You can copy/paste HTML codes anywhere you like, for example in homepage, or even other sites
Key Discovery and Forgery Attack on a Key Agreement Protocol with Authentication for Wireless Sensor Network
Amir Allahdadi Ghiyasabadi *, Javad Alizadeh
Abstract - Full Text (PDF)
Amir Allahdadi Ghiyasabadi *, Javad Alizadeh
Abstract - Full Text (PDF)
Unmanned Cyber Security Requirements in sub-Transmission Substation
Azam Mozafari *, Leila Zafari, Negin Hamian
Abstract - Full Text (PDF)
Azam Mozafari *, Leila Zafari, Negin Hamian
Abstract - Full Text (PDF)
Vulnerability Analysis of Digital Circuits against Capacitor-based Timing Hardware Trojan
Fatemeh Khormizi *, Bijan Alizadeh
Abstract - Full Text (PDF)
Fatemeh Khormizi *, Bijan Alizadeh
Abstract - Full Text (PDF)
Lightweight and Secure Authentication Key Agreement Protocol for Smart Grid
Seyed Hamid Baghestani *, Farokhlagha Moazami
Abstract - Full Text (PDF)
Seyed Hamid Baghestani *, Farokhlagha Moazami
Abstract - Full Text (PDF)
Masking Midori64 against Correlation Power Analysis Attack
Hamid Ghanbari *, Behrooz Khadem, Mohammad Jadidi
Abstract - Full Text (PDF)
Hamid Ghanbari *, Behrooz Khadem, Mohammad Jadidi
Abstract - Full Text (PDF)
Management of Electronic Health Records with Preservation of Privacy using the Blockchain Technology
Mahsa Rezaei, Sadegh Dorri Nogoorani *
Abstract - Full Text (PDF)
Mahsa Rezaei, Sadegh Dorri Nogoorani *
Abstract - Full Text (PDF)
A Tool for Detecting Man in the Browser (MitB) Attacks using Dynamic Analysis of Web Pages
Majid Iranpour Mobarakeh *, Behrouz Tork Ladani
Abstract - Full Text (PDF)
Majid Iranpour Mobarakeh *, Behrouz Tork Ladani
Abstract - Full Text (PDF)
A High-Speed Systolic Field Multiplication for Edwards 25519 Curve
Muhammad Rasoul Akhoundi Zardeyni *, Raziyeh Salarifard
Abstract - Full Text (PDF)
Muhammad Rasoul Akhoundi Zardeyni *, Raziyeh Salarifard
Abstract - Full Text (PDF)
Providing an RPL-based Reliable Routing Method in the Internet of Things
Reza Khatouni *, Mohammad Ghasemi Gol
Abstract - Full Text (PDF)
Reza Khatouni *, Mohammad Ghasemi Gol
Abstract - Full Text (PDF)
Inventing a Method to Save the Fog Node from Attacks
Seyed Omid Azarkasb *, Seyed Hossein Khasteh, Saeed Sedighian Kashi
Abstract - Full Text (PDF)
Seyed Omid Azarkasb *, Seyed Hossein Khasteh, Saeed Sedighian Kashi
Abstract - Full Text (PDF)
An Overview of Security Standards in the Field of ICT in order to Determining the Appropriate Methodology for the Security Evaluation of Equipment Related to Information and Communication Technology in the Power Industry
Sofia Ahanj *, Mahsa Rahmani, Vida Nobakht, Zahra Sadeghigol
Abstract - Full Text (PDF)
Sofia Ahanj *, Mahsa Rahmani, Vida Nobakht, Zahra Sadeghigol
Abstract - Full Text (PDF)