A
-
Ahmadian, Z.
Total break of Zorro using linear and differential attacks [Volume 6, Issue 1, 2014, Pages 23-34]
-
Alamifar, F.
An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks [Volume 6, Issue 2, 2014, Pages 141-153]
-
Alizadeh, J.
Artemia: a family of provably secure authenticated encryption schemes [Volume 6, Issue 2, 2014, Pages 125-139]
-
Aref, M. R.
Total break of Zorro using linear and differential attacks [Volume 6, Issue 1, 2014, Pages 23-34]
-
Aref, M. R.
Toward an energy efficient PKC-based key management system for wireless sensor networks [Volume 6, Issue 1, 2014, Pages 53-66]
-
Aref, M. R.
Artemia: a family of provably secure authenticated encryption schemes [Volume 6, Issue 2, 2014, Pages 125-139]
B
-
Bagheri, N.
Artemia: a family of provably secure authenticated encryption schemes [Volume 6, Issue 2, 2014, Pages 125-139]
-
Berenjkoub, M.
An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks [Volume 6, Issue 2, 2014, Pages 141-153]
C
-
Cimato, S.
A risk model for cloud processes [Volume 6, Issue 2, 2014, Pages 99-123]
D
-
Damiani, E.
A risk model for cloud processes [Volume 6, Issue 2, 2014, Pages 99-123]
-
Davarpanah Jazi, M.
A centralized privacy-preserving framework for online social networks [Volume 6, Issue 1, 2014, Pages 35-52]
-
Doroudian, M.
A hybrid approach for database intrusion detection at transaction and inter-transaction levels [Volume 6, Issue 2, 2014, Pages 155-167]
E
-
Ebrahimi Atani, R.
Improving Tor security against timing and traffic analysis attacks with fair randomization [Volume 6, Issue 1, 2014, Pages 67-76]
-
Esmaeili, J.
Access control in ultra-large-scale systems using a data-centric middleware [Volume 6, Issue 1, 2014, Pages 3-22]
G
-
Ghaemmaghami, Sh.
An extended feature set for blind image steganalysis in contourlet domain [Volume 6, Issue 2, 2014, Pages 169-181]
-
Ghasemzadeh, H.
Toward an energy efficient PKC-based key management system for wireless sensor networks [Volume 6, Issue 1, 2014, Pages 53-66]
-
Gianini, G.
A risk model for cloud processes [Volume 6, Issue 2, 2014, Pages 99-123]
H
-
Hamidzadeh, J.
A density based clustering approach to distinguish between web robot and human requests to a web server [Volume 6, Issue 1, 2014, Pages 77-89]
J
-
Jalili, R.
Editorial [Volume 6, Issue 1, 2014, Pages 1-2]
-
Jalili, R.
Editorial [Volume 6, Issue 2, 2014, Pages 97-98]
M
-
Miri, A.
A centralized privacy-preserving framework for online social networks [Volume 6, Issue 1, 2014, Pages 35-52]
-
Movaghar, A.
A two-phase wormhole attack detection scheme in MANETs [Volume 6, Issue 2, 2014, Pages 183-191]
P
-
Payandeh, A.
Toward an energy efficient PKC-based key management system for wireless sensor networks [Volume 6, Issue 1, 2014, Pages 53-66]
R
-
Raji, F.
A centralized privacy-preserving framework for online social networks [Volume 6, Issue 1, 2014, Pages 35-52]
-
Rasoolzadeh, Sh.
Total break of Zorro using linear and differential attacks [Volume 6, Issue 1, 2014, Pages 23-34]
S
-
Salmasizadeh, M.
Total break of Zorro using linear and differential attacks [Volume 6, Issue 1, 2014, Pages 23-34]
-
Shahriari, H. R.
A hybrid approach for database intrusion detection at transaction and inter-transaction levels [Volume 6, Issue 2, 2014, Pages 155-167]
-
Shakeri, E.
An extended feature set for blind image steganalysis in contourlet domain [Volume 6, Issue 2, 2014, Pages 169-181]
-
Shamaei, Sh.
A two-phase wormhole attack detection scheme in MANETs [Volume 6, Issue 2, 2014, Pages 183-191]
-
Shams, F.
Access control in ultra-large-scale systems using a data-centric middleware [Volume 6, Issue 1, 2014, Pages 3-22]
-
Shokrollahi, S.
Access control in ultra-large-scale systems using a data-centric middleware [Volume 6, Issue 1, 2014, Pages 3-22]
T
-
Tavakoly, A.
Improving Tor security against timing and traffic analysis attacks with fair randomization [Volume 6, Issue 1, 2014, Pages 67-76]
V
-
Vafaei Jahan, M.
A density based clustering approach to distinguish between web robot and human requests to a web server [Volume 6, Issue 1, 2014, Pages 77-89]
Z
-
Zabihi, M.
A density based clustering approach to distinguish between web robot and human requests to a web server [Volume 6, Issue 1, 2014, Pages 77-89]