|
 |
A Secure Authentication and Key Agreement Scheme for LoRaWAN |
P. 1-15 |
|
 |
Zahra Jafari , Sahar Palimi , Mohamadamin Sabaei , Rahman Hajian , Hossein Erfani *  |
|
Abstract
(2468 Views) |
Full-Text (PDF)
(944 Downloads)
|
 |
A New Mixing Scheme to Improve Privacy in Bitcoin Cryptocurrency Transactions |
P. 16-23 |
|
 |
Hadi Norouzi Cholcheh * , Salman Niksefat  |
|
Abstract
(2879 Views) |
Full-Text (PDF)
(1060 Downloads)
|
 |
Analysis of global trends in providing educational frameworks for training cyber security professionals |
P. 24-32 |
|
 |
Ahmad Rahdari , Mohammad Hesam Tadayon *  |
|
Abstract
(2286 Views) |
Full-Text (PDF)
(838 Downloads)
|
 |
Electrocardiogram Signal Authentication System based on Deep Learning |
P. 33-41 |
|
 |
Sajjad Maleki Lonbar , Akram Beigi * , Nasour Bagheri  |
|
Abstract
(2269 Views) |
Full-Text (PDF)
(1715 Downloads)
|
 |
A comprehensive evaluation of deep learning based steganalysis performance in detecting spatial methods |
P. 42-50 |
|
 |
Vajiheh Sabeti * , Mahdiyeh Samiei  |
|
Abstract
(1728 Views) |
Full-Text (PDF)
(955 Downloads)
|
 |
Practical key recovery attack on authentication and key agreement protocol SecAuthUAV in a network of drones and provide an
improved protocol |
P. 51-59 |
|
 |
Javad Alizadeh , Seyyed Hadi Noorani Asl *  |
|
Abstract
(2245 Views) |
Full-Text (PDF)
(635 Downloads)
|
 |
Verifiable Database Supporting Range Query |
P. 60-72 |
|
 |
Seyed Hossein Tahami * , Hamid Mala  |
|
Abstract
(1528 Views) |
Full-Text (PDF)
(670 Downloads)
|
 |
FPGA Implementation of Polynomial Multiplication in NTRU Prime PQC Algorithms |
P. 73-80 |
|
 |
Reza Rashidian , Raziyeh Salarifard * , Ali Jahanian  |
|
Abstract
(2874 Views) |
Full-Text (PDF)
(1863 Downloads)
|