|
|
|
 |
 |
|
 |
|
 |
|
Volume 12, Issue 1 (9-2023) |
 |
|
|
 |
On the Use of Fuzzy-WLC modeling technique for Evaluating Security of Cryptographic Module |
P. 1-11 |
 |
|
|
Abstract
(1634 Views) |
Full-Text (PDF)
(788 Downloads)
|
 |
Integrity checking of outsourced computations |
P. 12-29 |
 |
Somayeh Dolatnezhad Samarin , Morteza Amini *  |
|
Abstract
(2507 Views) |
Full-Text (PDF)
(849 Downloads)
|
 |
Privacy-preserving data and function in cloud environments using homomorphic encryption |
P. 30-48 |
 |
Amin Hosseingholizadeh , Farhad Rahmati , Mohammad Ali *  |
|
Abstract
(1174 Views) |
Full-Text (PDF)
(645 Downloads)
|
 |
Review of the security models with emphasis on leakage-resilient key exchange protocols |
P. 65-49 |
 |
Nasser Zarbi , Ali Zaeembashi * , Nasour Bagheri  |
|
Abstract
(1292 Views) |
Full-Text (PDF)
(549 Downloads)
|
 |
A Comprehensive Exploration of Deep Learning Approaches in Differential Cryptanalysis of Lightweight Block Ciphers |
P. 66-91 |
 |
Iman Mirzaali Mazandarani , Nasour Bagheri * , Sadegh Sadeghi  |
|
Abstract
(2461 Views) |
Full-Text (PDF)
(1544 Downloads)
|
 |
An overview of secure authentication methods using ECG biometrics with deep learning algorithms |
P. 92-111 |
 |
Narges Mokhtari , Amirhossein Safari , Sadegh Sadeghi *  |
|
Abstract
(2537 Views) |
Full-Text (PDF)
(1467 Downloads)
|
 |
Methods of analyzing and proving the security of security protocols |
P. 112-136 |
 |
MOhammad Dakhilalian * , Masomeh Safkhani , Fatemeh Pirmoradian  |
|
Abstract
(1980 Views) |
Full-Text (PDF)
(1370 Downloads)
|
|
|
|
|
|
|
|
|
|
|