|
|
|
|
|
|
 |
 |
|
 |
|
 |
|
Volume 14, Issue 1 (9-2025) |
 |
|
|
|
 |
Cryptanalysis of Modular Operations |
P. 1-18 |
 |
Marzieh Vahid Dastjerdi * , Majid Rahimi  |
|
Abstract
(1916 Views) |
Full-Text (PDF)
(743 Downloads)
|
 |
Analysis of frameworks, standards, platforms, and coalitions supporting the development of cyber threat intelligence in organizations |
P. 19-44 |
 |
Amin Chahardoli , Abouzar Arabsorkhi *  |
|
Abstract
(1705 Views) |
Full-Text (PDF)
(638 Downloads)
|
 |
A secure and privacy-preserving electronic invoice based on blockchain technology |
P. 45-63 |
 |
Vahideh Ghanooni Shishavan , Shaban Elahi * , Sadegh Dorri Nogoorani , Ali Yazdian Varjani  |
|
Abstract
(1707 Views) |
Full-Text (PDF)
(930 Downloads)
|
 |
A systematic review of the literature on security and privacy and improving an onymity in the blockchain network |
P. 64-96 |
 |
Fatemeh Charlank Bakhtiari * , Abbas Ghaemi Bafghi  |
|
Abstract
(1400 Views) |
Full-Text (PDF)
(600 Downloads)
|
 |
A comprehensive review of cyber deception concepts, comparative analysis of deception platforms, and proposal of three exemplary implementations for deceiving attackers |
P. 97-119 |
 |
Seyed Ali Samouti * , Sajad Tarhani , Mohsen Babakhani  |
|
Abstract
(578 Views) |
Full-Text (PDF)
(591 Downloads)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|