Bagheri, Nasour
On the Security of Permutation Based Authentication Protocols for Internet of Things Applications: The Case of Huang et al.'s Protocol [Volume 3, Issue 4, 2016, Pages 201-209]
Bagheri, Nasour
Multicollision Attack on a recently proposed hash function vMDC-2 [Volume 3, Issue 4, 2016, Pages 211-215]
Basereh, Zeinab
The Diagnosis of Epilepsy by Gravitational Search Algorithm and Support Vector Machines [Volume 3, Issue 2, 2016, Pages 111-125]
D
Deypir, Mahmood
A Novel Block Cipher Algorithm with Feistel-Like Structure [Volume 3, Issue 1, 2016, Pages 13-26]
Doostari, Mohammad Ali
Determining the Number of Accusations for Decision Making in Key Revocation Protocol for MANET [Volume 3, Issue 1, 2016, Pages 63-72]
E
Eslami, Ziba
A CCA2-Secure Incomparable Public Key Encryption Scheme [Volume 3, Issue 1, 2016, Pages 3-12]
F
Fanian, Ali
A Hybrid Method based on Statistical Features and Packet Content Analysis to Identify Major Network Tunneling Protocols [Volume 3, Issue 2, 2016, Pages 95-110]
Fathi, Abdolhossein
Effect of Purposeful Feature Extraction in High-dimensional Kinship Verification Problem [Volume 3, Issue 3, 2016, Pages 183-191]
G
Gharavi, Naser Hossein
Expected Coverage of Perfect Chains in the Hellman Time Memory Trade-Off [Volume 3, Issue 3, 2016, Pages 155-162]
Golzari, Shahram
The Diagnosis of Epilepsy by Gravitational Search Algorithm and Support Vector Machines [Volume 3, Issue 2, 2016, Pages 111-125]
H
Hadavi, Mohammad Ali
An Inference Resistant Indexing Technique to Enforce Access Control in Data Outsourcing [Volume 3, Issue 2, 2016, Pages 83-93]
Haj Seyyed Javadi, Seyyed Hamid
Determining the Number of Accusations for Decision Making in Key Revocation Protocol for MANET [Volume 3, Issue 1, 2016, Pages 63-72]
Halvachi, Hadi
An Inference Resistant Indexing Technique to Enforce Access Control in Data Outsourcing [Volume 3, Issue 2, 2016, Pages 83-93]
Harifi, Abbas
The Diagnosis of Epilepsy by Gravitational Search Algorithm and Support Vector Machines [Volume 3, Issue 2, 2016, Pages 111-125]
Hosseini Pozveh, Zahra
Persian Texts Part of Speech Tagging Using Artificial Neural Networks [Volume 3, Issue 4, 2016, Pages 233-241]
Hosseinzadeh, Mehdi
On the Security of Permutation Based Authentication Protocols for Internet of Things Applications: The Case of Huang et al.'s Protocol [Volume 3, Issue 4, 2016, Pages 201-209]
J
Jalili, Rasool
An Inference Resistant Indexing Technique to Enforce Access Control in Data Outsourcing [Volume 3, Issue 2, 2016, Pages 83-93]
K
Kazemi, Keihan
A Hybrid Method based on Statistical Features and Packet Content Analysis to Identify Major Network Tunneling Protocols [Volume 3, Issue 2, 2016, Pages 95-110]
Kazemifard, Mohammad
AUBUE: An Adaptive User-Interface Based on Users' Emotions [Volume 3, Issue 2, 2016, Pages 127-145]
Khademzadeh, Ahmad
On the Security of Permutation Based Authentication Protocols for Internet of Things Applications: The Case of Huang et al.'s Protocol [Volume 3, Issue 4, 2016, Pages 201-209]
Khosravi, Hadi
Structural and Non-Structural Similarity Combination of Users in Social Networks [Volume 3, Issue 1, 2016, Pages 43-52]
M
Mala, Hamid
Security Analysis of an EPC Class-1 Generation-2 Compliant RFID Authentication Protocol [Volume 3, Issue 3, 2016, Pages 163-174]
Malekmohammad, Azam
Structural and Non-Structural Similarity Combination of Users in Social Networks [Volume 3, Issue 1, 2016, Pages 43-52]
Mehran, Narges
Randomized SVD Based Probabilistic Caching Strategy in Named Data Networks [Volume 3, Issue 4, 2016, Pages 217-231]
Mirghadri, Abdorasool
Expected Coverage of Perfect Chains in the Hellman Time Memory Trade-Off [Volume 3, Issue 3, 2016, Pages 155-162]
Monadjemi, Amirhassan
Persian Texts Part of Speech Tagging Using Artificial Neural Networks [Volume 3, Issue 4, 2016, Pages 233-241]
Moodi, Hossein
A New Hybrid Method for VoIP Stream Steganography [Volume 3, Issue 3, 2016, Pages 175-182]
Moradi, Fariba
Security Analysis of an EPC Class-1 Generation-2 Compliant RFID Authentication Protocol [Volume 3, Issue 3, 2016, Pages 163-174]
Moradi, Fereidoun
Security Analysis of an EPC Class-1 Generation-2 Compliant RFID Authentication Protocol [Volume 3, Issue 3, 2016, Pages 163-174]
Mousavi, Sayyed Ahmad
Expected Coverage of Perfect Chains in the Hellman Time Memory Trade-Off [Volume 3, Issue 3, 2016, Pages 155-162]
Movahhedinia, Naser
Randomized SVD Based Probabilistic Caching Strategy in Named Data Networks [Volume 3, Issue 4, 2016, Pages 217-231]
N
Naghsh-Nilchi, Ahmad Reza
A New Hybrid Method for VoIP Stream Steganography [Volume 3, Issue 3, 2016, Pages 175-182]
Noori, Fariba
AUBUE: An Adaptive User-Interface Based on Users' Emotions [Volume 3, Issue 2, 2016, Pages 127-145]
P
Purebrahim, Yousef
A Novel Block Cipher Algorithm with Feistel-Like Structure [Volume 3, Issue 1, 2016, Pages 13-26]
R
Rajabi, Bahman
A CCA2-Secure Incomparable Public Key Encryption Scheme [Volume 3, Issue 1, 2016, Pages 3-12]
Rostampour, Samad
On the Security of Permutation Based Authentication Protocols for Internet of Things Applications: The Case of Huang et al.'s Protocol [Volume 3, Issue 4, 2016, Pages 201-209]
S
Sekhavat, Yoones A
Enhancing the Sense of Immersion and Quality of Experience in Mobile Games Using Augmented Reality [Volume 3, Issue 1, 2016, Pages 53-62]
T
Tork Ladani, Behrouz
Security Analysis of an EPC Class-1 Generation-2 Compliant RFID Authentication Protocol [Volume 3, Issue 3, 2016, Pages 163-174]
Z
Zarei, Hosein
Enhancing the Sense of Immersion and Quality of Experience in Mobile Games Using Augmented Reality [Volume 3, Issue 1, 2016, Pages 53-62]
Zarezadeh, Maryam
Determining the Number of Accusations for Decision Making in Key Revocation Protocol for MANET [Volume 3, Issue 1, 2016, Pages 63-72]
Zolfaghari, Zahra
Multicollision Attack on a recently proposed hash function vMDC-2 [Volume 3, Issue 4, 2016, Pages 211-215]