|
|
|
|
|
 |
Information |
 |
|
You can copy/paste HTML codes anywhere you like, for example in homepage, or even other sites
On the Use of Fuzzy-WLC modeling technique for Evaluating Security of Cryptographic Module *Abstract - Full Text (PDF)
Integrity checking of outsourced computations Somayeh Dolatnezhad Samarin, Morteza Amini *Abstract - Full Text (PDF)
Privacy-preserving data and function in cloud environments using homomorphic encryption Amin Hosseingholizadeh, Farhad Rahmati, Mohammad Ali *Abstract - Full Text (PDF)
Review of the security models with emphasis on leakage-resilient key exchange protocols Nasser Zarbi, Ali Zaeembashi *, Nasour Bagheri Abstract - Full Text (PDF)
A Comprehensive Exploration of Deep Learning Approaches in Differential Cryptanalysis of Lightweight Block Ciphers Iman Mirzaali Mazandarani, Nasour Bagheri *, Sadegh Sadeghi Abstract - Full Text (PDF)
An overview of secure authentication methods using ECG biometrics with deep learning algorithms Narges Mokhtari, Amirhossein Safari, Sadegh Sadeghi *Abstract - Full Text (PDF)
Methods of analyzing and proving the security of security protocols MOhammad Dakhilalian *, Masomeh Safkhani, Fatemeh Pirmoradian Abstract - Full Text (PDF)
Back to Original Issue
|
|
|
|
|
|
|
|
|
|
|