|
 |
|
 |
Hyper Elliptic Curve In Cryptography |
P. 3-11 |
 |
Reza Alimoradi *  |
|
Abstract
(6405 Views) |
Full-Text (PDF)
(1568 Downloads)
|
 |
Security and Privacy in the Internet of Things |
P. 13-35 |
 |
|
|
Abstract
(11067 Views) |
Full-Text (PDF)
(5241 Downloads)
|
 |
LTE network access security |
P. 37-51 |
 |
|
|
Abstract
(4699 Views) |
Full-Text (PDF)
(1520 Downloads)
|
 |
Trust evaluation in the social networks based on the quality of service requirements and call log histories |
P. 53-66 |
 |
|
|
Abstract
(6927 Views) |
Full-Text (PDF)
(2104 Downloads)
|
 |
An Overview of Security attacks and Software Implementation of Authenticated Encryption Algorithms in CAESAR Competition |
P. 67-86 |
 |
Mohsen Rezaei * , Reza Ebrahimi Atani  |
|
Abstract
(6065 Views) |
Full-Text (PDF)
(1778 Downloads)
|
 |
Awareness and Standards in the Field of Information Security_ |
P. 87-101 |
 |
Mansour Esmaeilpour * , Mina Feili  |
|
Abstract
(5786 Views) |
Full-Text (PDF)
(1456 Downloads)
|