Research Article
An Improvement Over Lee et al.'s Key Agreement Protocol
An Improvement Over Lee et al.'s Key Agreement Protocol

Hossein Oraei; Mohsen Pourpouneh; Rasoul Ramezanian

Volume 5, Issue 1 , January 2018, Pages 3-12

http://dx.doi.org/10.22108/jcs.2018.106883.0

Abstract
  In 2004, Hwang et al. proposed a group key exchange protocol for sharing a secure key in a group. Their protocol is an extension from the two party key exchange protocol to the group ...  Read More
Research Article
A Provably Secure Variant of ETRU Based on Extended Ideal Lattices Over Direct Product of Dedekind Domains
A Provably Secure Variant of ETRU Based on Extended Ideal Lattices Over Direct Product of Dedekind Domains

Reza Ebrahimi Atani; Shahabaddin Ebrahimi Atani; Amir Hassani Karbasi

Volume 5, Issue 1 , January 2018, Pages 13-34

http://dx.doi.org/10.22108/jcs.2018.106856.0

Abstract
  Jarvis and Nevins presented ETRU in 2013 which has applausive performance with moderate key-sizes and conjectured resistance to quantum computers. ETRU, as an efficient NTRUEncrypt-like ...  Read More
Research Article
Towards a Model-Driven Framework for Simulating Interactive Emergency Response Environments
Towards a Model-Driven Framework for Simulating Interactive Emergency Response Environments

Samaneh HoseinDoost; Afsaneh Fatemi; Bahman Zamani

Volume 5, Issue 1 , January 2018, Pages 35-49

http://dx.doi.org/10.22108/jcs.2018.112297.1008

Abstract
  Due to the increasing occurrence of unexpected events and the need for pre-crisis planning to reduce risks and losses, modeling emergency response environments (ERE) is needed more ...  Read More
Research Article
Change Impact Analysis by Concept Propagation
Change Impact Analysis by Concept Propagation

Zeinab mahzoon; Omid Bushehrian

Volume 5, Issue 1 , January 2018, Pages 51-56

http://dx.doi.org/10.22108/jcs.2019.111708.1007

Abstract
  Software maintenance is an important phase of the software life cycle. An important task in this phase is to locate code fragments affected by user change requests. However, performing ...  Read More