[
Home
] [
Archive
]
[ فارسی ]
Main Menu
Home
Journal Information
About the Journal
Editorial Board
Aims& Scopes
Journal News
Articles archive
All Issues
Current Issue
Browse by Authors
Browse by Keywords
For Authors
Call for Papers
Submission Instruction
Submission Form
For Reviewers
Reviewers Section
Reviewers Name
Registration
Registration Information
Registration Form
Site Facilities
Site map
Search contents
FAQ
Top 10 contents
Inform to friends
Indexing
ISC
SID
Contact us
Contact Information
Contact us
Search in website
Search the articles
Search the site
Advanced Search
Receive site information
Enter your Email in the following box to receive the site news and information.
Print ISSN
Print ISSN: 2476-3047
Volume 4, Issue 1 (9-2015)
Back to browse issues page
Evaluate The Performance Of Meta-heuristic Different Algorithms in the Discovery of the Cryption Key Vigenere Encryption Algorithm
P. 3-14
Mahdi Ahmadipari
,
Meysam Moradi
*
Abstract
(5615 Views)
|
Full-Text (PDF)
(1861 Downloads)
A review of the smart phone botnets and their confronting Techniques
P. 15-37
Elham Abed
,
Reza Ebrahimi Atani
*
Abstract
(5612 Views)
|
Full-Text (PDF)
(1782 Downloads)
Identity Based Cryptography In WSN
P. 39-46
Abstract
(4945 Views)
|
Full-Text (PDF)
(1837 Downloads)
a review of vertical handover in wireless networks:concept, protocols, Algorithms.
P. 59-78
Abstract
(5374 Views)
|
Full-Text (PDF)
(1819 Downloads)
An overview of software protection techniques against static and dynamic Attacks
P. 79-96
Afshin Rashidi
,
Reza Ebrahimi Atani
*
,
Hamid Nasiri
Abstract
(5891 Views)
|
Full-Text (PDF)
(2019 Downloads)
Back to browse issues page
Export as:
HTML
|
XML
|
RSS
Persian site map -
English site map
- Created in 0.07 seconds with 40 queries by YEKTAWEB 4703