|
|
|
|
|
|
 |
 |
|
 |
|
 |
|
Volume 12, Issue 2 (2-2024) |
 |
|
|
|
 |
A Secure Authentication and Key Agreement Scheme for LoRaWAN |
P. 1-15 |
|
 |
Zahra Jafari , Sahar Palimi , Mohamadamin Sabaei , Rahman Hajian , Hossein Erfani *  |
|
Abstract
(3602 Views) |
Full-Text (PDF)
(1516 Downloads)
|
 |
A New Mixing Scheme to Improve Privacy in Bitcoin Cryptocurrency Transactions |
P. 16-23 |
|
 |
Hadi Norouzi Cholcheh * , Salman Niksefat  |
|
Abstract
(3932 Views) |
Full-Text (PDF)
(1508 Downloads)
|
 |
Analysis of global trends in providing educational frameworks for training cyber security professionals |
P. 24-32 |
|
 |
Ahmad Rahdari , Mohammad Hesam Tadayon *  |
|
Abstract
(3649 Views) |
Full-Text (PDF)
(1578 Downloads)
|
 |
Electrocardiogram Signal Authentication System based on Deep Learning |
P. 33-41 |
|
 |
Sajjad Maleki Lonbar , Akram Beigi * , Nasour Bagheri  |
|
Abstract
(3354 Views) |
Full-Text (PDF)
(2590 Downloads)
|
 |
A comprehensive evaluation of deep learning based steganalysis performance in detecting spatial methods |
P. 42-50 |
|
 |
Vajiheh Sabeti * , Mahdiyeh Samiei  |
|
Abstract
(2843 Views) |
Full-Text (PDF)
(1558 Downloads)
|
 |
Practical key recovery attack on authentication and key agreement protocol SecAuthUAV in a network of drones and provide an
improved protocol |
P. 51-59 |
|
 |
Javad Alizadeh , Seyyed Hadi Noorani Asl *  |
|
Abstract
(3354 Views) |
Full-Text (PDF)
(1125 Downloads)
|
 |
Verifiable Database Supporting Range Query |
P. 60-72 |
|
 |
Seyed Hossein Tahami * , Hamid Mala  |
|
Abstract
(2433 Views) |
Full-Text (PDF)
(1192 Downloads)
|
 |
FPGA Implementation of Polynomial Multiplication in NTRU Prime PQC Algorithms |
P. 73-80 |
|
 |
Reza Rashidian , Raziyeh Salarifard * , Ali Jahanian  |
|
Abstract
(4025 Views) |
Full-Text (PDF)
(2911 Downloads)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|