|
|
|
|
|
|
|
|
|
|
Volume 12, Issue 2 (2-2024) |
|
|
|
|
A Secure Authentication and Key Agreement Scheme for LoRaWAN |
P. 1-15 |
|
|
Zahra Jafari , Sahar Palimi , Mohamadamin Sabaei , Rahman Hajian , Hossein Erfani * |
|
Abstract
(1869 Views) |
Full-Text (PDF)
(691 Downloads)
|
|
A New Mixing Scheme to Improve Privacy in Bitcoin Cryptocurrency Transactions |
P. 16-23 |
|
|
Hadi Norouzi Cholcheh * , Salman Niksefat |
|
Abstract
(2245 Views) |
Full-Text (PDF)
(884 Downloads)
|
|
Analysis of global trends in providing educational frameworks for training cyber security professionals |
P. 24-32 |
|
|
Ahmad Rahdari , Mohammad Hesam Tadayon * |
|
Abstract
(1672 Views) |
Full-Text (PDF)
(575 Downloads)
|
|
Electrocardiogram Signal Authentication System based on Deep Learning |
P. 33-41 |
|
|
Sajjad Maleki Lonbar , Akram Beigi * , Nasour Bagheri |
|
Abstract
(1725 Views) |
Full-Text (PDF)
(1015 Downloads)
|
|
A comprehensive evaluation of deep learning based steganalysis performance in detecting spatial methods |
P. 42-50 |
|
|
Vajiheh Sabeti * , Mahdiyeh Samiei |
|
Abstract
(1159 Views) |
Full-Text (PDF)
(624 Downloads)
|
|
Practical key recovery attack on authentication and key agreement protocol SecAuthUAV in a network of drones and provide an
improved protocol |
P. 51-59 |
|
|
Javad Alizadeh , Seyyed Hadi Noorani Asl * |
|
Abstract
(1669 Views) |
Full-Text (PDF)
(444 Downloads)
|
|
Verifiable Database Supporting Range Query |
P. 60-72 |
|
|
Seyed Hossein Tahami * , Hamid Mala |
|
Abstract
(1130 Views) |
Full-Text (PDF)
(426 Downloads)
|
|
FPGA Implementation of Polynomial Multiplication in NTRU Prime PQC Algorithms |
P. 73-80 |
|
|
Reza Rashidian , Raziyeh Salarifard * , Ali Jahanian |
|
Abstract
(2319 Views) |
Full-Text (PDF)
(1152 Downloads)
|
|
|
|
|
|
|
|
|
|
|