|
 |
|
 |
Approaches and challenges of the white-box model of the block cipher schemes implementation |
P. 3-20 |
|
 |
Hadi Soleimany * , Mohammad Reaza Sadeghi  |
|
Abstract
(3562 Views) |
Full-Text (PDF)
(999 Downloads)
|
 |
Search over Encrypted Data: Functionalities and Challenges |
P. 21-44 |
|
 |
Aniseh Najafi * , Majid Bayat , Hamid Haj Seyyed Javadi  |
|
Abstract
(3906 Views) |
Full-Text (PDF)
(937 Downloads)
|
 |
Check the Safe coding standards in language C++ |
P. 45-56 |
|
 |
Mohammed Mohsen Amiri , Morteza Moammer * , Mousa Mohammadnia , Masoud Asgari Mehr  |
|
Abstract
(3694 Views) |
Full-Text (PDF)
(924 Downloads)
|
 |
Prevention Management of Realization and continuity of the futile cycle of cyber-crimes |
P. 57-66 |
|
 |
Amin Pazhouhesh , Afsaneh Zamani *  |
|
Abstract
(2724 Views) |
Full-Text (PDF)
(835 Downloads)
|
 |
A Survey on the Important Security Attacks on Industrial Control Systems from 2000 up to Now |
P. 67-86 |
|
 |
|
|
Abstract
(2785 Views) |
Full-Text (PDF)
(869 Downloads)
|
 |
Metamorphic Malware Identification Combining Static and Dynamic Analyzes |
P. 87-96 |
|
 |
Hadi Golbaghi , Mojtaba Vahidi asl * , Alireza Khalilian  |
|
Abstract
(3210 Views) |
Full-Text (PDF)
(987 Downloads)
|