Volume 9 (2022)
Volume 8 (2021)
Volume 7 (2020)
Volume 6 (2019)
Volume 5 (2018)
Volume 4 (2017)
Volume 3 (2016)
Volume 2 (2015)
Volume 1 (2014)
Number of Articles: 119
Vol. 6, No. 1, 2019
Volume 6, Issue 1 , January 2019, , Pages 1-42
Abstract
Vol. 6, No. 1, 2019 Read MoreVol.8, No. 2, 2021
Volume 8, Issue 2 , July 2021, , Pages 1-86
Abstract
Volume 8, Issue 2, Summer and Autumn 2021, Pages 1-86 Read MoreA Trust-Based Approach for Correctness verification of Query Results in Data Outsourcing
Volume 1, Issue 1 , January 2014, , Pages 3-14
Abstract
Correctness verification of query results is an important security concern in data outsourcing scenarios. In previous approaches, the correctness verification was impossible in real ... Read MoreJHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH
Volume 2, Issue 1 , January 2015, , Pages 3-20
Abstract
Authenticated encryption (AE) schemes provide both privacy and integrity ofdata. CAESAR is a competition to design and analysis of the AE schemes. AnAE scheme has two components: a ... Read MoreA CCA2-Secure Incomparable Public Key Encryption Scheme
Volume 3, Issue 1 , January 2016, , Pages 3-12
Abstract
In 2003, Waters, Felten and Sahai introduced a novel cryptographic primitive called Incomparable Public Key cryptosystem to protect anonymity of message receivers in an untrusted network. ... Read MoreVerifiable Social Multi-Secret Sharing Secure in Active Adversarial Model
Volume 4, Issue 1 , January 2017, , Pages 3-12
Abstract
Social secret sharing, introduced in 2010 by Nojoumian et al., allows to share a secret among a set of participants whose authorities can vary over time. However, existing social secret ... Read MoreVol. 5, No. 1, 2018
Volume 5, Issue 1 , January 2018, , Pages 3-56
Abstract
Vol. 5, No. 1, 2018 Read MoreVol. 6, No. 2, 2019
Volume 1, Issue 1 , January 2014, , Pages 43-80
Abstract
Vol. 6, No. 2, 2019 Read MoreMulti-Constraint Optimal Path Finding for QoS-Enabled Smart Grids: A Combination Approach of Neural Network and Fuzzy System
Volume 4, Issue 2 , July 2017, , Pages 47-61
Abstract
Smart Grid (SG) is an intelligent managed network inclusive various data networks. Due to using the two-way data and electricity flows in SG, relations among the network elements are ... Read MoreVol. 5, No. 2, 2018
Volume 5, Issue 2 , July 2018, , Pages 59-89
Abstract
Vol. 5, No. 2, 2018 Read MoreAn Inference Resistant Indexing Technique to Enforce Access Control in Data Outsourcing
Volume 3, Issue 2 , April 2016, , Pages 83-93
Abstract
Although data outsourcing provides many benefits, it suffers from privacy and security concerns such as enforcement of access control policies and confidentiality of stored sensitive ... Read MorePrivacy-Preserving Fine-grained Correctness Verification of Query Results in Outsourced Databases
Volume 2, Issue 2 , April 2015, , Pages 87-107
Abstract
Adoption of data outsourcing to cloud servers is hindered by data integrity issues due to the lack of trust to the servers. Existing solutions to deal with the problem often require ... Read MoreExpected Coverage of Perfect Chains in the Hellman Time Memory Trade-Off
Volume 3, Issue 3 , July 2016, , Pages 155-162
Abstract
Critical overlap situations in the classical Hellman's cryptanalytic time memory trade-off method can be avoided, provided that during the precomputation phase, we generate perfect ... Read MoreSome Primitives Based on Jumping LFSRs with Determined Period
Volume 2, Issue 3 , July 2015, , Pages 175-184
Abstract
Linear feedback shift registers (LFSRs) are used in manystream ciphers because of their maximal period and good statistical prop-erties. Due to the linearity of the LFSR, its output ... Read MoreA Weak Blind Signature Based on Quantum Key Distribution
Volume 1, Issue 3 , July 2014, , Pages 179-186
Abstract
Recently, the laws of quantum physics have amazed classical cryptography and aided researchers to provide secure communications in presence of adversaries. In this paper we present ... Read MoreOn the Security of Permutation Based Authentication Protocols for Internet of Things Applications: The Case of Huang et al.'s Protocol
Volume 3, Issue 4 , October 2016, , Pages 201-209
Abstract
The Internet of Things (IoT) is a new technology, which enables objects to exchange data via the Internet. Authentication process is a method to prevent an unauthorized access to the ... Read MoreWeb Service Matchmaking based on Functional Similarity in Service Cloud
Volume 2, Issue 4 , October 2015, , Pages 257-270
Abstract
Nowadays increasing use of web as a means to accomplish daily tasks by calling web services, makes web services more and more significant. Users make a query on the Internet to find ... Read MorePSA: A Hybrid Feature Selection Approach for Persian Text Classification
Volume 1, Issue 4 , October 2014, , Pages 261-272
Abstract
In recent decades, as enormous amount of data being accumulated, the number of text documents is increasing vastly. E-mails, web pages, texts, news and articles are only part of this ... Read MoreIdentifying Explicit Features of Persian Comments
Volume 6, Issue 1 , January 2019, , Pages 1-11
Abstract
Recently, the approach towards mining various opinions on weblogs, forums and websites has gained attentions and interests of numerous researchers. In this regard, feature-based opinion ... Read MoreGenerating dynamical S-boxes using 1D Chebyshev chaotic maps
Volume 7, Issue 1 , January 2020, , Pages 1-17