|
 |
|
 |
A Survey of Cube, Differential Fault Analysis Attacks and Linear Structures on Keccak Hash Function (SHA-3) |
P. 3-14 |
 |
Masoumeh Safkhani * , Mohamadamin Arghavani  |
|
Abstract
(5245 Views) |
Full-Text (PDF)
(1128 Downloads)
|
 |
A Study on evolutional process of privacy and security in identity managment system |
P. 15-34 |
 |
|
|
Abstract
(4619 Views) |
Full-Text (PDF)
(1249 Downloads)
|
 |
Overview of Jamming Operation in Smart Network |
P. 35-48 |
 |
Mohammad Reza Goharei *  |
|
Abstract
(4280 Views) |
Full-Text (PDF)
(1120 Downloads)
|
 |
An overview of privacy preserving Data Publishing Techniques |
P. 49-62 |
 |
Mehdi Sadeghpour , Reza Ebrahimi Atani *  |
|
Abstract
(5486 Views) |
Full-Text (PDF)
(1361 Downloads)
|
 |
Review of Image Steganography Based on LSB and Pixel Classification and Providing a New Method in This Area |
P. 63-71 |
 |
Mansoor Fateh * , Samira Rajabloo , Elahe Alipour  |
|
Abstract
(4193 Views) |
Full-Text (PDF)
(1004 Downloads)
|
 |
Survey of group location privacy approaches in location-based services and its challenges |
P. 73-85 |
 |
Shadi Azizi , Maede Ashouri-Talouki * , Hamid Mala  |
|
Abstract
(4002 Views) |
Full-Text (PDF)
(1087 Downloads)
|