A
-
Ameri, M.H.
On the Security of O-PSI: A Delegated Private Set Intersection on Outsourced Datasets (Extended Version) [Volume 10, Issue 2, 2018, Pages 117-127]
-
Aref, M. R.
Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher (Extended Version) [Volume 10, Issue 1, 2018, Pages 3-13]
-
Aref, M.R.
On the Security of O-PSI: A Delegated Private Set Intersection on Outsourced Datasets (Extended Version) [Volume 10, Issue 2, 2018, Pages 117-127]
-
Aref, M.R.
Editorial [Volume 10, Issue 2, 2018, Pages 77-78]
-
Ashouri-Talouki, M.
An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks [Volume 10, Issue 1, 2018, Pages 15-27]
-
Azimi, A.
Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher (Extended Version) [Volume 10, Issue 1, 2018, Pages 3-13]
B
-
Behniafar, M.
A Survey of Anomaly Detection Approaches in Internet of Things [Volume 10, Issue 2, 2018, Pages 79-92]
-
Bohlooli, R.
Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version) [Volume 10, Issue 2, 2018, Pages 129-139]
D
-
Delavar, M.
On the Security of O-PSI: A Delegated Private Set Intersection on Outsourced Datasets (Extended Version) [Volume 10, Issue 2, 2018, Pages 117-127]
E
-
Ebrahimi Atani, Reza
NETRU: A Non-commutative and Secure Variant of CTRU Cryptosystem [Volume 10, Issue 1, 2018, Pages 45-53]
-
Ebrahimi Atani, Shahabaddin
NETRU: A Non-commutative and Secure Variant of CTRU Cryptosystem [Volume 10, Issue 1, 2018, Pages 45-53]
H
-
Hassani Karbasi, A.
NETRU: A Non-commutative and Secure Variant of CTRU Cryptosystem [Volume 10, Issue 1, 2018, Pages 45-53]
-
Hassannejad, H.
Classification of encrypted traffic for applications based on statistical features [Volume 10, Issue 1, 2018, Pages 29-43]
J
-
Jalili, R.
Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version) [Volume 10, Issue 2, 2018, Pages 129-139]
K
-
Khoshhalpour, E.
BotRevealer: Behavioral Detection of Botnets based on Botnet Life-cycle [Volume 10, Issue 1, 2018, Pages 55-61]
M
-
Mahdavi, E.
Classification of encrypted traffic for applications based on statistical features [Volume 10, Issue 1, 2018, Pages 29-43]
-
Mahdavi, M.
An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks [Volume 10, Issue 1, 2018, Pages 15-27]
-
Mahdavi Oliaee, M.
On the Security of O-PSI: A Delegated Private Set Intersection on Outsourced Datasets (Extended Version) [Volume 10, Issue 2, 2018, Pages 117-127]
-
Mehrdad, A.R.
Impossible Differential Cryptanalysis on Deoxys-BC-256 [Volume 10, Issue 2, 2018, Pages 93-105]
-
Moazami, F.
Impossible Differential Cryptanalysis on Deoxys-BC-256 [Volume 10, Issue 2, 2018, Pages 93-105]
-
Mohajeri, J.
Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher (Extended Version) [Volume 10, Issue 1, 2018, Pages 3-13]
-
Mohajeri, J.
On the Security of O-PSI: A Delegated Private Set Intersection on Outsourced Datasets (Extended Version) [Volume 10, Issue 2, 2018, Pages 117-127]
-
Mohseni-Ejiyeh, A.
An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks [Volume 10, Issue 1, 2018, Pages 15-27]
N
-
Nowroozi, A.R.
A Survey of Anomaly Detection Approaches in Internet of Things [Volume 10, Issue 2, 2018, Pages 79-92]
P
-
Patil, Dharmaraj Rajaram
Feature-based Malicious URL and attack type detection using multi-class classification [Volume 10, Issue 2, 2018, Pages 141-162]
-
Patil, Jayantrao
Feature-based Malicious URL and attack type detection using multi-class classification [Volume 10, Issue 2, 2018, Pages 141-162]
-
Pourpouneh, M.
A Decentralized Online Sortition Protocol [Volume 10, Issue 1, 2018, Pages 63-69]
R
-
Ramezanian, R.
A Decentralized Online Sortition Protocol [Volume 10, Issue 1, 2018, Pages 63-69]
-
Ramezanian, R.
Distributed Contingency Logic and Security [Volume 10, Issue 2, 2018, Pages 107-115]
-
Rezaei Shahmirzdi, A.
Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher (Extended Version) [Volume 10, Issue 1, 2018, Pages 3-13]
S
-
Salmasizadeh, M.
Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher (Extended Version) [Volume 10, Issue 1, 2018, Pages 3-13]
-
Shahriari, H. R.
BotRevealer: Behavioral Detection of Botnets based on Botnet Life-cycle [Volume 10, Issue 1, 2018, Pages 55-61]
-
Shahriari, H.R.
A Survey of Anomaly Detection Approaches in Internet of Things [Volume 10, Issue 2, 2018, Pages 79-92]
-
Soleimany, H.
Impossible Differential Cryptanalysis on Deoxys-BC-256 [Volume 10, Issue 2, 2018, Pages 93-105]
-
Soltani, N.
Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version) [Volume 10, Issue 2, 2018, Pages 129-139]