|
 |
|
 |
Approaches and challenges of the white-box model of the block cipher schemes implementation |
P. 3-20 |
|
 |
Hadi Soleimany * , Mohammad Reaza Sadeghi  |
|
Abstract
(3911 Views) |
Full-Text (PDF)
(1134 Downloads)
|
 |
Search over Encrypted Data: Functionalities and Challenges |
P. 21-44 |
|
 |
Aniseh Najafi * , Majid Bayat , Hamid Haj Seyyed Javadi  |
|
Abstract
(4399 Views) |
Full-Text (PDF)
(1073 Downloads)
|
 |
Check the Safe coding standards in language C++ |
P. 45-56 |
|
 |
Mohammed Mohsen Amiri , Morteza Moammer * , Mousa Mohammadnia , Masoud Asgari Mehr  |
|
Abstract
(4084 Views) |
Full-Text (PDF)
(1031 Downloads)
|
 |
Prevention Management of Realization and continuity of the futile cycle of cyber-crimes |
P. 57-66 |
|
 |
Amin Pazhouhesh , Afsaneh Zamani *  |
|
Abstract
(3054 Views) |
Full-Text (PDF)
(971 Downloads)
|
 |
A Survey on the Important Security Attacks on Industrial Control Systems from 2000 up to Now |
P. 67-86 |
|
 |
|
|
Abstract
(3139 Views) |
Full-Text (PDF)
(998 Downloads)
|
 |
Metamorphic Malware Identification Combining Static and Dynamic Analyzes |
P. 87-96 |
|
 |
Hadi Golbaghi , Mojtaba Vahidi asl * , Alireza Khalilian  |
|
Abstract
(3610 Views) |
Full-Text (PDF)
(1123 Downloads)
|