Research Article
Identifying Explicit Features of Persian Comments
Identifying Explicit Features of Persian Comments

Atefeh Mohammadi; Mohammad-Reza Pajoohan; Morteza Montazeri; MohammadAli Nematbakhsh

Volume 6, Issue 1 , January 2019, Pages 1-11

http://dx.doi.org/10.22108/jcs.2019.112489.1009

Abstract
  Recently, the approach towards mining various opinions on weblogs, forums and websites has gained attentions and interests of numerous researchers. In this regard, feature-based opinion ...  Read More
Research Article
Full Secret Disclosure Attack against an EPC- C1 G2 Compliant Authentication Protocol
Full Secret Disclosure Attack against an EPC- C1 G2 Compliant Authentication Protocol

Masoumeh Safkhani

Volume 6, Issue 1 , January 2019, Pages 13-23

http://dx.doi.org/10.22108/jcs.2019.110886.

Abstract
  Security analysis of a protocol is an important step toward the public trust on its security. Recently, in 2018, Moradi et al. considered the security of the Wei and Zhang RFID EPC-C1 ...  Read More
Research Article
An Extension of CryptoPAi to the Formal Analysis of E-voting Protocols
An Extension of CryptoPAi to the Formal Analysis of E-voting Protocols

Hamid Reza Mahrooghi; Rasool Jalili

Volume 6, Issue 1 , January 2019, Pages 25-42

http://dx.doi.org/10.22108/jcs.2019.113429.1011

Abstract
  CryptoPAi is a hybrid operational-epistemic framework for specification and analysis of security protocols with genuine support for cryptographic constructs. This framework includes ...  Read More