|
 |
On the Use of Fuzzy-WLC modeling technique for Evaluating Security of Cryptographic Module |
P. 1-11 |
 |
|
|
Abstract
(1329 Views) |
Full-Text (PDF)
(650 Downloads)
|
 |
Integrity checking of outsourced computations |
P. 12-29 |
 |
Somayeh Dolatnezhad Samarin , Morteza Amini *  |
|
Abstract
(2127 Views) |
Full-Text (PDF)
(747 Downloads)
|
 |
Privacy-preserving data and function in cloud environments using homomorphic encryption |
P. 30-48 |
 |
Amin Hosseingholizadeh , Farhad Rahmati , Mohammad Ali *  |
|
Abstract
(817 Views) |
Full-Text (PDF)
(506 Downloads)
|
 |
Review of the security models with emphasis on leakage-resilient key exchange protocols |
P. 65-49 |
 |
Nasser Zarbi , Ali Zaeembashi * , Nasour Bagheri  |
|
Abstract
(902 Views) |
Full-Text (PDF)
(396 Downloads)
|
 |
A Comprehensive Exploration of Deep Learning Approaches in Differential Cryptanalysis of Lightweight Block Ciphers |
P. 66-91 |
 |
Iman Mirzaali Mazandarani , Nasour Bagheri * , Sadegh Sadeghi  |
|
Abstract
(1997 Views) |
Full-Text (PDF)
(1362 Downloads)
|
 |
An overview of secure authentication methods using ECG biometrics with deep learning algorithms |
P. 92-111 |
 |
Narges Mokhtari , Amirhossein Safari , Sadegh Sadeghi *  |
|
Abstract
(2045 Views) |
Full-Text (PDF)
(1228 Downloads)
|
 |
Methods of analyzing and proving the security of security protocols |
P. 112-136 |
 |
MOhammad Dakhilalian * , Masomeh Safkhani , Fatemeh Pirmoradian  |
|
Abstract
(1375 Views) |
Full-Text (PDF)
(1094 Downloads)
|