|
 |
Survey of Secure Multiparty Summation protocols and their challenges |
P. 3-14 |
 |
Shadi Azizi , Maede Ashouri talouki * , Hamid Mala  |
|
Abstract
(3856 Views) |
Full-Text (PDF)
(870 Downloads)
|
 |
Introduction of TMTO attack on Hash Functions |
P. 15-26 |
 |
Zahra Zolfaghari * , Nasour Bagheri  |
|
Abstract
(4043 Views) |
Full-Text (PDF)
(764 Downloads)
|
 |
Security Indexes of Development Life Cycle of Local
Search Engines
|
P. 27-46 |
 |
Nasrin Taj Neyshabouri * , Shaghayegh Naderi , Mahsa Omidvar Sarkandi , Hassan Koushkaki  |
|
Abstract
(4011 Views) |
Full-Text (PDF)
(733 Downloads)
|
 |
Identifying Security Risks in Smartphone App Distribution Ecosystem |
P. 47-66 |
 |
|
|
Abstract
(3887 Views) |
Full-Text (PDF)
(778 Downloads)
|
 |
The study of the methods to increase the security of the public places using coverage improvement and their monitoring based on wireless sensor networks |
P. 67-82 |
 |
|
|
Abstract
(3958 Views) |
Full-Text (PDF)
(958 Downloads)
|
 |
Survey Security Aspects in Components and Architecture Local Search Engines |
P. 83-103 |
 |
|
|
Abstract
(3888 Views) |
Full-Text (PDF)
(795 Downloads)
|