|
 |
Survey of Secure Multiparty Summation protocols and their challenges |
P. 3-14 |
 |
Shadi Azizi , Maede Ashouri talouki * , Hamid Mala  |
|
Abstract
(4140 Views) |
Full-Text (PDF)
(1019 Downloads)
|
 |
Introduction of TMTO attack on Hash Functions |
P. 15-26 |
 |
Zahra Zolfaghari * , Nasour Bagheri  |
|
Abstract
(4388 Views) |
Full-Text (PDF)
(896 Downloads)
|
 |
Security Indexes of Development Life Cycle of Local
Search Engines
|
P. 27-46 |
 |
Nasrin Taj Neyshabouri * , Shaghayegh Naderi , Mahsa Omidvar Sarkandi , Hassan Koushkaki  |
|
Abstract
(4380 Views) |
Full-Text (PDF)
(867 Downloads)
|
 |
Identifying Security Risks in Smartphone App Distribution Ecosystem |
P. 47-66 |
 |
|
|
Abstract
(4294 Views) |
Full-Text (PDF)
(924 Downloads)
|
 |
The study of the methods to increase the security of the public places using coverage improvement and their monitoring based on wireless sensor networks |
P. 67-82 |
 |
|
|
Abstract
(4273 Views) |
Full-Text (PDF)
(1102 Downloads)
|
 |
Survey Security Aspects in Components and Architecture Local Search Engines |
P. 83-103 |
 |
|
|
Abstract
(4173 Views) |
Full-Text (PDF)
(931 Downloads)
|