default search action
11th ISCISC 2014: Tehran, Iran
- 11th International ISC Conference on Information Security and Cryptology, ISCISC 2014, Tehran, Iran, September 3-4, 2014. IEEE 2014
- Taha Yasin Rezapour, Reza Ebrahimi Atani, Meer Soheil Abolghasemi:
Secure positioning for shipping containers in ports and terminals using WSN. 10-14 - Bahram Rashidi, Reza Rezaeian Farashahi, Sayed Masoud Sayedi:
High-speed and pipelined finite field bit-parallel multiplier over GF(2m) for elliptic curve cryptosystems. 15-20 - AliAkbar Sadeghi, Farzane Aminmansour, Hamid Reza Shahriari:
Tazhi: A novel technique for hunting trampoline gadgets of jump oriented programming (A class of code reuse attacks). 21-26 - Akbar Mahmoodi Rishakani, Seyed Mojtaba Dehnavi, M. R. Mirzaee Shamsabad, Hamidreza Maimani, Einollah Pasha:
New concepts in design of lightweight MDS diffusion layers. 27-32 - Sepideh Akhavan Bitaghsir, Nader Karimi, Shekoofeh Azizi, Shadrokh Samavi:
Stereo image watermarking method based on binocular just noticeable difference. 33-38 - Mahmoud Haghighi, Mohammad Dakhilalian:
A practical time complexity analysis of fuzzy rainbow tradeoff. 39-43 - Melika Mostaghim, Reza Boostani:
CVC: Chaotic visual cryptography to enhance steganography. 44-48 - Ahmad Boorghany, Siavash Bayat Sarmadi, Pamian Yousefi, Pouneh Gorji, Rasool Jalili:
Random data and key generation evaluation of some commercial tokens and smart cards. 49-54 - Payam Mahmoudi Nasr, Ali Yazdian Varjani:
Petri net model of insider attacks in SCADA system. 55-60 - Masoud Hasanifard, Behrouz Tork Ladani:
DoS and port scan attack detection in high speed networks. 61-66 - Rahim Entezari, Hossein Bahramgiri, Mahnaz Tajamolian:
A mafia and distance fraud high-resistance RFID distance bounding protocol. 67-72 - Soodeh Hosseini, Mohammad Abdollahi Azgomi, Adel Torkaman Rahmani:
A malware propagation model considering software diversity and topology dynamics. 73-78 - Akram Khalesi, Hossein Bahramgiri, Davod Mansuri:
Impossible differential cryptanalysis of LBlock through breaking down the key space. 79-83 - Siavash Ahmadi, Mahshid Delavar, Javad Mohajeri, Mohammad Reza Aref:
Security analysis of CLEFIA-128. 84-88 - Seyyed Arash Azimi, Zahra Ahmadian, Javad Mohajeri, Mohammad Reza Aref:
Impossible differential cryptanalysis of Piccolo lightweight block cipher. 89-94 - Hassan Daghigh, Amir Mehdi Yazdani Kashani, Ruholla Khodakaramian Gilan:
Primality test for mersenne numbers using elliptic curves. 95-97 - Reyhaneh Rabaninejad, Zahra Ahmadian, Mahmoud Salmasizadeh, Mohammad Reza Aref:
Cube and dynamic cube attacks on SIMON32/64. 98-103 - Reza Hooshmand, Masoumeh Koochak Shooshtari, Taraneh Eghlidos, Mohammad Reza Aref:
Reducing the key length of mceliece cryptosystem using polar codes. 104-108 - Amir Khoshkbarchi, Hamid Reza Shahriari, Mehdi Amjadi:
Comparison-based agent partitioning with learning automata: A trust model for service-oriented environments. 109-114 - Zeinab Abbasi, Mehdi Kargahi, Morteza Mohaqeqi:
Anomaly detection in embedded systems using simultaneous power and temperature monitoring. 115-119 - Mohammad Reza Razian, Hasan Mokhtari Sangchi:
A threatened-based software security evaluation method. 120-125 - Mohammad MirShahJafari, Hamed Ghavamnia:
Classifying IDS alerts automatically for use in correlation systems. 126-130 - Hamed Orojloo, Mohammad Abdollahi Azgomi:
A method for modeling and evaluation of the security of cyber-physical systems. 131-136 - Karim Baghery, Behzad Abdolmaleki, Bahareh Akhbari, Mohammad Reza Aref:
Privacy analysis and improvements of two recent RFID authentication protocols. 137-142 - Parvin Rastegari, Mehdi Berenjkoub:
A multi-signer convertible limited multi-verifier signature scheme in the standard model. 143-148 - Fateme Hajikarami, Mehdi Berenjkoub, Mohammad Hossein Manshaei:
A modular two-layer system for accurate and fast traffic classification. 149-154 - Habib Allah Yajam, Azadeh Sadat Mousavi, Maryam Amirmazlaghani:
A new linguistic steganography scheme based on lexical substitution. 155-160 - Ramin Ganjavi, Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh:
A traceable optimistic fair exchange protocol. 161-166 - Zohre Fath Fathabadi, Sadegh Dorri Nogoorani, Ali Mohammad Afshin Hemmatyar:
CR-SMTC: Privacy preserving collusion-resistant multi-party trust computation. 167-172 - Hamidreza Amini Khorasgani, Saba Asaad, Taraneh Eghlidos, Mohammad Reza Aref:
A lattice-based threshold secret sharing scheme. 173-179 - Abolfazl Najafi, Ahamd Sepahi, Rasool Jalili:
Web driven alert verification. 180-185 - Masoud Khosravi Farmad, Razieh Rezaee, Abbas Ghaemi Bafghi:
Considering temporal and environmental characteristics of vulnerabilities in network security risk assessment. 186-191 - Mohammad Hossein Hajiabadi, Hossein Saidi, Mohammad Behdadfar:
Scalable, high-throughput and modular hardware-based string matching algorithm. 192-198 - Pouria Babvey, Habib Allah Yajam, Taraneh Eghlidos:
Security analysis of SKI protocol. 199-203 - Reza Mortazavi, Saeed Jalili:
Iterative constraint satisfaction method for microaggregation problem. 204-209 - Amir Bidokhti, Shahrokh Ghaemmaghami:
A generalized multi-layer information hiding scheme using wet paper coding. 210-213 - Mahdi Soltani, Sina Najafi, Rasool Jalili:
Mid-defense: Mitigating protocol-level attacks in TOR using indistinguishability obfuscation. 214-219 - Sara Saadat, Hamid Reza Shahriari:
Towards a process-oriented framework for improving trust and security in migration to cloud. 220-225 - Mohammad Mahdi Tajiki, Mohammad Ali Akhaee:
Secure and privacy preserving keyword searching cryptography. 226-230
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.