|
 |
|
 |
Hyper Elliptic Curve In Cryptography |
P. 3-11 |
 |
Reza Alimoradi *  |
|
Abstract
(6202 Views) |
Full-Text (PDF)
(1516 Downloads)
|
 |
Security and Privacy in the Internet of Things |
P. 13-35 |
 |
|
|
Abstract
(10808 Views) |
Full-Text (PDF)
(5200 Downloads)
|
 |
LTE network access security |
P. 37-51 |
 |
|
|
Abstract
(4539 Views) |
Full-Text (PDF)
(1470 Downloads)
|
 |
Trust evaluation in the social networks based on the quality of service requirements and call log histories |
P. 53-66 |
 |
|
|
Abstract
(6785 Views) |
Full-Text (PDF)
(2044 Downloads)
|
 |
An Overview of Security attacks and Software Implementation of Authenticated Encryption Algorithms in CAESAR Competition |
P. 67-86 |
 |
Mohsen Rezaei * , Reza Ebrahimi Atani  |
|
Abstract
(5855 Views) |
Full-Text (PDF)
(1729 Downloads)
|
 |
Awareness and Standards in the Field of Information Security_ |
P. 87-101 |
 |
Mansour Esmaeilpour * , Mina Feili  |
|
Abstract
(5590 Views) |
Full-Text (PDF)
(1404 Downloads)
|