A CCA2-Secure Incomparable Public Key Encryption Scheme
A CCA2-Secure Incomparable Public Key Encryption Scheme

Bahman Rajabi; Ziba Eslami

Volume 3, Issue 1 , January 2016, Pages 3-12

Abstract
  In 2003, Waters, Felten and Sahai introduced a novel cryptographic primitive called Incomparable Public Key cryptosystem to protect anonymity of message receivers in an untrusted network. ...  Read More
A Novel Block Cipher Algorithm with Feistel-Like Structure
A Novel Block Cipher Algorithm with Feistel-Like Structure

Mahmood Deypir; Yousef Purebrahim

Volume 3, Issue 1 , January 2016, Pages 13-26

Abstract
  Block ciphers have wide applications for hardware and software implementations. In this paper, a new block cipher algorithm with provable security is proposed. The whole structure of ...  Read More
Multiple-Fault Tolerant Hardware Structure for Cellular Genetic Algorithm
Multiple-Fault Tolerant Hardware Structure for Cellular Genetic Algorithm

Peyman Ashooriyan; Yasser Baleghi Damavandi

Volume 3, Issue 1 , January 2016, Pages 27-42

Abstract
  This paper presents the hardware simulation (based on VHDL code) of a multiple-fault tolerant cellular genetic algorithm. This study aims to increase the immunity of cellular genetic ...  Read More
Structural and Non-Structural Similarity Combination of Users in Social Networks
Structural and Non-Structural Similarity Combination of Users in Social Networks

Azam Malekmohammad; Hadi Khosravi

Volume 3, Issue 1 , January 2016, Pages 43-52

Abstract
  Estimating similarity is expressed in many domains and sciences. For instance, data mining, web mining, clustering, search engines, ontology mapping and social networks require the ...  Read More
Enhancing the Sense of Immersion and Quality of Experience in Mobile Games Using Augmented Reality
Enhancing the Sense of Immersion and Quality of Experience in Mobile Games Using Augmented Reality

Yoones A Sekhavat; Hosein Zarei

Volume 3, Issue 1 , January 2016, Pages 53-62

Abstract
  Augmented Reality (AR) has introduced new forms of interaction and presentation in mobile applications. Mobile games have also taken the advantages of this technology to implement novel ...  Read More
Determining the Number of Accusations for Decision Making in Key Revocation Protocol for MANET
Determining the Number of Accusations for Decision Making in Key Revocation Protocol for MANET

Maryam Zarezadeh; Mohammad Ali Doostari; Seyyed Hamid Haj Seyyed Javadi

Volume 3, Issue 1 , January 2016, Pages 63-72

Abstract
  Considering the dynamic and wireless topology of the mobile ad hoc networks (MANETs), the implementation of security in such networks is an important problem. Key revocation is a solution ...  Read More