A

  • Ameri, M.H. On the Security of O-PSI: A Delegated Private Set Intersection on Outsourced Datasets (Extended Version) [Volume 10, Issue 2, 2018, Pages 117-127]

  • Aref, M. R. Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher (Extended Version) [Volume 10, Issue 1, 2018, Pages 3-13]

  • Aref, M.R. On the Security of O-PSI: A Delegated Private Set Intersection on Outsourced Datasets (Extended Version) [Volume 10, Issue 2, 2018, Pages 117-127]

  • Aref, M.R. Editorial [Volume 10, Issue 2, 2018, Pages 77-78]

  • Ashouri-Talouki, M. An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks [Volume 10, Issue 1, 2018, Pages 15-27]

  • Azimi, A. Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher (Extended Version) [Volume 10, Issue 1, 2018, Pages 3-13]

B

  • Behniafar, M. A Survey of Anomaly Detection Approaches in Internet of Things [Volume 10, Issue 2, 2018, Pages 79-92]

  • Bohlooli, R. Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version) [Volume 10, Issue 2, 2018, Pages 129-139]

D

  • Delavar, M. On the Security of O-PSI: A Delegated Private Set Intersection on Outsourced Datasets (Extended Version) [Volume 10, Issue 2, 2018, Pages 117-127]

E

  • Ebrahimi Atani, Reza NETRU: A Non-commutative and Secure Variant of CTRU Cryptosystem [Volume 10, Issue 1, 2018, Pages 45-53]

  • Ebrahimi Atani, Shahabaddin NETRU: A Non-commutative and Secure Variant of CTRU Cryptosystem [Volume 10, Issue 1, 2018, Pages 45-53]

H

  • Hassani Karbasi, A. NETRU: A Non-commutative and Secure Variant of CTRU Cryptosystem [Volume 10, Issue 1, 2018, Pages 45-53]

  • Hassannejad, H. Classification of encrypted traffic for applications based on statistical features [Volume 10, Issue 1, 2018, Pages 29-43]

J

  • Jalili, R. Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version) [Volume 10, Issue 2, 2018, Pages 129-139]

K

  • Khoshhalpour, E. BotRevealer: Behavioral Detection of Botnets based on Botnet Life-cycle [Volume 10, Issue 1, 2018, Pages 55-61]

M

  • Mahdavi, E. Classification of encrypted traffic for applications based on statistical features [Volume 10, Issue 1, 2018, Pages 29-43]

  • Mahdavi, M. An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks [Volume 10, Issue 1, 2018, Pages 15-27]

  • Mahdavi Oliaee, M. On the Security of O-PSI: A Delegated Private Set Intersection on Outsourced Datasets (Extended Version) [Volume 10, Issue 2, 2018, Pages 117-127]

  • Mehrdad, A.R. Impossible Differential Cryptanalysis on Deoxys-BC-256 [Volume 10, Issue 2, 2018, Pages 93-105]

  • Moazami, F. Impossible Differential Cryptanalysis on Deoxys-BC-256 [Volume 10, Issue 2, 2018, Pages 93-105]

  • Mohajeri, J. Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher (Extended Version) [Volume 10, Issue 1, 2018, Pages 3-13]

  • Mohajeri, J. On the Security of O-PSI: A Delegated Private Set Intersection on Outsourced Datasets (Extended Version) [Volume 10, Issue 2, 2018, Pages 117-127]

  • Mohseni-Ejiyeh, A. An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks [Volume 10, Issue 1, 2018, Pages 15-27]

N

  • Nowroozi, A.R. A Survey of Anomaly Detection Approaches in Internet of Things [Volume 10, Issue 2, 2018, Pages 79-92]

P

  • Patil, Dharmaraj Rajaram Feature-based Malicious URL and attack type detection using multi-class classification [Volume 10, Issue 2, 2018, Pages 141-162]

  • Patil, Jayantrao Feature-based Malicious URL and attack type detection using multi-class classification [Volume 10, Issue 2, 2018, Pages 141-162]

  • Pourpouneh, M. A Decentralized Online Sortition Protocol [Volume 10, Issue 1, 2018, Pages 63-69]

R

  • Ramezanian, R. A Decentralized Online Sortition Protocol [Volume 10, Issue 1, 2018, Pages 63-69]

  • Ramezanian, R. Distributed Contingency Logic and Security [Volume 10, Issue 2, 2018, Pages 107-115]

  • Rezaei Shahmirzdi, A. Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher (Extended Version) [Volume 10, Issue 1, 2018, Pages 3-13]

S

  • Salmasizadeh, M. Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher (Extended Version) [Volume 10, Issue 1, 2018, Pages 3-13]

  • Shahriari, H. R. BotRevealer: Behavioral Detection of Botnets based on Botnet Life-cycle [Volume 10, Issue 1, 2018, Pages 55-61]

  • Shahriari, H.R. A Survey of Anomaly Detection Approaches in Internet of Things [Volume 10, Issue 2, 2018, Pages 79-92]

  • Soleimany, H. Impossible Differential Cryptanalysis on Deoxys-BC-256 [Volume 10, Issue 2, 2018, Pages 93-105]

  • Soltani, N. Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version) [Volume 10, Issue 2, 2018, Pages 129-139]