[
Home
] [
Archive
]
[ فارسی ]
Main Menu
Home
Journal Information
About the Journal
Editorial Board
Aims& Scopes
Journal News
Articles archive
All Issues
Current Issue
Browse by Authors
Browse by Keywords
For Authors
Call for Papers
Submission Instruction
Submission Form
For Reviewers
Reviewers Section
Reviewers Name
Registration
Registration Information
Registration Form
Site Facilities
Site map
Search contents
FAQ
Top 10 contents
Inform to friends
Indexing
ISC
SID
Contact us
Contact Information
Contact us
Search in website
Search the articles
Search the site
Advanced Search
Receive site information
Enter your Email in the following box to receive the site news and information.
Print ISSN
Print ISSN: 2476-3047
Volume 5, Issue 2 (3-2017)
Back to browse issues page
A Survey of Cube, Differential Fault Analysis Attacks and Linear Structures on Keccak Hash Function (SHA-3)
P. 3-14
Masoumeh Safkhani
*
,
Mohamadamin Arghavani
Abstract
(6298 Views)
|
Full-Text (PDF)
(1504 Downloads)
A Study on evolutional process of privacy and security in identity managment system
P. 15-34
Abstract
(5498 Views)
|
Full-Text (PDF)
(1613 Downloads)
Overview of Jamming Operation in Smart Network
P. 35-48
Mohammad Reza Goharei
*
Abstract
(5212 Views)
|
Full-Text (PDF)
(1488 Downloads)
An overview of privacy preserving Data Publishing Techniques
P. 49-62
Mehdi Sadeghpour
,
Reza Ebrahimi Atani
*
Abstract
(6603 Views)
|
Full-Text (PDF)
(1744 Downloads)
Review of Image Steganography Based on LSB and Pixel Classification and Providing a New Method in This Area
P. 63-71
Mansoor Fateh
*
,
Samira Rajabloo
,
Elahe Alipour
Abstract
(5088 Views)
|
Full-Text (PDF)
(1384 Downloads)
Survey of group location privacy approaches in location-based services and its challenges
P. 73-85
Shadi Azizi
,
Maede Ashouri-Talouki
*
,
Hamid Mala
Abstract
(4989 Views)
|
Full-Text (PDF)
(1441 Downloads)
Back to browse issues page
Export as:
HTML
|
XML
|
RSS
Persian site map -
English site map
- Created in 0.23 seconds with 43 queries by YEKTAWEB 4732