|
|
|
|
|
 |
Information |
 |
|
You can copy/paste HTML codes anywhere you like, for example in homepage, or even other sites
Survey of Secure Multiparty Summation protocols and their challenges shadi azizi, maede ashouri talouki *, hamid mala Abstract - Full Text (PDF)
Introduction of TMTO attack on Hash Functions Zahra Zolfaghari *, Nasour Bagheri Abstract - Full Text (PDF)
Security Indexes of Development Life Cycle of Local
Search Engines
Nasrin Taj Neyshabouri *, Shaghayegh Naderi, Mahsa Omidvar Sarkandi, Hassan Koushkaki Abstract - Full Text (PDF)
Identifying Security Risks in Smartphone App Distribution Ecosystem *Abstract - Full Text (PDF)
The study of the methods to increase the security of the public places using coverage improvement and their monitoring based on wireless sensor networks *Abstract - Full Text (PDF)
Survey Security Aspects in Components and Architecture Local Search Engines *, , Abstract - Full Text (PDF)
Back to Original Issue
|
|
|
|
|
|
|
|
|
|
|