|
|
|
|
|
 |
Information |
 |
|
You can copy/paste HTML codes anywhere you like, for example in homepage, or even other sites
Approaches and challenges of the white-box model of the block cipher schemes implementation Hadi Soleimany *, Mohammad Reaza Sadeghi Abstract - Full Text (PDF)
Search over Encrypted Data: Functionalities and Challenges Aniseh Najafi *, Majid Bayat, Hamid Haj Seyyed Javadi Abstract - Full Text (PDF)
Check the Safe coding standards in language C++ Mohammed Mohsen amiri, morteza moammer *, mousa mohammadnia, Masoud Asgari Mehr Abstract - Full Text (PDF)
Prevention Management of Realization and continuity of the futile cycle of cyber-crimes amin pazhouhesh, afsaneh zamani *Abstract - Full Text (PDF)
A Survey on the Important Security Attacks on Industrial Control Systems from 2000 up to Now *, Abstract - Full Text (PDF)
Metamorphic Malware Identification Combining Static and Dynamic Analyzes hadi golbaghi, mojtaba vahidi asl *, alireza khalilian Abstract - Full Text (PDF)
Back to Original Issue
|
|
|
|
|
|
|
|
|
|
|