|
|
|
|
|
|
 |
 |
|
 |
|
 |
|
Volume 13, Issue 1 (8-2024) |
 |
|
|
|
 |
A Survey Of Code-Based Cryptography Schemes and the Standardization Process of Post-Quantum Cryptography: The Beginning of a New Era |
1 |
|
 |
Arash Khalvan * , Amirhossein Zali , Mahmoud Ahmadian Attari  |
|
Abstract
(2646 Views) |
Full-Text (PDF)
(2381 Downloads)
|
 |
A review of blockchain-based data auditing protocols and analyzing their general framework |
2 |
|
 |
Saeed Banaeian Far * , Maryam Rajabzadeh Asaar  |
|
Abstract
(2699 Views) |
Full-Text (PDF)
(929 Downloads)
|
 |
An Overview of Physical-Layer Authentication Methods, Performance Metrics, and Their Vulnerabilities to Attacks |
3 |
|
 |
Parsa Rajabi , Seyed Mohammad Razavizadeh * , Mohammad Hesam Tadayon  |
|
Abstract
(2484 Views) |
Full-Text (PDF)
(1344 Downloads)
|
 |
FIDO Authentication Standard: Key Applications for Securing Information Exchange |
4 |
|
 |
Morteza Asadi * , Mohammad Reza Zamani , Kasra Tawakoli  |
|
Abstract
(2192 Views) |
Full-Text (PDF)
(1048 Downloads)
|
 |
The method of risk analysis of communication and information infrastructure modules and the extraction of preventive security requirements |
5 |
|
 |
Nasrin Taaj * , Amir Mansour Yadegari , Abouzar Arabsorkhi , Reza Kalantari  |
|
Abstract
(2365 Views) |
Full-Text (PDF)
(1248 Downloads)
|
 |
Preserving privacy in the age of information technology development, lessons from the european general data protection regulation |
6 |
|
 |
Babak Siabi , Parvin Rastegari *  |
|
Abstract
(1628 Views) |
Full-Text (PDF)
(1663 Downloads)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|