|
|
|
|
|
|
 |
 |
|
 |
|
 |
|
Volume 12, Issue 2 (2-2024) |
 |
|
|
|
 |
A Secure Authentication and Key Agreement Scheme for LoRaWAN |
P. 1-15 |
|
 |
Zahra Jafari , Sahar Palimi , Mohamadamin Sabaei , Rahman Hajian , Hossein Erfani *  |
|
Abstract
(3401 Views) |
Full-Text (PDF)
(1412 Downloads)
|
 |
A New Mixing Scheme to Improve Privacy in Bitcoin Cryptocurrency Transactions |
P. 16-23 |
|
 |
Hadi Norouzi Cholcheh * , Salman Niksefat  |
|
Abstract
(3755 Views) |
Full-Text (PDF)
(1421 Downloads)
|
 |
Analysis of global trends in providing educational frameworks for training cyber security professionals |
P. 24-32 |
|
 |
Ahmad Rahdari , Mohammad Hesam Tadayon *  |
|
Abstract
(3406 Views) |
Full-Text (PDF)
(1389 Downloads)
|
 |
Electrocardiogram Signal Authentication System based on Deep Learning |
P. 33-41 |
|
 |
Sajjad Maleki Lonbar , Akram Beigi * , Nasour Bagheri  |
|
Abstract
(3167 Views) |
Full-Text (PDF)
(2426 Downloads)
|
 |
A comprehensive evaluation of deep learning based steganalysis performance in detecting spatial methods |
P. 42-50 |
|
 |
Vajiheh Sabeti * , Mahdiyeh Samiei  |
|
Abstract
(2646 Views) |
Full-Text (PDF)
(1444 Downloads)
|
 |
Practical key recovery attack on authentication and key agreement protocol SecAuthUAV in a network of drones and provide an
improved protocol |
P. 51-59 |
|
 |
Javad Alizadeh , Seyyed Hadi Noorani Asl *  |
|
Abstract
(3166 Views) |
Full-Text (PDF)
(1028 Downloads)
|
 |
Verifiable Database Supporting Range Query |
P. 60-72 |
|
 |
Seyed Hossein Tahami * , Hamid Mala  |
|
Abstract
(2268 Views) |
Full-Text (PDF)
(1074 Downloads)
|
 |
FPGA Implementation of Polynomial Multiplication in NTRU Prime PQC Algorithms |
P. 73-80 |
|
 |
Reza Rashidian , Raziyeh Salarifard * , Ali Jahanian  |
|
Abstract
(3817 Views) |
Full-Text (PDF)
(2737 Downloads)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|