|
|
|
|
|
|
 |
 |
|
 |
|
 |
|
Volume 11, Issue 2 (3-2023) |
 |
|
|
|
 |
Multi-Party Quantum Dialogue with the Capability to Expand the Number of Users at Runtime |
P. 1-10 |
|
 |
Ali Khazaei * , Hossein Homaei , Monireh Houshmand  |
|
Abstract
(3438 Views) |
Full-Text (PDF)
(1211 Downloads)
|
 |
Electronic Money Laundering Detection in Transactions of Payment Service Providers |
P. 11-21 |
|
 |
Ali Nazari * , Babak Sadeghiyan  |
|
Abstract
(4015 Views) |
Full-Text (PDF)
(1309 Downloads)
|
 |
Consensus Method with High Security and Low Communication Load |
P. 22-32 |
|
 |
Alireza Hediehloo , Javad Mohajery * , Mohammadreza Aref  |
|
Abstract
(3978 Views) |
Full-Text (PDF)
(1042 Downloads)
|
 |
Designing and Implementing two Laboratory Samples of the Intelligent System for Detecting Encrypted VoIP Skype Traffic and the Lantern Escape Tool using Deep Learning Method |
P. 33-43 |
|
 |
Mahmoud saeidi * , Nasrin Taaj , Azadeh Bamdad Moghaddam  |
|
Abstract
(2651 Views) |
Full-Text (PDF)
(2058 Downloads)
|
 |
Security Analysis of an Anonymous Authentication and Key Agreement Scheme in Wireless Body Area Network |
P. 44-51 |
|
 |
Saba Marandi * , Farrokhlagha Moazzami  |
|
Abstract
(3433 Views) |
Full-Text (PDF)
(1325 Downloads)
|
 |
Modeling Attacker’s Capability Level Focusing on Injection Attacks on Web Applications |
P. 52-60 |
|
 |
Sara Moqimi * , Mohammad Ali Hadavi  |
|
Abstract
(3181 Views) |
Full-Text (PDF)
(1123 Downloads)
|
 |
Wavelet-based Image Steganography using the Idea of Embedding in Areas of High Frequency Subbands with Large Variations |
P. 61-68 |
|
 |
Vajiheh Sabeti * , Masomeh Sobhani  |
|
Abstract
(2757 Views) |
Full-Text (PDF)
(1401 Downloads)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|