|
|
|
|
|
|
 |
 |
|
 |
|
 |
|
Volume 12, Issue 1 (9-2023) |
 |
|
|
|
 |
On the Use of Fuzzy-WLC modeling technique for Evaluating Security of Cryptographic Module |
P. 1-11 |
 |
|
|
Abstract
(2474 Views) |
Full-Text (PDF)
(1210 Downloads)
|
 |
Integrity checking of outsourced computations |
P. 12-29 |
 |
Somayeh Dolatnezhad Samarin , Morteza Amini *  |
|
Abstract
(3503 Views) |
Full-Text (PDF)
(1290 Downloads)
|
 |
Privacy-preserving data and function in cloud environments using homomorphic encryption |
P. 30-48 |
 |
Amin Hosseingholizadeh , Farhad Rahmati , Mohammad Ali *  |
|
Abstract
(2104 Views) |
Full-Text (PDF)
(1145 Downloads)
|
 |
Review of the security models with emphasis on leakage-resilient key exchange protocols |
P. 65-49 |
 |
Nasser Zarbi , Ali Zaeembashi * , Nasour Bagheri  |
|
Abstract
(2296 Views) |
Full-Text (PDF)
(1073 Downloads)
|
 |
A Comprehensive Exploration of Deep Learning Approaches in Differential Cryptanalysis of Lightweight Block Ciphers |
P. 66-91 |
 |
Iman Mirzaali Mazandarani , Nasour Bagheri * , Sadegh Sadeghi  |
|
Abstract
(3486 Views) |
Full-Text (PDF)
(2132 Downloads)
|
 |
An overview of secure authentication methods using ECG biometrics with deep learning algorithms |
P. 92-111 |
 |
Narges Mokhtari , Amirhossein Safari , Sadegh Sadeghi *  |
|
Abstract
(3730 Views) |
Full-Text (PDF)
(2006 Downloads)
|
 |
Methods of analyzing and proving the security of security protocols |
P. 112-136 |
 |
MOhammad Dakhilalian * , Masomeh Safkhani , Fatemeh Pirmoradian  |
|
Abstract
(3334 Views) |
Full-Text (PDF)
(2158 Downloads)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|