|
 |
|
 |
Approaches and challenges of the white-box model of the block cipher schemes implementation |
P. 3-20 |
|
 |
Hadi Soleimany * , Mohammad Reaza Sadeghi  |
|
Abstract
(3781 Views) |
Full-Text (PDF)
(1083 Downloads)
|
 |
Search over Encrypted Data: Functionalities and Challenges |
P. 21-44 |
|
 |
Aniseh Najafi * , Majid Bayat , Hamid Haj Seyyed Javadi  |
|
Abstract
(4224 Views) |
Full-Text (PDF)
(1004 Downloads)
|
 |
Check the Safe coding standards in language C++ |
P. 45-56 |
|
 |
Mohammed Mohsen Amiri , Morteza Moammer * , Mousa Mohammadnia , Masoud Asgari Mehr  |
|
Abstract
(3939 Views) |
Full-Text (PDF)
(984 Downloads)
|
 |
Prevention Management of Realization and continuity of the futile cycle of cyber-crimes |
P. 57-66 |
|
 |
Amin Pazhouhesh , Afsaneh Zamani *  |
|
Abstract
(2927 Views) |
Full-Text (PDF)
(911 Downloads)
|
 |
A Survey on the Important Security Attacks on Industrial Control Systems from 2000 up to Now |
P. 67-86 |
|
 |
|
|
Abstract
(3004 Views) |
Full-Text (PDF)
(952 Downloads)
|
 |
Metamorphic Malware Identification Combining Static and Dynamic Analyzes |
P. 87-96 |
|
 |
Hadi Golbaghi , Mojtaba Vahidi asl * , Alireza Khalilian  |
|
Abstract
(3462 Views) |
Full-Text (PDF)
(1063 Downloads)
|