|
 |
Survey of Secure Multiparty Summation protocols and their challenges |
P. 3-14 |
 |
Shadi Azizi , Maede Ashouri talouki * , Hamid Mala  |
|
Abstract
(4044 Views) |
Full-Text (PDF)
(981 Downloads)
|
 |
Introduction of TMTO attack on Hash Functions |
P. 15-26 |
 |
Zahra Zolfaghari * , Nasour Bagheri  |
|
Abstract
(4284 Views) |
Full-Text (PDF)
(860 Downloads)
|
 |
Security Indexes of Development Life Cycle of Local
Search Engines
|
P. 27-46 |
 |
Nasrin Taj Neyshabouri * , Shaghayegh Naderi , Mahsa Omidvar Sarkandi , Hassan Koushkaki  |
|
Abstract
(4271 Views) |
Full-Text (PDF)
(823 Downloads)
|
 |
Identifying Security Risks in Smartphone App Distribution Ecosystem |
P. 47-66 |
 |
|
|
Abstract
(4173 Views) |
Full-Text (PDF)
(881 Downloads)
|
 |
The study of the methods to increase the security of the public places using coverage improvement and their monitoring based on wireless sensor networks |
P. 67-82 |
 |
|
|
Abstract
(4174 Views) |
Full-Text (PDF)
(1057 Downloads)
|
 |
Survey Security Aspects in Components and Architecture Local Search Engines |
P. 83-103 |
 |
|
|
Abstract
(4085 Views) |
Full-Text (PDF)
(889 Downloads)
|