|
|
 |
Information |
 |
|
You can copy/paste HTML codes anywhere you like, for example in homepage, or even other sites
A Survey Of Code-Based Cryptography Schemes and the Standardization Process of Post-Quantum Cryptography: The Beginning of a New Era Arash Khalvan *, Amirhossein Zali, Mahmoud Ahmadian Attari Abstract - Full Text (PDF)
A review of blockchain-based data auditing protocols and analyzing their general framework Saeed Banaeian Far *, Maryam Rajabzadeh Asaar Abstract - Full Text (PDF)
An Overview of Physical-Layer Authentication Methods, Performance Metrics, and Their Vulnerabilities to Attacks Parsa Rajabi, Seyed Mohammad Razavizadeh *, Mohammad Hesam Tadayon Abstract - Full Text (PDF)
FIDO Authentication Standard: Key Applications for Securing Information Exchange Morteza Asadi *, Mohammad Reza Zamani, Kasra Tawakoli Abstract - Full Text (PDF)
The method of risk analysis of communication and information infrastructure modules and the extraction of preventive security requirements nasrin Taaj *, Amir Mansour Yadegari, Abouzar Arabsorkhi, Reza Kalantari Abstract - Full Text (PDF)
Preserving privacy in the age of information technology development, lessons from the european general data protection regulation Babak Siabi, Parvin Rastegari *Abstract - Full Text (PDF)
Back to Original Issue
|
|
|
|