|
|
 |
Key Discovery and Forgery Attack on a Key Agreement Protocol with Authentication for Wireless Sensor Network |
P. 1-9 |
|
 |
Amir Allahdadi Ghiyasabadi * , Javad Alizadeh  |
|
Abstract
(4216 Views) |
Full-Text (PDF)
(1060 Downloads)
|
 |
Unmanned Cyber Security Requirements in sub-Transmission Substation |
P. 10-17 |
|
 |
Azam Mozafari * , Leila Zafari , Negin Hamian  |
|
Abstract
(2938 Views) |
Full-Text (PDF)
(1465 Downloads)
|
 |
Vulnerability Analysis of Digital Circuits against Capacitor-based Timing Hardware Trojan |
P. 18-25 |
|
 |
Fatemeh Khormizi * , Bijan Alizadeh  |
|
Abstract
(3492 Views) |
Full-Text (PDF)
(1269 Downloads)
|
 |
Lightweight and Secure Authentication Key Agreement Protocol for Smart Grid |
P. 26-36 |
|
 |
Seyed Hamid Baghestani * , Farokhlagha Moazami  |
|
Abstract
(3203 Views) |
Full-Text (PDF)
(1167 Downloads)
|
 |
Masking Midori64 against Correlation Power Analysis Attack |
P. 37-47 |
|
 |
Hamid Ghanbari * , Behrooz Khadem , Mohammad Jadidi  |
|
Abstract
(3194 Views) |
Full-Text (PDF)
(1125 Downloads)
|
 |
Management of Electronic Health Records with Preservation of Privacy using the Blockchain Technology |
P. 48-58 |
|
 |
Mahsa Rezaei , Sadegh Dorri Nogoorani *  |
|
Abstract
(2887 Views) |
Full-Text (PDF)
(2666 Downloads)
|
 |
A Tool for Detecting Man in the Browser (MitB) Attacks using Dynamic Analysis of Web Pages |
P. 59-66 |
|
 |
Majid Iranpour Mobarakeh * , Behrouz Tork Ladani  |
|
Abstract
(3587 Views) |
Full-Text (PDF)
(1110 Downloads)
|
 |
A High-Speed Systolic Field Multiplication for Edwards 25519 Curve |
P. 67-74 |
|
 |
Muhammad Rasoul Akhoundi Zardeyni * , Raziyeh Salarifard  |
|
Abstract
(2978 Views) |
Full-Text (PDF)
(1301 Downloads)
|
 |
Providing an RPL-based Reliable Routing Method in the Internet of Things |
P. 75-82 |
|
 |
Reza Khatouni * , Mohammad Ghasemi Gol  |
|
Abstract
(2786 Views) |
Full-Text (PDF)
(1719 Downloads)
|
 |
Inventing a Method to Save the Fog Node from Attacks |
P. 83-93 |
|
 |
Seyed Omid Azarkasb * , Seyed Hossein Khasteh , Saeed Sedighian Kashi  |
|
Abstract
(3495 Views) |
Full-Text (PDF)
(1185 Downloads)
|
 |
An Overview of Security Standards in the Field of ICT in order to Determining the Appropriate Methodology for the Security Evaluation of Equipment Related to Information and Communication Technology in the Power Industry |
P. 94-102 |
|
 |
Sofia Ahanj * , Mahsa Rahmani , Vida Nobakht , Zahra Sadeghigol  |
|
Abstract
(2482 Views) |
Full-Text (PDF)
(5286 Downloads)
|