Keywords = Security
Number of Articles: 8
1. Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns

Volume 11, Issue 3, Summer and Autumn 2019, Pages 9-17

Saadi Hadjer; Yagoub Mustapha C.E.; Rachida TOUHAMI


2. Secure FPGA Design by Filling Unused Spaces

Volume 11, Issue 1, Winter and Spring 2019, Pages 47-56

Mansoureh Labbafniya; Roghaye Saeidi


3. An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks

Volume 10, Issue 1, Winter and Spring 2018, Pages 15-27

A. Mohseni-Ejiyeh; M. Ashouri-Talouki; M. Mahdavi


4. Enhancing privacy of recent authentication schemes for low-cost RFID systems

Volume 7, Issue 2, Summer and Autumn 2015, Pages 135-149

K. Baghery; B. Abdolmaleki; B. Akhbari; M. R. Aref


5. A survey on digital data hiding schemes: principals, algorithms, and applications

Volume 5, Issue 1, Winter and Spring 2013, Pages 5-36

M. A. Akhaee; F. Marvasti


6. A chaos-based video watermarking algorithm

Volume 4, Issue 1, Winter and Spring 2012, Pages 77-86

S. Mohammadi; A. Hakimi


7. Authorization models for secure information sharing: a survey and research agenda

Volume 2, Issue 2, Summer and Autumn 2010, Pages 69-87

F. Salim; J. Reid; E. Dawson