|
|
|
|
|
 |
Information |
 |
|
You can copy/paste HTML codes anywhere you like, for example in homepage, or even other sites
A Secure Authentication and Key Agreement Scheme for LoRaWAN Zahra Jafari, Sahar Palimi, Mohamadamin sabaei, Rahman Hajian, Hossein Erfani *Abstract - Full Text (PDF)
A New Mixing Scheme to Improve Privacy in Bitcoin Cryptocurrency Transactions Hadi Norouzi Cholcheh *, Salman Niksefat Abstract - Full Text (PDF)
Analysis of global trends in providing educational frameworks for training cyber security professionals Ahmad Rahdari, Mohammad Hesam Tadayon *Abstract - Full Text (PDF)
Electrocardiogram Signal Authentication System based on Deep Learning Sajjad Maleki Lonbar, Akram Beigi *, Nasour Bagheri Abstract - Full Text (PDF)
A comprehensive evaluation of deep learning based steganalysis performance in detecting spatial methods Vajiheh Sabeti *, Mahdiyeh Samiei Abstract - Full Text (PDF)
Practical key recovery attack on authentication and key agreement protocol SecAuthUAV in a network of drones and provide an
improved protocol Javad Alizadeh, Seyyed Hadi Noorani Asl *Abstract - Full Text (PDF)
Verifiable Database Supporting Range Query Seyed Hossein Tahami *, Hamid Mala Abstract - Full Text (PDF)
FPGA Implementation of Polynomial Multiplication in NTRU Prime PQC Algorithms Reza Rashidian, Raziyeh Salarifard *, Ali Jahanian Abstract - Full Text (PDF)
Back to Original Issue
|
|
|
|
|
|
|
|
|
|
|