>
Fa   |   Ar   |   En
   the isc international journal of information security   
سال:2022 - دوره:14 - شماره:3


  tick  an electronic voting scheme based on blockchain technology and zero-knowledge proofs - صفحه:123-133

  tick  android malware detection using one-class graph neural networks - صفحه:51-60

  tick  attribute-based encryption with efficient attribute revocation, decryption outsourcing, and multi-keyword searching in cloud storage - صفحه:135-149

  tick  attribute-based remote data auditing and user authentication for cloud storage systems - صفحه:43-49

  tick  light-weight privacy-preserving data aggregation protocols in smart grid metering networks - صفحه:101-112

  tick  lightweight identification of android malware with knowledge distillation and deep learning approach - صفحه:81-92

  tick  mutual lightweight puf-based authentication scheme using random key management mechanism for resource-constrained iot devices - صفحه:1-8

  tick  on the suitability of improved trustchain for smartphones - صفحه:33-42

  tick  one-shot achievable secrecy rate regions for quantum interference wiretap channel - صفحه:71-80

  tick  practical differential fault analysis on craft, a lightweight block cipher - صفحه:21-31

  tick  practical differential fault analysis on skinny - صفحه:9-19

  tick  secure and low-area implementation of the aes using fpga - صفحه:93-99

  tick  securekv: secure searchable outsourcing of key-value databases to the public cloud - صفحه:113-121

  tick  towards a formal approach for detection of vulnerabilities in the android permissions system - صفحه:61-69
 

Copyright 2023
Islamic World Science Citation Center
All Rights Reserved