|
|
|
|
|
|
 |
 |
|
 |
|
 |
|
Volume 12, Issue 2 (2-2024) |
 |
|
|
|
 |
A Secure Authentication and Key Agreement Scheme for LoRaWAN |
P. 1-15 |
|
 |
Zahra Jafari , Sahar Palimi , Mohamadamin Sabaei , Rahman Hajian , Hossein Erfani *  |
|
Abstract
(3384 Views) |
Full-Text (PDF)
(1404 Downloads)
|
 |
A New Mixing Scheme to Improve Privacy in Bitcoin Cryptocurrency Transactions |
P. 16-23 |
|
 |
Hadi Norouzi Cholcheh * , Salman Niksefat  |
|
Abstract
(3743 Views) |
Full-Text (PDF)
(1415 Downloads)
|
 |
Analysis of global trends in providing educational frameworks for training cyber security professionals |
P. 24-32 |
|
 |
Ahmad Rahdari , Mohammad Hesam Tadayon *  |
|
Abstract
(3396 Views) |
Full-Text (PDF)
(1380 Downloads)
|
 |
Electrocardiogram Signal Authentication System based on Deep Learning |
P. 33-41 |
|
 |
Sajjad Maleki Lonbar , Akram Beigi * , Nasour Bagheri  |
|
Abstract
(3156 Views) |
Full-Text (PDF)
(2419 Downloads)
|
 |
A comprehensive evaluation of deep learning based steganalysis performance in detecting spatial methods |
P. 42-50 |
|
 |
Vajiheh Sabeti * , Mahdiyeh Samiei  |
|
Abstract
(2637 Views) |
Full-Text (PDF)
(1438 Downloads)
|
 |
Practical key recovery attack on authentication and key agreement protocol SecAuthUAV in a network of drones and provide an
improved protocol |
P. 51-59 |
|
 |
Javad Alizadeh , Seyyed Hadi Noorani Asl *  |
|
Abstract
(3153 Views) |
Full-Text (PDF)
(1023 Downloads)
|
 |
Verifiable Database Supporting Range Query |
P. 60-72 |
|
 |
Seyed Hossein Tahami * , Hamid Mala  |
|
Abstract
(2255 Views) |
Full-Text (PDF)
(1070 Downloads)
|
 |
FPGA Implementation of Polynomial Multiplication in NTRU Prime PQC Algorithms |
P. 73-80 |
|
 |
Reza Rashidian , Raziyeh Salarifard * , Ali Jahanian  |
|
Abstract
(3806 Views) |
Full-Text (PDF)
(2730 Downloads)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|