Volume 7 (2020)
Volume 6 (2019)
Volume 5 (2018)
Volume 4 (2017)
Volume 3 (2016)
Volume 2 (2015)
Volume 1 (2014)
1. JHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH
Volume 2, Issue 1 , Winter and Spring 2015, Pages 3-20
Abstract
Authenticated encryption (AE) schemes provide both privacy and integrity ofdata. CAESAR is a competition to design and analysis of the AE schemes. AnAE scheme has two components: a ... Read More2. Steganography of Halftone Images by Group Alteration of Grayscale Pixels
Volume 2, Issue 1 , Winter and Spring 2015, Pages 21-30
Abstract
Data hiding in halftone images is a challenging task since these images are very susceptible to alterations. Current steganographic methods for these types of images either embed the ... Read More3. A Method for Assessing Maintainability of Software Architectural Styles in Self-healing Systems by Measuring Coupling and Cohesion
Volume 2, Issue 1 , Winter and Spring 2015, Pages 31-42
Abstract
In this article, our aim is to quantify the impact of three reference architectural styles, i.e. Aspect-peer-to-peer, Aggregator-escalator-peer, and Chain-of-configurators on the maintainability ... Read More4. A High Speed Residue-to-Binary Converter for Balanced 4-Moduli Set
Volume 2, Issue 1 , Winter and Spring 2015, Pages 43-54
Abstract
The moduli set 2 n−1 − 1, 2 n+1 − 1, 2 n , 2 n − 1 has been recently proposed inliterature for class of 4n-bit dynamic range in residue number system. Due toonly ... Read More5. Improving Face Recognition Systems Security Using Local Binary Patterns
Volume 2, Issue 1 , Winter and Spring 2015, Pages 55-62
Abstract
Face recognition systems suffer from different spoofing attacks like photograph-based and video-based spoofing attacks. This paper presents a new method to empower the face recognition ... Read More6. A Study on Intelligent Authorship Methods in Persian Language
Volume 2, Issue 1 , Winter and Spring 2015, Pages 63-76