A Trust-Based Approach for Correctness verification of Query Results in Data Outsourcing
A Trust-Based Approach for Correctness verification of Query Results in Data Outsourcing

Morteza Noferesti; Simin Ghasemi; Mohammad Ali Hadavi; Rasool Jalili

Volume 1, Issue 1 , January 2014, Pages 3-14

Abstract
  Correctness verification of query results is an important security concern in data outsourcing scenarios. In previous approaches, the correctness verification was impossible in real ...  Read More
Unified Byte Permutations for the Block Cipher 3D
Unified Byte Permutations for the Block Cipher 3D

Hamid Mala

Volume 1, Issue 1 , January 2014, Pages 15-22

Abstract
  3D is a 512-bit block cipher whose design is inspired from the Advanced Encryption Standard (AES). Like the AES, each round of 3D is composed of 4 transformations including a round-key ...  Read More
An Efficient End to End Key Establishment Protocol for Wireless Sensor Networks
An Efficient End to End Key Establishment Protocol for Wireless Sensor Networks

Ali Fanian; Mehdi Berenjkoub

Volume 1, Issue 1 , January 2014, Pages 23-38

Abstract
  Sensor networks are eligible candidates for military and scientific applications such as border security and environmental monitoring. They are usually deployed in unattended or hostile ...  Read More
The Effect of Correlogram Properties on Blind Steganalysis in JPEG Images
The Effect of Correlogram Properties on Blind Steganalysis in JPEG Images

Dariush Alimoradi; Maryam Hasanzadeh

Volume 1, Issue 1 , January 2014, Pages 39-46

Abstract
  Blind image steganalysis is a technique for discovering the message hidden in images in an independent manner than embedding the hidden message. The content of the image contribute ...  Read More
A Growing Hierarchical Approach to Batch Linear Manifold Topographic Map Formation
A Growing Hierarchical Approach to Batch Linear Manifold Topographic Map Formation

Peyman Adibi

Volume 1, Issue 1 , January 2014, Pages 47-59

Abstract
  The linear manifold topographic map (LMTM) is a model for unsupervised learning of multiple low-dimensional linear manifolds from a set of data samples in a topology-preserving map. ...  Read More
An Optimal Traffic Distribution Method Supporting End-to-End Delay Bound
An Optimal Traffic Distribution Method Supporting End-to-End Delay Bound

Touraj Shabanian; Massoud Reza Hashemi; Ahmad Askarian; Behnaz Omoomi

Volume 1, Issue 1 , January 2014, Pages 61-71

Abstract
  Routing methods for optimal distribution of traffic in data networks that can also provide quality of service (QoS) for users is one of the challenges in recent years' research on next ...  Read More