|
Issue |
Title |
|
Volume 4, Issue 6, November 2015 |
Challenges of Electronic Voting - A Survey |
Abstract
PDF
|
Aboubakr Ebrahim Elewa, Abdelwahab AlSammak, Alaa AbdElRahman, Tarek ElShishtawy |
|
Volume 4, Issue 2, March 2015 |
A survey on privacy preserving association rule mining |
Abstract
PDF
|
Narges Jamshidian Ghalehsefidi, Mohammad Naderi Dehkordi |
|
Volume 3, Issue 6, November 2014 |
A Hybrid Approach to Privacy Preserving in Association Rules Mining |
Abstract
PDF
|
Narges Jamshidian Ghalehsefidi, Mohammad Naderi Dehkordi |
|
Volume 4, Issue 1, January 2015 |
Privacy Preserving in Association Rule Mining |
Abstract
PDF
|
Zahra Kiani Abari, Mohammad Naderi Dehkordi |
|
Volume 4, Issue 1, January 2015 |
A heuristic algorithm for quick hiding of association rules |
Abstract
PDF
|
Maryam Fouladfar, Mohammad Naderi Dehkordi |
|
Volume 4, Issue 3, May 2015 |
Security, Privacy Awareness vs. Utilization of Social Networks and Mobile Apps for Learning: Students` Preparedness |
Abstract
PDF
|
Daniel Koloseni |
|
Volume 4, Issue 3, May 2015 |
A Strengthened Version of a Hash-based RFID Server-less Security Scheme |
Abstract
PDF
|
Shahab Abdolmaleky, Shahla Atapoor, Mohammad Hajighasemlou, Hamid Sharini |
|
Volume 4, Issue 4, July 2015 |
A Survey on the Privacy Preserving Algorithm and techniques of Association Rule Mining |
Abstract
PDF
|
Maryam Fouladfar, Mohammad Naderi Dehkordi |
|
Volume 3, Issue 2, March 2014 |
Analysis and Improvement of the Lightweight Mutual Authentication Protocol under EPC C-1 G-2 Standard |
Abstract
PDF
|
Masoud Mohammadi, Mehdi Hosseinzadeh, Mohammad Esmaeildoust |
|
Volume 3, Issue 5, September 2014 |
A Method for Hiding Association rules with Minimum Changes in Database |
Abstract
PDF
|
Zahra Sheykhinezhad, Mohammad Naderi dehkordi, Hamid Rastegari |
|
Volume 3, Issue 5, September 2014 |
Security and Privacy Flaws in a Recent Authentication Protocol for EPC C1 G2 RFID Tags |
Abstract
PDF
|
Seyed Mohammad Alavi, Karim Baghery, Behzad Abdolmaleki |
|
1 - 11 of 11 Items |
|