|
|
 |
Information |
 |
|
You can copy/paste HTML codes anywhere you like, for example in homepage, or even other sites
Security Analysis of a Lightweight Ownership Transfer Protocol in RFID Systems Ghodsieh Karimi *, Morteza Adeli, Mohammad Ali Hadavi Abstract - Full Text (PDF)
Analysis of strategic issues in the field of general data protection regulations Abouzar ArabSorkhi *, Tala Tafazoli Abstract - Full Text (PDF)
IEPS image encryption: Encryption based on PWLCM and SHA-512 hash function Seyed Hesam Odin Hashemi, Mohammad Hassan Majidi *Abstract - Full Text (PDF)
Intelligent Automation of Scenario Execution in Cyber Ranges Using Machine Learning Techniques Farnoosh Karimi, Behrouz Tork Ladani *, Behrouz Shahgholi Ghahfarokhi Abstract - Full Text (PDF)
Prevention and detection of botnet attacks in IoT using ensemble learning methods Fateme Pishdad, Reza Ebrahimi Atani *Abstract - Full Text (PDF)
Violation of Integrity in an End-to-End Privacy-Preserving Protocol in IoT-Based Health Monitoring Systems Fatemeh Gholami Sabzevar, Masoumeh Safkhani *Abstract - Full Text (PDF)
A Secure Auditable Log based on Blockchain Arian Arabnouri *, Soheil Eissazadeh, Alireza Shafieinejad Abstract - Full Text (PDF)
Investigation of Power Analysis Attack on the SPEEDY Block Cipher and Countermeasure Using Domain-Oriented Masking (DOM) Method Keivan Khoormehr, Javad Alizadeh, Mohsen Jahanbani *Abstract - Full Text (PDF)
Back to Original Issue
|
|
|
|