|
|
|
|
|
 |
Information |
 |
|
You can copy/paste HTML codes anywhere you like, for example in homepage, or even other sites
A Survey of Cube, Differential Fault Analysis Attacks and Linear Structures on Keccak Hash Function (SHA-3) Masoumeh Safkhani *, Mohamadamin Arghavani Abstract - Full Text (PDF)
A Study on evolutional process of privacy and security in identity managment system *, Abstract - Full Text (PDF)
Overview of Jamming Operation in Smart Network Mohammad Reza Goharei *Abstract - Full Text (PDF)
An overview of privacy preserving Data Publishing Techniques Mehdi Sadeghpour, Reza Ebrahimi Atani *Abstract - Full Text (PDF)
Review of Image Steganography Based on LSB and Pixel Classification and Providing a New Method in This Area mansoor fateh *, samira rajabloo, elahe alipour Abstract - Full Text (PDF)
Survey of group location privacy approaches in location-based services and its challenges shadi azizi, maede Ashouri-Talouki *, hamid mala Abstract - Full Text (PDF)
Back to Original Issue
|
|
|
|
|
|
|
|
|
|
|