|
|
|
|
|
 |
Information |
 |
|
You can copy/paste HTML codes anywhere you like, for example in homepage, or even other sites
Multi-Party Quantum Dialogue with the Capability to Expand the Number of Users at Runtime Ali Khazaei *, Hossein Homaei, Monireh Houshmand Abstract - Full Text (PDF)
Electronic Money Laundering Detection in Transactions of Payment Service Providers Ali Nazari *, Babak Sadeghiyan Abstract - Full Text (PDF)
Consensus Method with High Security and Low Communication Load Alireza Hediehloo, Javad Mohajery *, Mohammadreza Aref Abstract - Full Text (PDF)
Designing and Implementing two Laboratory Samples of the Intelligent System for Detecting Encrypted VoIP Skype Traffic and the Lantern Escape Tool using Deep Learning Method Mahmoud saeidi *, Nasrin Taaj, Azadeh Bamdad Moghaddam Abstract - Full Text (PDF)
Security Analysis of an Anonymous Authentication and Key Agreement Scheme in Wireless Body Area Network Saba Marandi *, Farrokhlagha Moazzami Abstract - Full Text (PDF)
Modeling Attacker’s Capability Level Focusing on Injection Attacks on Web Applications Sara Moqimi *, Mohammad Ali Hadavi Abstract - Full Text (PDF)
Wavelet-based Image Steganography using the Idea of Embedding in Areas of High Frequency Subbands with Large Variations Vajiheh Sabeti *, Masomeh Sobhani Abstract - Full Text (PDF)
Back to Original Issue
|
|
|
|
|
|
|
|
|
|
|