|
|
|
 |
 |
|
 |
|
 |
|
Volume 11, Issue 2 (3-2023) |
 |
|
|
 |
Multi-Party Quantum Dialogue with the Capability to Expand the Number of Users at Runtime |
P. 1-10 |
|
 |
Ali Khazaei * , Hossein Homaei , Monireh Houshmand  |
|
Abstract
(2663 Views) |
Full-Text (PDF)
(852 Downloads)
|
 |
Electronic Money Laundering Detection in Transactions of Payment Service Providers |
P. 11-21 |
|
 |
Ali Nazari * , Babak Sadeghiyan  |
|
Abstract
(3226 Views) |
Full-Text (PDF)
(962 Downloads)
|
 |
Consensus Method with High Security and Low Communication Load |
P. 22-32 |
|
 |
Alireza Hediehloo , Javad Mohajery * , Mohammadreza Aref  |
|
Abstract
(3179 Views) |
Full-Text (PDF)
(699 Downloads)
|
 |
Designing and Implementing two Laboratory Samples of the Intelligent System for Detecting Encrypted VoIP Skype Traffic and the Lantern Escape Tool using Deep Learning Method |
P. 33-43 |
|
 |
Mahmoud saeidi * , Nasrin Taaj , Azadeh Bamdad Moghaddam  |
|
Abstract
(1907 Views) |
Full-Text (PDF)
(1633 Downloads)
|
 |
Security Analysis of an Anonymous Authentication and Key Agreement Scheme in Wireless Body Area Network |
P. 44-51 |
|
 |
Saba Marandi * , Farrokhlagha Moazzami  |
|
Abstract
(2580 Views) |
Full-Text (PDF)
(905 Downloads)
|
 |
Modeling Attacker’s Capability Level Focusing on Injection Attacks on Web Applications |
P. 52-60 |
|
 |
Sara Moqimi * , Mohammad Ali Hadavi  |
|
Abstract
(2374 Views) |
Full-Text (PDF)
(750 Downloads)
|
 |
Wavelet-based Image Steganography using the Idea of Embedding in Areas of High Frequency Subbands with Large Variations |
P. 61-68 |
|
 |
Vajiheh Sabeti * , Masomeh Sobhani  |
|
Abstract
(2071 Views) |
Full-Text (PDF)
(969 Downloads)
|
|
|
|
|
|
|
|
|
|
|