You can copy/paste HTML codes anywhere you like, for example in homepage, or even other sites
On the Use of Fuzzy-WLC modeling technique for Evaluating Security of Cryptographic Module *Abstract -
Full Text (PDF)
Integrity checking of outsourced computations Somayeh Dolatnezhad Samarin, Morteza Amini
*Abstract -
Full Text (PDF)
Privacy-preserving data and function in cloud environments using homomorphic encryption Amin Hosseingholizadeh, Farhad Rahmati, Mohammad Ali
*Abstract -
Full Text (PDF)
Review of the security models with emphasis on leakage-resilient key exchange protocols Nasser Zarbi, Ali Zaeembashi
*, Nasour Bagheri
Abstract -
Full Text (PDF)
A Comprehensive Exploration of Deep Learning Approaches in Differential Cryptanalysis of Lightweight Block Ciphers Iman Mirzaali Mazandarani, Nasour Bagheri
*, Sadegh Sadeghi
Abstract -
Full Text (PDF)
An overview of secure authentication methods using ECG biometrics with deep learning algorithms Narges Mokhtari, Amirhossein Safari, Sadegh Sadeghi
*Abstract -
Full Text (PDF)
Methods of analyzing and proving the security of security protocols MOhammad Dakhilalian
*, Masomeh Safkhani, Fatemeh Pirmoradian
Abstract -
Full Text (PDF)
Back to Original Issue