|
|
|
|
|
|
 |
 |
|
 |
|
 |
|
Volume 13, Issue 1 (8-2024) |
 |
|
|
|
 |
A Survey Of Code-Based Cryptography Schemes and the Standardization Process of Post-Quantum Cryptography: The Beginning of a New Era |
1 |
|
 |
Arash Khalvan * , Amirhossein Zali , Mahmoud Ahmadian Attari  |
|
Abstract
(2593 Views) |
Full-Text (PDF)
(2326 Downloads)
|
 |
A review of blockchain-based data auditing protocols and analyzing their general framework |
2 |
|
 |
Saeed Banaeian Far * , Maryam Rajabzadeh Asaar  |
|
Abstract
(2657 Views) |
Full-Text (PDF)
(913 Downloads)
|
 |
An Overview of Physical-Layer Authentication Methods, Performance Metrics, and Their Vulnerabilities to Attacks |
3 |
|
 |
Parsa Rajabi , Seyed Mohammad Razavizadeh * , Mohammad Hesam Tadayon  |
|
Abstract
(2434 Views) |
Full-Text (PDF)
(1315 Downloads)
|
 |
FIDO Authentication Standard: Key Applications for Securing Information Exchange |
4 |
|
 |
Morteza Asadi * , Mohammad Reza Zamani , Kasra Tawakoli  |
|
Abstract
(2152 Views) |
Full-Text (PDF)
(1016 Downloads)
|
 |
The method of risk analysis of communication and information infrastructure modules and the extraction of preventive security requirements |
5 |
|
 |
Nasrin Taaj * , Amir Mansour Yadegari , Abouzar Arabsorkhi , Reza Kalantari  |
|
Abstract
(2306 Views) |
Full-Text (PDF)
(1199 Downloads)
|
 |
Preserving privacy in the age of information technology development, lessons from the european general data protection regulation |
6 |
|
 |
Babak Siabi , Parvin Rastegari *  |
|
Abstract
(1583 Views) |
Full-Text (PDF)
(1580 Downloads)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|