|
 |
Security Analysis of a Lightweight Ownership Transfer Protocol in RFID Systems |
P. 1-11 |
|
 |
Ghodsieh Karimi * , Morteza Adeli , Mohammad Ali Hadavi  |
|
Abstract
(855 Views) |
Full-Text (PDF)
(394 Downloads)
|
 |
Analysis of strategic issues in the field of general data protection regulations |
P. 12-23 |
|
 |
Abouzar ArabSorkhi * , Tala Tafazoli  |
|
Abstract
(699 Views) |
Full-Text (PDF)
(312 Downloads)
|
 |
IEPS image encryption: Encryption based on PWLCM and SHA-512 hash function |
P. 24-33 |
|
 |
Seyed Hesam Odin Hashemi , Mohammad Hassan Majidi *  |
|
Abstract
(837 Views) |
Full-Text (PDF)
(355 Downloads)
|
 |
Intelligent Automation of Scenario Execution in Cyber Ranges Using Machine Learning Techniques |
P. 34-44 |
|
 |
Farnoosh Karimi , Behrouz Tork Ladani * , Behrouz Shahgholi Ghahfarokhi  |
|
Abstract
(957 Views) |
Full-Text (PDF)
(480 Downloads)
|
 |
Prevention and detection of botnet attacks in IoT using ensemble learning methods |
P. 45-55 |
|
 |
Fateme Pishdad , Reza Ebrahimi Atani *  |
|
Abstract
(908 Views) |
Full-Text (PDF)
(712 Downloads)
|
 |
Violation of Integrity in an End-to-End Privacy-Preserving Protocol in IoT-Based Health Monitoring Systems |
P. 56-64 |
|
 |
Fatemeh Gholami Sabzevar , Masoumeh Safkhani *  |
|
Abstract
(965 Views) |
Full-Text (PDF)
(363 Downloads)
|
 |
A Secure Auditable Log based on Blockchain |
P. 75-86 |
|
 |
Arian Arabnouri * , Soheil Eissazadeh , Alireza Shafieinejad  |
|
Abstract
(623 Views) |
Full-Text (PDF)
(254 Downloads)
|
 |
Investigation of Power Analysis Attack on the SPEEDY Block Cipher and Countermeasure Using Domain-Oriented Masking (DOM) Method |
P. 87-94 |
|
 |
Keivan Khoormehr , Javad Alizadeh , Mohsen Jahanbani *  |
|
Abstract
(681 Views) |
Full-Text (PDF)
(350 Downloads)
|