|
|
|
 |
 |
|
 |
|
 |
|
Volume 6, Issue 2 (3-2018) |
 |
|
|
 |
A Survey on Lightweight Hardware Implementation of AES |
P. 3-20 |
 |
Mohsen Jahanbani * , Nasour Bagheri , Zeinolabedin Norozi  |
|
Abstract
(3888 Views) |
Full-Text (PDF)
(1119 Downloads)
|
 |
Survey of Electronic Election Based on HomomorphicEncryption |
P. 23-36 |
 |
Sajad Rezaee Adaryani * , Seyed Mahdi Sajjadieh , Ali Zaghyan  |
|
Abstract
(4710 Views) |
Full-Text (PDF)
(1312 Downloads)
|
 |
A Confidence-Aware Trust Approach for Detecting Indirect Sybil Attacks in Wireless Sensor Networks Considering Time Factor |
P. 37-50 |
 |
Sayed Mohammad Tabatabaei Parsa * , Hassan Shakeri  |
|
Abstract
(4615 Views) |
Full-Text (PDF)
(1074 Downloads)
|
 |
A Review on Website Fingerprinting Attacks |
P. 51-64 |
 |
Maryam Taebi , Ali Bohlooli * , Marjan Kaedi  |
|
Abstract
(4179 Views) |
Full-Text (PDF)
(1220 Downloads)
|
 |
Risk Management in Local Search Engine Systems |
P. 65-84 |
 |
Mahsa Omidvar Sarkandi * , Nasrin Taj Neyshabouri , Hassan Koushkaki , Shaghayegh Naderi  |
|
Abstract
(4352 Views) |
Full-Text (PDF)
(1223 Downloads)
|
 |
A review of privacy in online social networks |
P. 85-102 |
 |
Kamaleddin Ghezavati * , Alireza Nowroozi  |
|
Abstract
(4403 Views) |
Full-Text (PDF)
(1225 Downloads)
|
|
|
|
|
|
|
|
|
|
|