Vol. 10. No. (2) 2019
Papers
-
Classification of Sequences Generated by Compression and Encryption Algorithms
Abstract views: 2252 / PDF downloads: 59
-
A new proof for the security of the keyed Sponge construction in the ideal compression function model
Abstract views: 2111 / PDF downloads: 60
-
Applicaton of parameters of voice singal autoregressive models to solve speaker recognition problems
Abstract views: 267 / PDF downloads: 63
-
Hardware Trojan Detection Technique Using Frequency Characteristic Analysis of Path Delay in Application Specific Integrated Circuits
Abstract views: 2253 / PDF downloads: 64
-
Representation model of requests to Web resources, based on a vector space model and attributes of requests for HTTP protocol
Abstract views: 2106 / PDF downloads: 65
-
Information leakage through electromagnetic radiation of PS/2 Keyboard
Abstract views: 287 / PDF downloads: 67
-
Decode-and-Forward vs. Amplify-and-Forward Scheme in Physical Layer Security for Wireless Relay Beamforming Networks
Abstract views: 2120 / PDF downloads: 66