Current Issue Issue 61 , 62 Vol 16 Autumn - Winter 2024 Submit Your Paper Published Issues Vol. 16 ✓ Issue 61 , 62 - Autumn - Winter 2024 ✓ Issue 59 , 60 - Spring - Summer 2024 Vol. 15 ✓ Issue 57 , 58 - Autumn - Winter 2023 ✓ Issue 55 , 56 - Spring - Summer 2023 Vol. 14 ✓ Issue 53 , 54 - Autumn - Winter 2023 ✓ Issue 51 , 52 - Spring - Summer 2022 Vol. 13 ✓ Issue 49 , 50 - Autumn - Winter 2021 ✓ Issue 47 , 48 - Spring - Summer 2021 Vol. 12 ✓ Issue 45 , 46 - Autumn - Winter 2021 ✓ Issue 43 , 44 - Spring - Summer 2020 Vol. 11 ✓ Issue 41 , 42 - Autumn - Winter 2020 ✓ Issue 39 , 40 - Spring - Summer 2019 Vol. 10 ✓ Issue 37 , 38 - Autumn - Winter 2019 ✓ Issue 35 , 36 - Spring - Summer 2018 Vol. 9 ✓ Issue 33 , 34 - Autumn - Winter 2017 ✓ Issue 31 , 32 - Spring - Summer 2017 Vol. 8 ✓ Issue 30 , 31 - Autumn - Winter 2016 ✓ Issue 27 , 28 - Spring - Summer 2016 Vol. 7 ✓ Issue 26 , 27 - Autumn - Winter 2015 ✓ Issue 24 , 25 - Spring - Summer 2015 Vol. 6 ✓ Issue 22 , 23 - Autumn - Winter 2014 ✓ Issue 20 , 21 - Spring - Summer 1393 Vol. 5 ✓ Issue 18 , 19 - Autumn - Winter 2013 ✓ Issue 16 , 17 - Spring - Summer 2013 Vol. 4 ✓ Issue 14 , 15 - Autumn - Winter 2012 ✓ Issue 12 , 13 - Spring - Summer 2012 Vol. 2 ✓ Issue 6 , 7 - Autumn - Winter 2010 ✓ Issue 4 , 5 - Spring - Summer 2010 Vol. 1 ✓ Issue 2 , 3 - Autumn - Winter 2008 Menu • Peer Review • Open Access Journal • Publication Ethics • Instructions for authors Contact Journal Browse • Current Issue • By Issue • Author Index • By Subject • By Author
List of Articles security Open Access Article Abstract Page Full-Text 1 - Identification and Prioritization of Parameters Affecting Information Security Management System (Case Study: Social Security Branches of Guilan Province) Asadollah Shahbahrami ramin rafizadeh kasani hossein pour yousefi dargah 20.1001.1.27170411.1397.10.35.2.8 Open Access Article Abstract Page Full-Text 2 - An access control model for online social networks using user-to-user relationships Mohamad Javad Piran mahmud deypir 20.1001.1.27170411.1399.12.45.1.1 Open Access Article Abstract Page Full-Text 3 - Proposing a New Framework to Decreasing Delay in the Internet of Things by Using Computing Power of Fog Mohammad Taghi Shaykhan kianoosh azadi 20.1001.1.27170414.1400.13.47.2.8 Open Access Article Abstract Page Full-Text 4 - Investigation the role of personality and individual differences on password security breaches: An Empirical Study زهرا کریمی manije kaveh rezvan salehi milad moltaji 20.1001.1.27170411.1400.13.49.9.4 Open Access Article Abstract Page Full-Text 5 - computer security models and proposing a new perspective: A review paper Hadi sadjadi Reza Kalantari Open Access Article Abstract Page Full-Text 6 - Identifying the Key Drivers of Digital Signature Implementation in Iran (using fuzzy Delphi method) Ghorbanali Mehrabani Fatemeh Zargaran khouzani Open Access Article Abstract Page Full-Text 7 - Providing a Blockchain-Based Method to Protect Users’ Privacy in Social Networks Ibrahim Zamani Babgohari Monireh Hosseini Open Access Article Abstract Page Full-Text 8 - Provide A Lightweight Encryption Solution To secure Data In The Internet Of Things wahab aminiazar rasoul farahi fattameh dashti Open Access Article Abstract Page Full-Text 9 - A Survey on Computer Security Patterns and Proposing a New Perspective Hadi sadjadi Reza Kalantari Open Access Article Abstract Page Full-Text 10 - Identifying the Key Drivers of Digital Signature Implementation in Iran (Using Fuzzy Delphi Method) Ghorbanali Mehrabani Fatemeh Zargaran khouzani