|
 |
|
 |
A Survey of Cube, Differential Fault Analysis Attacks and Linear Structures on Keccak Hash Function (SHA-3) |
P. 3-14 |
 |
Masoumeh Safkhani * , Mohamadamin Arghavani  |
|
Abstract
(5369 Views) |
Full-Text (PDF)
(1148 Downloads)
|
 |
A Study on evolutional process of privacy and security in identity managment system |
P. 15-34 |
 |
|
|
Abstract
(4707 Views) |
Full-Text (PDF)
(1272 Downloads)
|
 |
Overview of Jamming Operation in Smart Network |
P. 35-48 |
 |
Mohammad Reza Goharei *  |
|
Abstract
(4396 Views) |
Full-Text (PDF)
(1148 Downloads)
|
 |
An overview of privacy preserving Data Publishing Techniques |
P. 49-62 |
 |
Mehdi Sadeghpour , Reza Ebrahimi Atani *  |
|
Abstract
(5600 Views) |
Full-Text (PDF)
(1383 Downloads)
|
 |
Review of Image Steganography Based on LSB and Pixel Classification and Providing a New Method in This Area |
P. 63-71 |
 |
Mansoor Fateh * , Samira Rajabloo , Elahe Alipour  |
|
Abstract
(4300 Views) |
Full-Text (PDF)
(1023 Downloads)
|
 |
Survey of group location privacy approaches in location-based services and its challenges |
P. 73-85 |
 |
Shadi Azizi , Maede Ashouri-Talouki * , Hamid Mala  |
|
Abstract
(4128 Views) |
Full-Text (PDF)
(1110 Downloads)
|