFSRs) are used in manystream ciphers because of their maximal period and good statistical prop-erties. Due to the linearity of the LFSR, its output ...  Read More
A Weak Blind Signature Based on Quantum Key Distribution
A Weak Blind Signature Based on Quantum Key Distribution

Siavash Khodambashi; Ali Zakerolhosseini

Volume 1, Issue 3 , July 2014, , Pages 179-186

Abstract
  Recently, the laws of quantum physics have amazed classical cryptography and aided researchers to provide secure communications in presence of adversaries. In this paper we present ...  Read More
On the Security of Permutation Based Authentication Protocols for Internet of Things Applications: The Case of Huang et al.'s Protocol
On the Security of Permutation Based Authentication Protocols for Internet of Things Applications: The Case of Huang et al.'s Protocol

Samad Rostampour; Nasour Bagheri; Mehdi Hosseinzadeh; Ahmad Khademzadeh

Volume 3, Issue 4 , October 2016, , Pages 201-209

Abstract
  The Internet of Things (IoT) is a new technology, which enables objects to exchange data via the Internet. Authentication process is a method to prevent an unauthorized access to the ...  Read More
Web Service Matchmaking based on Functional Similarity in Service Cloud
Web Service Matchmaking based on Functional Similarity in Service Cloud

Kourosh Moradyan; Omid Bushehrian

Volume 2, Issue 4 , October 2015, , Pages 257-270

Abstract
  Nowadays increasing use of web as a means to accomplish daily tasks by calling web services, makes web services more and more significant. Users make a query on the Internet to find ...  Read More
PSA: A Hybrid Feature Selection Approach for Persian Text Classification
PSA: A Hybrid Feature Selection Approach for Persian Text Classification

Ayoub Bagheri; Mohamad Saraee; Shiva Nadi

Volume 1, Issue 4 , October 2014, , Pages 261-272

Abstract
  In recent decades, as enormous amount of data being accumulated, the number of text documents is increasing vastly. E-mails, web pages, texts, news and articles are only part of this ...  Read More
Identifying Explicit Features of Persian Comments
Identifying Explicit Features of Persian Comments

Atefeh Mohammadi; Mohammad-Reza Pajoohan; Morteza Montazeri; MohammadAli Nematbakhsh

Volume 6, Issue 1 , January 2019, , Pages 1-11

http://dx.doi.org/10.22108/jcs.2019.112489.1009

Abstract
  Recently, the approach towards mining various opinions on weblogs, forums and websites has gained attentions and interests of numerous researchers. In this regard, feature-based opinion ...  Read More
Generating dynamical S-boxes using 1D Chebyshev chaotic maps
Generating dynamical S-boxes using 1D Chebyshev chaotic maps

Ali Shakiba

Volume 7, Issue 1 , January 2020, , Pages 1-17

http://dx.doi.org/10.22108/jcs.2020.116547.1023

Abstract
  This paper considers the construction of chaotic dynamic substitution boxes (S-boxes) using chaotic Chebyshev polynomials of the first kind. The proposed algorithm provides dynamic ...  Read More