|
|
|
 |
 |
|
 |
|
 |
|
Volume 6, Issue 2 (3-2018) |
 |
|
|
 |
A Survey on Lightweight Hardware Implementation of AES |
P. 3-20 |
 |
Mohsen Jahanbani *, Nasour Bagheri, Zeinolabedin Norozi |
|
Abstract
(2273 Views) |
Full-Text (PDF)
(584 Downloads)
|
 |
Survey of Electronic Election Based on HomomorphicEncryption |
P. 23-36 |
 |
Sajad Rezaee Adaryani *, Seyed Mahdi Sajjadieh, Ali Zaghyan |
|
Abstract
(2644 Views) |
Full-Text (PDF)
(728 Downloads)
|
 |
A Confidence-Aware Trust Approach for Detecting Indirect Sybil Attacks in Wireless Sensor Networks Considering Time Factor |
P. 37-50 |
 |
Sayed Mohammad Tabatabaei Parsa *, Hassan Shakeri |
|
Abstract
(2251 Views) |
Full-Text (PDF)
(557 Downloads)
|
 |
A Review on Website Fingerprinting Attacks |
P. 51-64 |
 |
Maryam Taebi, Ali Bohlooli *, Marjan Kaedi |
|
Abstract
(2351 Views) |
Full-Text (PDF)
(600 Downloads)
|
 |
Risk Management in Local Search Engine Systems |
P. 65-84 |
 |
Mahsa Omidvar Sarkandi *, Nasrin Taj Neyshabouri, Hassan Koushkaki, Shaghayegh Naderi |
|
Abstract
(2348 Views) |
Full-Text (PDF)
(652 Downloads)
|
 |
A review of privacy in online social networks |
P. 85-102 |
 |
Kamaleddin Ghezavati *, Alireza Nowroozi |
|
Abstract
(2274 Views) |
Full-Text (PDF)
(658 Downloads)
|
|
|
|
|
|
|
|
|
|
|