A

  • Abdollahi Azgomi, M. Quantitative evaluation of software security: an approach based on UML/SecAM and evidence theory [Volume 8, Issue 2, 2016, Pages 141-153]

  • Abolghasemi, M. S. A novel key management scheme for heterogeneous sensor networks based on the position of nodes [Volume 8, Issue 2, 2016, Pages 115-130]

  • Amini Khorasgani, H. R. On the design and security of a lattice-based threshold secret sharing scheme [Volume 8, Issue 1, 2016, Pages 25-38]

  • Aminmansour, F. Aggrandizing the beast's limbs: patulous code reuse attack on ARM architecture [Volume 8, Issue 1, 2016, Pages 39-52]

  • Aref, M. R. Editorial [Volume 8, Issue 1, 2016, Pages 1-2]

  • Aref, M. R. On the design and security of a lattice-based threshold secret sharing scheme [Volume 8, Issue 1, 2016, Pages 25-38]

  • Aref, M. R. Optimum decoder for multiplicative spread spectrum image watermarking with Laplacian modeling [Volume 8, Issue 2, 2016, Pages 131-139]

  • Aref, M. R. Editorial [Volume 8, Issue 2, 2016, Pages 91-92]

  • Asaad, S. On the design and security of a lattice-based threshold secret sharing scheme [Volume 8, Issue 1, 2016, Pages 25-38]

B

  • Bagheri, N. A note on the security of two improved RFID protocols [Volume 8, Issue 2, 2016, Pages 155-160]

  • Bahramgiri, H. A new method for accelerating impossible differential cryptanalysis and its application on LBlock [Volume 8, Issue 1, 2016, Pages 73-84]

E

  • Ebrahimi Atani, R. A novel key management scheme for heterogeneous sensor networks based on the position of nodes [Volume 8, Issue 2, 2016, Pages 115-130]

  • Eghlidos, T. On the design and security of a lattice-based threshold secret sharing scheme [Volume 8, Issue 1, 2016, Pages 25-38]

F

  • Fazeli, M. Unauthenticated event detection in wireless sensor networks using sensors co-coverage [Volume 8, Issue 1, 2016, Pages 61-71]

H

  • Haghbin, A. Traceability improvements of a new RFID protocol based on EPC C1 G2 [Volume 8, Issue 2, 2016, Pages 105-114]

J

  • Jahanian, A. Self authentication path insertion in FPGA-based design flow for tamper-resistant purpose [Volume 8, Issue 1, 2016, Pages 53-60]

  • Jahanian, A. ASIC design protection against reverse engineering during the fabrication process using automatic netlist obfuscation design flow [Volume 8, Issue 2, 2016, Pages 93-104]

K

  • Kamarei, M. Unauthenticated event detection in wireless sensor networks using sensors co-coverage [Volume 8, Issue 1, 2016, Pages 61-71]

  • Khalesi, A. A new method for accelerating impossible differential cryptanalysis and its application on LBlock [Volume 8, Issue 1, 2016, Pages 73-84]

M

  • Mansuri, D. A new method for accelerating impossible differential cryptanalysis and its application on LBlock [Volume 8, Issue 1, 2016, Pages 73-84]

  • Mirmohseni, M. Traceability improvements of a new RFID protocol based on EPC C1 G2 [Volume 8, Issue 2, 2016, Pages 105-114]

P

  • Patooghy, A. Unauthenticated event detection in wireless sensor networks using sensors co-coverage [Volume 8, Issue 1, 2016, Pages 61-71]

  • Pilaram, H. On the design and security of a lattice-based threshold secret sharing scheme [Volume 8, Issue 1, 2016, Pages 25-38]

  • Pourpouneh, M. A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving [Volume 8, Issue 1, 2016, Pages 3-24]

R

  • Ramezanian, R. A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving [Volume 8, Issue 1, 2016, Pages 3-24]

  • Rezapour, T. Y. A novel key management scheme for heterogeneous sensor networks based on the position of nodes [Volume 8, Issue 2, 2016, Pages 115-130]

S

  • Safkhani, M. A note on the security of two improved RFID protocols [Volume 8, Issue 2, 2016, Pages 155-160]

  • Sajjadi Ghaemmaghami, S. Traceability improvements of a new RFID protocol based on EPC C1 G2 [Volume 8, Issue 2, 2016, Pages 105-114]

  • Sedaghatbaf, A. Quantitative evaluation of software security: an approach based on UML/SecAM and evidence theory [Volume 8, Issue 2, 2016, Pages 141-153]

  • Shahriari, H. R. Aggrandizing the beast's limbs: patulous code reuse attack on ARM architecture [Volume 8, Issue 1, 2016, Pages 39-52]

Z

  • Zamanzadeh, Sh. Self authentication path insertion in FPGA-based design flow for tamper-resistant purpose [Volume 8, Issue 1, 2016, Pages 53-60]

  • Zamanzadeh, Sh. ASIC design protection against reverse engineering during the fabrication process using automatic netlist obfuscation design flow [Volume 8, Issue 2, 2016, Pages 93-104]

  • Zarmehi, N. Optimum decoder for multiplicative spread spectrum image watermarking with Laplacian modeling [Volume 8, Issue 2, 2016, Pages 131-139]