|
 |
On the Use of Fuzzy-WLC modeling technique for Evaluating Security of Cryptographic Module |
P. 1-11 |
 |
|
|
Abstract
(1522 Views) |
Full-Text (PDF)
(719 Downloads)
|
 |
Integrity checking of outsourced computations |
P. 12-29 |
 |
Somayeh Dolatnezhad Samarin , Morteza Amini *  |
|
Abstract
(2383 Views) |
Full-Text (PDF)
(805 Downloads)
|
 |
Privacy-preserving data and function in cloud environments using homomorphic encryption |
P. 30-48 |
 |
Amin Hosseingholizadeh , Farhad Rahmati , Mohammad Ali *  |
|
Abstract
(1056 Views) |
Full-Text (PDF)
(600 Downloads)
|
 |
Review of the security models with emphasis on leakage-resilient key exchange protocols |
P. 65-49 |
 |
Nasser Zarbi , Ali Zaeembashi * , Nasour Bagheri  |
|
Abstract
(1160 Views) |
Full-Text (PDF)
(495 Downloads)
|
 |
A Comprehensive Exploration of Deep Learning Approaches in Differential Cryptanalysis of Lightweight Block Ciphers |
P. 66-91 |
 |
Iman Mirzaali Mazandarani , Nasour Bagheri * , Sadegh Sadeghi  |
|
Abstract
(2313 Views) |
Full-Text (PDF)
(1490 Downloads)
|
 |
An overview of secure authentication methods using ECG biometrics with deep learning algorithms |
P. 92-111 |
 |
Narges Mokhtari , Amirhossein Safari , Sadegh Sadeghi *  |
|
Abstract
(2401 Views) |
Full-Text (PDF)
(1409 Downloads)
|
 |
Methods of analyzing and proving the security of security protocols |
P. 112-136 |
 |
MOhammad Dakhilalian * , Masomeh Safkhani , Fatemeh Pirmoradian  |
|
Abstract
(1798 Views) |
Full-Text (PDF)
(1268 Downloads)
|