|
 |
A Secure Authentication and Key Agreement Scheme for LoRaWAN |
P. 1-15 |
|
 |
Zahra Jafari , Sahar Palimi , Mohamadamin Sabaei , Rahman Hajian , Hossein Erfani *  |
|
Abstract
(2191 Views) |
Full-Text (PDF)
(857 Downloads)
|
 |
A New Mixing Scheme to Improve Privacy in Bitcoin Cryptocurrency Transactions |
P. 16-23 |
|
 |
Hadi Norouzi Cholcheh * , Salman Niksefat  |
|
Abstract
(2624 Views) |
Full-Text (PDF)
(991 Downloads)
|
 |
Analysis of global trends in providing educational frameworks for training cyber security professionals |
P. 24-32 |
|
 |
Ahmad Rahdari , Mohammad Hesam Tadayon *  |
|
Abstract
(1974 Views) |
Full-Text (PDF)
(742 Downloads)
|
 |
Electrocardiogram Signal Authentication System based on Deep Learning |
P. 33-41 |
|
 |
Sajjad Maleki Lonbar , Akram Beigi * , Nasour Bagheri  |
|
Abstract
(2028 Views) |
Full-Text (PDF)
(1453 Downloads)
|
 |
A comprehensive evaluation of deep learning based steganalysis performance in detecting spatial methods |
P. 42-50 |
|
 |
Vajiheh Sabeti * , Mahdiyeh Samiei  |
|
Abstract
(1456 Views) |
Full-Text (PDF)
(864 Downloads)
|
 |
Practical key recovery attack on authentication and key agreement protocol SecAuthUAV in a network of drones and provide an
improved protocol |
P. 51-59 |
|
 |
Javad Alizadeh , Seyyed Hadi Noorani Asl *  |
|
Abstract
(1974 Views) |
Full-Text (PDF)
(567 Downloads)
|
 |
Verifiable Database Supporting Range Query |
P. 60-72 |
|
 |
Seyed Hossein Tahami * , Hamid Mala  |
|
Abstract
(1334 Views) |
Full-Text (PDF)
(597 Downloads)
|
 |
FPGA Implementation of Polynomial Multiplication in NTRU Prime PQC Algorithms |
P. 73-80 |
|
 |
Reza Rashidian , Raziyeh Salarifard * , Ali Jahanian  |
|
Abstract
(2631 Views) |
Full-Text (PDF)
(1600 Downloads)
|