You can copy/paste HTML codes anywhere you like, for example in homepage, or even other sites
On the Use of Fuzzy-WLC modeling technique for Evaluating Security of Cryptographic Module
*
Abstract - Full Text (PDF)
*
Abstract - Full Text (PDF)
Integrity checking of outsourced computations
Somayeh Dolatnezhad Samarin, Morteza Amini *
Abstract - Full Text (PDF)
Somayeh Dolatnezhad Samarin, Morteza Amini *
Abstract - Full Text (PDF)
Privacy-preserving data and function in cloud environments using homomorphic encryption
Amin Hosseingholizadeh, Farhad Rahmati, Mohammad Ali *
Abstract - Full Text (PDF)
Amin Hosseingholizadeh, Farhad Rahmati, Mohammad Ali *
Abstract - Full Text (PDF)
Review of the security models with emphasis on leakage-resilient key exchange protocols
Nasser Zarbi, Ali Zaeembashi *, Nasour Bagheri
Abstract - Full Text (PDF)
Nasser Zarbi, Ali Zaeembashi *, Nasour Bagheri
Abstract - Full Text (PDF)
A Comprehensive Exploration of Deep Learning Approaches in Differential Cryptanalysis of Lightweight Block Ciphers
Iman Mirzaali Mazandarani, Nasour Bagheri *, Sadegh Sadeghi
Abstract - Full Text (PDF)
Iman Mirzaali Mazandarani, Nasour Bagheri *, Sadegh Sadeghi
Abstract - Full Text (PDF)