|
 |
|
 |
A Survey of Cube, Differential Fault Analysis Attacks and Linear Structures on Keccak Hash Function (SHA-3) |
P. 3-14 |
 |
Masoumeh Safkhani * , Mohamadamin Arghavani  |
|
Abstract
(5637 Views) |
Full-Text (PDF)
(1237 Downloads)
|
 |
A Study on evolutional process of privacy and security in identity managment system |
P. 15-34 |
 |
|
|
Abstract
(4935 Views) |
Full-Text (PDF)
(1352 Downloads)
|
 |
Overview of Jamming Operation in Smart Network |
P. 35-48 |
 |
Mohammad Reza Goharei *  |
|
Abstract
(4639 Views) |
Full-Text (PDF)
(1226 Downloads)
|
 |
An overview of privacy preserving Data Publishing Techniques |
P. 49-62 |
 |
Mehdi Sadeghpour , Reza Ebrahimi Atani *  |
|
Abstract
(5901 Views) |
Full-Text (PDF)
(1459 Downloads)
|
 |
Review of Image Steganography Based on LSB and Pixel Classification and Providing a New Method in This Area |
P. 63-71 |
 |
Mansoor Fateh * , Samira Rajabloo , Elahe Alipour  |
|
Abstract
(4517 Views) |
Full-Text (PDF)
(1140 Downloads)
|
 |
Survey of group location privacy approaches in location-based services and its challenges |
P. 73-85 |
 |
Shadi Azizi , Maede Ashouri-Talouki * , Hamid Mala  |
|
Abstract
(4380 Views) |
Full-Text (PDF)
(1192 Downloads)
|