|
|
|
|
|
|
|
|
|
|
Volume 12, Issue 1 (9-2023) |
|
|
|
|
On the Use of Fuzzy-WLC modeling technique for Evaluating Security of Cryptographic Module |
P. 1-11 |
|
|
|
Abstract
(1108 Views) |
Full-Text (PDF)
(526 Downloads)
|
|
Integrity checking of outsourced computations |
P. 12-29 |
|
Somayeh Dolatnezhad Samarin , Morteza Amini * |
|
Abstract
(1798 Views) |
Full-Text (PDF)
(639 Downloads)
|
|
Privacy-preserving data and function in cloud environments using homomorphic encryption |
P. 30-48 |
|
Amin Hosseingholizadeh , Farhad Rahmati , Mohammad Ali * |
|
Abstract
(578 Views) |
Full-Text (PDF)
(326 Downloads)
|
|
Review of the security models with emphasis on leakage-resilient key exchange protocols |
P. 65-49 |
|
Nasser Zarbi , Ali Zaeembashi * , Nasour Bagheri |
|
Abstract
(632 Views) |
Full-Text (PDF)
(291 Downloads)
|
|
A Comprehensive Exploration of Deep Learning Approaches in Differential Cryptanalysis of Lightweight Block Ciphers |
P. 66-91 |
|
Iman Mirzaali Mazandarani , Nasour Bagheri * , Sadegh Sadeghi |
|
Abstract
(1689 Views) |
Full-Text (PDF)
(1015 Downloads)
|
|
An overview of secure authentication methods using ECG biometrics with deep learning algorithms |
P. 92-111 |
|
Narges Mokhtari , Amirhossein Safari , Sadegh Sadeghi * |
|
Abstract
(1694 Views) |
Full-Text (PDF)
(1013 Downloads)
|
|
Methods of analyzing and proving the security of security protocols |
P. 112-136 |
|
MOhammad Dakhilalian * , Masomeh Safkhani , Fatemeh Pirmoradian |
|
Abstract
(993 Views) |
Full-Text (PDF)
(818 Downloads)
|
|
|
|
|
|
|
|
|
|
|