|
|
|
|
|
|
|
|
|
|
Volume 12, Issue 2 (2-2024) |
|
|
|
|
A Secure Authentication and Key Agreement Scheme for LoRaWAN |
P. 1-15 |
|
|
Zahra Jafari , Sahar Palimi , Mohamadamin Sabaei , Rahman Hajian , Hossein Erfani * |
|
Abstract
(1163 Views) |
Full-Text (PDF)
(376 Downloads)
|
|
A New Mixing Scheme to Improve Privacy in Bitcoin Cryptocurrency Transactions |
P. 16-23 |
|
|
Hadi Norouzi Cholcheh * , Salman Niksefat |
|
Abstract
(1430 Views) |
Full-Text (PDF)
(620 Downloads)
|
|
Analysis of global trends in providing educational frameworks for training cyber security professionals |
P. 24-32 |
|
|
Ahmad Rahdari , Mohammad Hesam Tadayon * |
|
Abstract
(950 Views) |
Full-Text (PDF)
(291 Downloads)
|
|
Electrocardiogram Signal Authentication System based on Deep Learning |
P. 33-41 |
|
|
Sajjad Maleki Lonbar , Akram Beigi * , Nasour Bagheri |
|
Abstract
(811 Views) |
Full-Text (PDF)
(310 Downloads)
|
|
A comprehensive evaluation of deep learning based steganalysis performance in detecting spatial methods |
P. 42-50 |
|
|
Vajiheh Sabeti * , Mahdiyeh Samiei |
|
Abstract
(551 Views) |
Full-Text (PDF)
(204 Downloads)
|
|
Practical key recovery attack on authentication and key agreement protocol SecAuthUAV in a network of drones and provide an
improved protocol |
P. 51-59 |
|
|
Javad Alizadeh , Seyyed Hadi Noorani Asl * |
|
Abstract
(826 Views) |
Full-Text (PDF)
(204 Downloads)
|
|
Verifiable Database Supporting Range Query |
P. 60-72 |
|
|
Seyed Hossein Tahami * , Hamid Mala |
|
Abstract
(621 Views) |
Full-Text (PDF)
(190 Downloads)
|
|
FPGA Implementation of Polynomial Multiplication in NTRU Prime PQC Algorithms |
P. 73-80 |
|
|
Reza Rashidian , Raziyeh Salarifard * , Ali Jahanian |
|
Abstract
(1302 Views) |
Full-Text (PDF)
(618 Downloads)
|
|
|
|
|
|
|
|
|
|
|