|
|
|
|
|
|
 |
 |
|
 |
|
 |
|
Volume 14, Issue 1 (9-2025) |
 |
|
|
|
 |
Cryptanalysis of Modular Operations |
P. 1-18 |
 |
Marzieh Vahid Dastjerdi * , Majid Rahimi  |
|
Abstract
(2320 Views) |
Full-Text (PDF)
(952 Downloads)
|
 |
Analysis of frameworks, standards, platforms, and coalitions supporting the development of cyber threat intelligence in organizations |
P. 19-44 |
 |
Amin Chahardoli , Abouzar Arabsorkhi *  |
|
Abstract
(2101 Views) |
Full-Text (PDF)
(860 Downloads)
|
 |
A secure and privacy-preserving electronic invoice based on blockchain technology |
P. 45-63 |
 |
Vahideh Ghanooni Shishavan , Shaban Elahi * , Sadegh Dorri Nogoorani , Ali Yazdian Varjani  |
|
Abstract
(2196 Views) |
Full-Text (PDF)
(1348 Downloads)
|
 |
A systematic review of the literature on security and privacy and improving an onymity in the blockchain network |
P. 64-96 |
 |
Fatemeh Charlank Bakhtiari * , Abbas Ghaemi Bafghi  |
|
Abstract
(1766 Views) |
Full-Text (PDF)
(874 Downloads)
|
 |
A comprehensive review of cyber deception concepts, comparative analysis of deception platforms, and proposal of three exemplary implementations for deceiving attackers |
P. 97-119 |
 |
Seyed Ali Samouti * , Sajad Tarhani , Mohsen Babakhani  |
|
Abstract
(1091 Views) |
Full-Text (PDF)
(905 Downloads)
|
 |
An Overview of Transient Fault Attacks on Block Ciphers |
P. 120-134 |
 |
Mehdi Farzanegan  |
|
Abstract
(134 Views) |
Full-Text (PDF)
(73 Downloads)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|