|
|
|
 |
 |
|
 |
|
 |
|
Volume 13, Issue 1 (8-2024) |
 |
|
|
 |
A Survey Of Code-Based Cryptography Schemes and the Standardization Process of Post-Quantum Cryptography: The Beginning of a New Era |
1 |
|
 |
Arash Khalvan * , Amirhossein Zali , Mahmoud Ahmadian Attari  |
|
Abstract
(1717 Views) |
Full-Text (PDF)
(1575 Downloads)
|
 |
A review of blockchain-based data auditing protocols and analyzing their general framework |
2 |
|
 |
Saeed Banaeian Far * , Maryam Rajabzadeh Asaar  |
|
Abstract
(1880 Views) |
Full-Text (PDF)
(570 Downloads)
|
 |
An Overview of Physical-Layer Authentication Methods, Performance Metrics, and Their Vulnerabilities to Attacks |
3 |
|
 |
Parsa Rajabi , Seyed Mohammad Razavizadeh * , Mohammad Hesam Tadayon  |
|
Abstract
(1570 Views) |
Full-Text (PDF)
(828 Downloads)
|
 |
FIDO Authentication Standard: Key Applications for Securing Information Exchange |
4 |
|
 |
Morteza Asadi * , Mohammad Reza Zamani , Kasra Tawakoli  |
|
Abstract
(1313 Views) |
Full-Text (PDF)
(510 Downloads)
|
 |
The method of risk analysis of communication and information infrastructure modules and the extraction of preventive security requirements |
5 |
|
 |
Nasrin Taaj * , Amir Mansour Yadegari , Abouzar Arabsorkhi , Reza Kalantari  |
|
Abstract
(1298 Views) |
Full-Text (PDF)
(610 Downloads)
|
 |
Preserving privacy in the age of information technology development, lessons from the european general data protection regulation |
6 |
|
 |
Babak Siabi , Parvin Rastegari *  |
|
Abstract
(869 Views) |
Full-Text (PDF)
(703 Downloads)
|
|
|
|
|
|
|
|
|
|
|