|
 |
|
 |
Approaches and challenges of the white-box model of the block cipher schemes implementation |
P. 3-20 |
|
 |
Hadi Soleimany * , Mohammad Reaza Sadeghi  |
|
Abstract
(3809 Views) |
Full-Text (PDF)
(1102 Downloads)
|
 |
Search over Encrypted Data: Functionalities and Challenges |
P. 21-44 |
|
 |
Aniseh Najafi * , Majid Bayat , Hamid Haj Seyyed Javadi  |
|
Abstract
(4264 Views) |
Full-Text (PDF)
(1027 Downloads)
|
 |
Check the Safe coding standards in language C++ |
P. 45-56 |
|
 |
Mohammed Mohsen Amiri , Morteza Moammer * , Mousa Mohammadnia , Masoud Asgari Mehr  |
|
Abstract
(3973 Views) |
Full-Text (PDF)
(999 Downloads)
|
 |
Prevention Management of Realization and continuity of the futile cycle of cyber-crimes |
P. 57-66 |
|
 |
Amin Pazhouhesh , Afsaneh Zamani *  |
|
Abstract
(2950 Views) |
Full-Text (PDF)
(933 Downloads)
|
 |
A Survey on the Important Security Attacks on Industrial Control Systems from 2000 up to Now |
P. 67-86 |
|
 |
|
|
Abstract
(3023 Views) |
Full-Text (PDF)
(966 Downloads)
|
 |
Metamorphic Malware Identification Combining Static and Dynamic Analyzes |
P. 87-96 |
|
 |
Hadi Golbaghi , Mojtaba Vahidi asl * , Alireza Khalilian  |
|
Abstract
(3489 Views) |
Full-Text (PDF)
(1087 Downloads)
|