|
 |
Multi-Party Quantum Dialogue with the Capability to Expand the Number of Users at Runtime |
P. 1-10 |
|
 |
Ali Khazaei * , Hossein Homaei , Monireh Houshmand  |
|
Abstract
(2499 Views) |
Full-Text (PDF)
(787 Downloads)
|
 |
Electronic Money Laundering Detection in Transactions of Payment Service Providers |
P. 11-21 |
|
 |
Ali Nazari * , Babak Sadeghiyan  |
|
Abstract
(3041 Views) |
Full-Text (PDF)
(897 Downloads)
|
 |
Consensus Method with High Security and Low Communication Load |
P. 22-32 |
|
 |
Alireza Hediehloo , Javad Mohajery * , Mohammadreza Aref  |
|
Abstract
(2994 Views) |
Full-Text (PDF)
(650 Downloads)
|
 |
Designing and Implementing two Laboratory Samples of the Intelligent System for Detecting Encrypted VoIP Skype Traffic and the Lantern Escape Tool using Deep Learning Method |
P. 33-43 |
|
 |
Mahmoud saeidi * , Nasrin Taaj , Azadeh Bamdad Moghaddam  |
|
Abstract
(1743 Views) |
Full-Text (PDF)
(1500 Downloads)
|
 |
Security Analysis of an Anonymous Authentication and Key Agreement Scheme in Wireless Body Area Network |
P. 44-51 |
|
 |
Saba Marandi * , Farrokhlagha Moazzami  |
|
Abstract
(2395 Views) |
Full-Text (PDF)
(839 Downloads)
|
 |
Modeling Attacker’s Capability Level Focusing on Injection Attacks on Web Applications |
P. 52-60 |
|
 |
Sara Moqimi * , Mohammad Ali Hadavi  |
|
Abstract
(2200 Views) |
Full-Text (PDF)
(696 Downloads)
|
 |
Wavelet-based Image Steganography using the Idea of Embedding in Areas of High Frequency Subbands with Large Variations |
P. 61-68 |
|
 |
Vajiheh Sabeti * , Masomeh Sobhani  |
|
Abstract
(1904 Views) |
Full-Text (PDF)
(880 Downloads)
|