|
 |
|
 |
Approaches and challenges of the white-box model of the block cipher schemes implementation |
P. 3-20 |
|
 |
Hadi Soleimany * , Mohammad Reaza Sadeghi  |
|
Abstract
(3838 Views) |
Full-Text (PDF)
(1112 Downloads)
|
 |
Search over Encrypted Data: Functionalities and Challenges |
P. 21-44 |
|
 |
Aniseh Najafi * , Majid Bayat , Hamid Haj Seyyed Javadi  |
|
Abstract
(4308 Views) |
Full-Text (PDF)
(1038 Downloads)
|
 |
Check the Safe coding standards in language C++ |
P. 45-56 |
|
 |
Mohammed Mohsen Amiri , Morteza Moammer * , Mousa Mohammadnia , Masoud Asgari Mehr  |
|
Abstract
(4007 Views) |
Full-Text (PDF)
(1011 Downloads)
|
 |
Prevention Management of Realization and continuity of the futile cycle of cyber-crimes |
P. 57-66 |
|
 |
Amin Pazhouhesh , Afsaneh Zamani *  |
|
Abstract
(2988 Views) |
Full-Text (PDF)
(944 Downloads)
|
 |
A Survey on the Important Security Attacks on Industrial Control Systems from 2000 up to Now |
P. 67-86 |
|
 |
|
|
Abstract
(3059 Views) |
Full-Text (PDF)
(977 Downloads)
|
 |
Metamorphic Malware Identification Combining Static and Dynamic Analyzes |
P. 87-96 |
|
 |
Hadi Golbaghi , Mojtaba Vahidi asl * , Alireza Khalilian  |
|
Abstract
(3529 Views) |
Full-Text (PDF)
(1099 Downloads)
|