|
 |
A Survey on Lightweight Hardware Implementation of AES |
P. 3-20 |
 |
Mohsen Jahanbani * , Nasour Bagheri , Zeinolabedin Norozi  |
|
Abstract
(3586 Views) |
Full-Text (PDF)
(1010 Downloads)
|
 |
Survey of Electronic Election Based on HomomorphicEncryption |
P. 23-36 |
 |
Sajad Rezaee Adaryani * , Seyed Mahdi Sajjadieh , Ali Zaghyan  |
|
Abstract
(4322 Views) |
Full-Text (PDF)
(1207 Downloads)
|
 |
A Confidence-Aware Trust Approach for Detecting Indirect Sybil Attacks in Wireless Sensor Networks Considering Time Factor |
P. 37-50 |
 |
Sayed Mohammad Tabatabaei Parsa * , Hassan Shakeri  |
|
Abstract
(4241 Views) |
Full-Text (PDF)
(980 Downloads)
|
 |
A Review on Website Fingerprinting Attacks |
P. 51-64 |
 |
Maryam Taebi , Ali Bohlooli * , Marjan Kaedi  |
|
Abstract
(3848 Views) |
Full-Text (PDF)
(1122 Downloads)
|
 |
Risk Management in Local Search Engine Systems |
P. 65-84 |
 |
Mahsa Omidvar Sarkandi * , Nasrin Taj Neyshabouri , Hassan Koushkaki , Shaghayegh Naderi  |
|
Abstract
(4007 Views) |
Full-Text (PDF)
(1133 Downloads)
|
 |
A review of privacy in online social networks |
P. 85-102 |
 |
Kamaleddin Ghezavati * , Alireza Nowroozi  |
|
Abstract
(4042 Views) |
Full-Text (PDF)
(1111 Downloads)
|