[Home ] [Archive]   [ فارسی ]  
:: Main :: About :: Current Issue :: Archive :: Search :: Submit :: Contact ::
Main Menu
Home::
Journal Information::
Articles archive::
For Authors::
For Reviewers::
Registration::
Site Facilities::
Indexing::
Contact us::
::
Search in website

Advanced Search
..
Receive site information
Enter your Email in the following box to receive the site news and information.
..
Print ISSN
Print ISSN: 2476-3047
..
:: Information ::

You can copy/paste HTML codes anywhere you like, for example in homepage, or even other sites

XML Hyper Elliptic Curve In Cryptography
reza alimoradi *
Abstract -   Full Text (PDF)
XML Security and Privacy in the Internet of Things
*, ,
Abstract -   Full Text (PDF)
XML LTE network access security
*,
Abstract -   Full Text (PDF)
XML Trust evaluation in the social networks based on the quality of service requirements and call log histories
*
Abstract -   Full Text (PDF)
XML An Overview of Security attacks and Software Implementation of Authenticated Encryption Algorithms in CAESAR Competition
Mohsen Rezaei *, Reza Ebrahimi Atani
Abstract -   Full Text (PDF)
XML Awareness and Standards in the Field of Information Security_
mansour esmaeilpour *, Mina Feili
Abstract -   Full Text (PDF)
Back to Original Issue





دوفصل نامه علمی  منادی امنیت فضای تولید و تبادل اطلاعات( افتا) Biannual Journal Monadi for Cyberspace Security (AFTA)
Persian site map - English site map - Created in 0.06 seconds with 0 queries by