[
Home
] [
Archive
]
[ فارسی ]
Main Menu
Home
Journal Information
About the Journal
Editorial Board
Aims& Scopes
Journal News
Articles archive
All Issues
Current Issue
For Authors
Call for Papers
Submission Instruction
Submission Form
For Reviewers
Reviewers Section
Registration
Registration Information
Registration Form
Site Facilities
Site map
Search contents
FAQ
Top 10 contents
Inform to friends
Indexing
ISC
Contact us
Contact Information
Contact us
Search in website
Search the articles
Search the site
Advanced Search
Receive site information
Enter your Email in the following box to receive the site news and information.
Print ISSN
Print ISSN: 2476-3047
Volume 4, Issue 2 (3-2016)
Back to browse issues page
Hyper Elliptic Curve In Cryptography
P. 3-11
Reza Alimoradi
*
Abstract
(5326 Views)
|
Full-Text (PDF)
(1206 Downloads)
Security and Privacy in the Internet of Things
P. 13-35
Abstract
(9453 Views)
|
Full-Text (PDF)
(4779 Downloads)
LTE network access security
P. 37-51
Abstract
(3917 Views)
|
Full-Text (PDF)
(1161 Downloads)
Trust evaluation in the social networks based on the quality of service requirements and call log histories
P. 53-66
Abstract
(6133 Views)
|
Full-Text (PDF)
(1707 Downloads)
An Overview of Security attacks and Software Implementation of Authenticated Encryption Algorithms in CAESAR Competition
P. 67-86
Mohsen Rezaei
*
,
Reza Ebrahimi Atani
Abstract
(5069 Views)
|
Full-Text (PDF)
(1444 Downloads)
Awareness and Standards in the Field of Information Security_
P. 87-101
Mansour Esmaeilpour
*
,
Mina Feili
Abstract
(4798 Views)
|
Full-Text (PDF)
(1087 Downloads)
Back to browse issues page
Export as:
HTML
|
XML
|
RSS
Persian site map -
English site map
- Created in 0.05 seconds with 43 queries by YEKTAWEB 4645