|
Issue |
Title |
|
Vol 9, No 01 (2019) |
A Method for Modeling and Verifying of UML 2.0 Sequence Diagrams using SPIN |
Abstract
PDF
|
Luan Chi Le |
|
Vol 10, No 2 (2019) |
A new proof for the security of the keyed Sponge construction in the ideal compression function model |
Abstract
PDF
|
Anh Tuan Nguyen, Cuong Bui Nguyen |
|
Vol 2, No 12 (2020) |
A Novel Points of Interest Selection Method For SVM-based Profiled Attacks |
Abstract
PDF
|
Tran Ngoc Quy, Nguyen Hong Quang |
|
Vol 8, No 2 (2018) |
A solution for packet security 1 Gbps on layer 2 with technology FPGA |
Abstract
PDF
|
Ky Van Phan, Thang Van Tran, Phuc Huu La |
|
Vol 7, No 1 (2018) |
Agent-whistleblower Technology for Secure Internet of Things |
Abstract
PDF
|
Vladimir Eliseev, Anastasiya Gurina |
|
Vol 9, No 01 (2019) |
Algorithm of decoding of convolutional codes in communication links with multiplexing |
Abstract
PDF
|
Konyshev M.U., Kozachok A.V., Pankratov A.V., Petrov K.E. |
|
Vol 2, No 12 (2020) |
Alpha-DBL: A Reasonable High Secure Double-Block-Length Hash Function |
Abstract
PDF
|
Hoang Dinh Linh, Tran Hong Thai |
|
Vol 7, No 1 (2018) |
An algorithm for evaluating the linear redundancy and the factor of inertial groups of S-box |
Abstract
PDF
|
Nghi Van Nguyen |
|
Vol 10, No 2 (2019) |
Applicaton of parameters of voice singal autoregressive models to solve speaker recognition problems |
Abstract
PDF
|
Evgeny Novikov, Vladimir Trubitsyn |
|
Vol 2, No 12 (2020) |
Block Ciphers with Matrices Operating Alternately over Columns and Rows |
Abstract
PDF
|
Pablo Freyre, Oristela Cuellar, Nelson Díaz, Adrián Alfonso |
|
Vol 1, No 11 (2020) |
Cài đặt thuật toán sinh tham số RSA 2048 bit trên thiết bị PKI Token |
Abstract
PDF
|
Vũ Tá Cường, Nguyễn Thành Trung, Lê Đình Hùng |
|
Vol 10, No 2 (2019) |
Classification of Sequences Generated by Compression and Encryption Algorithms |
Abstract
PDF
|
Alexander Kozachok, Spirin Andrey Andreevich |
|
Vol 10, No 2 (2019) |
Decode-and-Forward vs. Amplify-and-Forward Scheme in Physical Layer Security for Wireless Relay Beamforming Networks |
Abstract
PDF
|
Tuan Nhu Nguyen |
|
Vol 2, No 12 (2020) |
Detecting Web Attacks Based on Clustering Algorithm and Multi-branch CNN |
Abstract
PDF
|
Pham Van Huong, Le Thi Hong Van, Pham Sy Nguyen |
|
Vol 1, No 11 (2020) |
Dynamic Cryptographic Algorithms Kuznyechik and Magma |
Abstract
PDF
|
Pablo Freyre, Oristela Cuellar, Nelson Díaz, Ramses Rodríguez, Adrián Alfonso |
|
Vol 1, No 11 (2020) |
From AES to Dynamic AES |
Abstract
PDF
|
Pablo Freyre, Oristela Cuellar, Nelson Díaz, Adrián Alfonso |
|
Vol 9, No 01 (2019) |
Giải pháp bảo mật đầu cuối cho điện thoại di động |
Abstract
PDF
|
Trần Văn Khánh, Nguyễn Thành Vinh |
|
Vol 10, No 2 (2019) |
Hardware Trojan Detection Technique Using Frequency Characteristic Analysis of Path Delay in Application Specific Integrated Circuits |
Abstract
PDF
|
Ha Thai Tran, Phuc Van Hoang, Tuan Ngoc Do, Duong Hai Nguyen |
|
Vol 7, No 1 (2018) |
How secure is the Advanced Encryption Standard with random ShiftRows against Fault Analysis |
Abstract
PDF
|
Adrián Alfonso Peñate, Pablo Freyre Arrozarena |
|
Vol 10, No 2 (2019) |
Information leakage through electromagnetic radiation of PS/2 Keyboard |
Abstract
PDF
|
Chinh Duc Bui, Minh The Ngo, Hao Ngoc Vinh Nguyen, Tuan Manh Pham |
|
Vol 9, No 01 (2019) |
Mã hóa dữ liệu AES đường truyền kết nối ZigBee và IoT trong giám sát nước thải công nghiệp |
Abstract
PDF
|
Nguyễn Hữu Trung, Hà Duyên Trung, Nguyễn Thanh Bình |
|
Vol 9, No 01 (2019) |
Một cải tiến cận an toàn kháng va chạm cho lược đồ Hirose trong mô hình mã pháp lý tưởng |
Abstract
PDF
|
Trần Hồng Thái, Hoàng Đình Linh |
|
Vol 8, No 2 (2018) |
Một giải pháp cứng hóa phép nhân điểm Elliptic trên trường GF(p) |
Abstract
PDF
|
Nguyễn Văn Long, Hoàng Văn Thức |
|
Vol 7, No 1 (2018) |
Phát hiện mã độc IoT botnet dựa trên đồ thị PSI với mô hình Skip-gram |
Abstract
PDF
|
Ngô Quốc Dũng, Lê Văn Hoàng, Nguyễn Huy Trung |
|
Vol 8, No 2 (2018) |
Phân tích các thành phần mật mã trong hoán vị Keccak-p |
Abstract
PDF
|
Nguyễn Văn Long |
|
1 - 25 of 42 Items |
1 2 > >> |