|
 |
A Survey on Lightweight Hardware Implementation of AES |
P. 3-20 |
 |
Mohsen Jahanbani * , Nasour Bagheri , Zeinolabedin Norozi  |
|
Abstract
(3830 Views) |
Full-Text (PDF)
(1100 Downloads)
|
 |
Survey of Electronic Election Based on HomomorphicEncryption |
P. 23-36 |
 |
Sajad Rezaee Adaryani * , Seyed Mahdi Sajjadieh , Ali Zaghyan  |
|
Abstract
(4643 Views) |
Full-Text (PDF)
(1283 Downloads)
|
 |
A Confidence-Aware Trust Approach for Detecting Indirect Sybil Attacks in Wireless Sensor Networks Considering Time Factor |
P. 37-50 |
 |
Sayed Mohammad Tabatabaei Parsa * , Hassan Shakeri  |
|
Abstract
(4537 Views) |
Full-Text (PDF)
(1048 Downloads)
|
 |
A Review on Website Fingerprinting Attacks |
P. 51-64 |
 |
Maryam Taebi , Ali Bohlooli * , Marjan Kaedi  |
|
Abstract
(4116 Views) |
Full-Text (PDF)
(1198 Downloads)
|
 |
Risk Management in Local Search Engine Systems |
P. 65-84 |
 |
Mahsa Omidvar Sarkandi * , Nasrin Taj Neyshabouri , Hassan Koushkaki , Shaghayegh Naderi  |
|
Abstract
(4290 Views) |
Full-Text (PDF)
(1206 Downloads)
|
 |
A review of privacy in online social networks |
P. 85-102 |
 |
Kamaleddin Ghezavati * , Alireza Nowroozi  |
|
Abstract
(4324 Views) |
Full-Text (PDF)
(1201 Downloads)
|