MA Nia, SK Kiaei, RE Atani… - 2015 12th International …, 2015 - ieeexplore.ieee.org
In the recent years, threats of malwares have been increasing. The violation of privacy and confidentiality in large networks and distributed systems is the main target for these …
MA Nia, RE Atani, AK Haghi - 7'th International Symposium on …, 2014 - ieeexplore.ieee.org
In this paper, the main idea is to establish IoT structure for ubiquitous communications. This structure has been made by data type modelling. Type modeling is useful to construct …
Encrypted data cannot ensure full immunity especially in anonymous applications, Even though it protect data by encryption methods. On the other side, we encounter with a set of …