Volume 9 (2022)
Volume 8 (2021)
Volume 7 (2020)
Volume 6 (2019)
Volume 5 (2018)
Volume 4 (2017)
Volume 3 (2016)
Volume 2 (2015)
Volume 1 (2014)
Number of Articles: 6
A CCA2-Secure Incomparable Public Key Encryption Scheme
Volume 3, Issue 1 , January 2016, Pages 3-12
Abstract
In 2003, Waters, Felten and Sahai introduced a novel cryptographic primitive called Incomparable Public Key cryptosystem to protect anonymity of message receivers in an untrusted network. ... Read MoreA Novel Block Cipher Algorithm with Feistel-Like Structure
Volume 3, Issue 1 , January 2016, Pages 13-26
Abstract
Block ciphers have wide applications for hardware and software implementations. In this paper, a new block cipher algorithm with provable security is proposed. The whole structure of ... Read MoreMultiple-Fault Tolerant Hardware Structure for Cellular Genetic Algorithm
Volume 3, Issue 1 , January 2016, Pages 27-42
Abstract
This paper presents the hardware simulation (based on VHDL code) of a multiple-fault tolerant cellular genetic algorithm. This study aims to increase the immunity of cellular genetic ... Read MoreStructural and Non-Structural Similarity Combination of Users in Social Networks
Volume 3, Issue 1 , January 2016, Pages 43-52
Abstract
Estimating similarity is expressed in many domains and sciences. For instance, data mining, web mining, clustering, search engines, ontology mapping and social networks require the ... Read MoreEnhancing the Sense of Immersion and Quality of Experience in Mobile Games Using Augmented Reality
Volume 3, Issue 1 , January 2016, Pages 53-62
Abstract
Augmented Reality (AR) has introduced new forms of interaction and presentation in mobile applications. Mobile games have also taken the advantages of this technology to implement novel ... Read MoreDetermining the Number of Accusations for Decision Making in Key Revocation Protocol for MANET
Volume 3, Issue 1 , January 2016, Pages 63-72