![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
10th ISCISC 2013: Yazd, Iran
- 10th International ISC Conference on Information Security and Cryptology, ISCISC 2013, Yazd, Iran, August 29-30, 2013. IEEE 2013
- M. A. Alavianmehr, Mehdi Rezaei, Mohammad Sadegh Helfroush, Ashkan Tashk
:
A reversible data hiding scheme for video robust against H.264/AVC compression. 1-6 - Mahsa Afsharizadeh
, Majid Mohammadi:
A reversible watermarking prediction based scheme using a new sorting technique. 1-5 - Rahim Toluee, Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh:
Attribute-based ring signatures: Security analysis and a new construction. 1-6 - Zohre Raghebi, Mahmoud Reza Hashemi
:
A new trust evaluation method based on reliability of customer feedback for cloud computing. 1-6 - Reza Hooshmand, Masoumeh Koochak Shooshtari, Mohammad Reza Aref:
Secret key cryptosystem based on polar codes over Binary Erasure Channel. 1-6 - Z. Lashkaripour
, Abbas Ghaemi Bafghi:
A security analysis tool for web application reinforcement against SQL injection attacks (SQLIAs). 1-8 - Nematollah Zarmehi, Morteza Banagar
, Mohammad Ali Akhaee:
Optimum decoder for an additive video watermarking with Laplacian noise in H.264. 1-5 - Sajad Pourmohseni, Hassan Asgharian, Ahmad Akbari
:
Detecting authentication misuse attacks against SIP entities. 1-5 - Donia Malekian, Mahmoud Reza Hashemi
:
An adaptive profile based fraud detection framework for handling concept drift. 1-6 - Hamzeh Ghasemzadeh, Mohammad Reza Aref, Ali Payandeh:
A novel and low-energy PKC-based key agreement protocol for WSNs. 1-6 - Shahla Mardani, Hamid Reza Shahriari
:
A new method for occupational fraud detection in process aware information systems. 1-5 - Shirin Najdi
, Afshin Ebrahimi:
Audio fingerprinting based on multi-resolution analysis of Discrete Wavelet Transform. 1-5 - Farzad Pahlavani, Ali Pourmohammad:
A block set interpolation technique based Additive-White-Noise robust audio watermarking method. 1-5 - Ehsan Meamari, Khadijeh Afhamisisi, Hadi Shahriar Shahhoseini
:
An analysis on interactions among secondary user and unknown jammer in cognitive radio systems by fictitious play. 1-6 - Vahid Khodabakhshi, Mahdi Soltani, Rasool Jalili, Mostafa Rezvani:
Chaos-based selective key (CSK) Cryptosystem: A new direction to secure VPN. 1-7 - Hassan Shakeri, Abbas Ghaemi Bafghi:
CATEF: Confidence-aware trust estimation framework. 1-6 - Hassan Daghigh, Somayeh Didari, Fatemeh Seifi Shahpar:
Computing elliptic curve discrete logarithm via lifting. 1-4 - Alireza Toroghi Haghighat, Mohammad Ali Kargar, Mohammad Sadeq Dousti
, Rasool Jalili:
Minimal assumptions to achieve privacy in e-voting protocols. 1-5 - Soodeh Bakhshandeh, Fateme Bakhshande, Mahdi Aliyari Shoorehdeli
:
Steganalysis algorithm based on Cellular Automata Transform and Neural Network. 1-5 - Roza Afarin, Saeed Mozaffari:
Image encryption using genetic algorithm and binary patterns. 1-5 - Mohammad K. Houri Zarch, Masih Abedini, Mehdi Berenjkoub, Amin Mirhosseini:
An unsupervised anomaly detection engine with an efficient feature set for AODV. 1-6 - Habib Allah Yajam, Ali Mahmoodi, Javad Mohajeri, Mahmoud Salmasizadeh:
Security analysis of an identity-based mix net. 1-4 - Morteza Heidari
, Shahrokh Gaemmaghami:
Universal image steganalysis using singular values of DCT coefficients. 1-5 - Fatemeh Barani, Sajjad Gerami:
ManetSVM: Dynamic anomaly detection using one-class support vector machine in MANETs. 1-6 - Zahra Salek
, Fariborz Mousavi Madani, Reza Azmi:
Intrusion detection using neuarl networks trained by differential evaluation algorithm. 1-6 - Ehsan Shakeri, Shahrokh Ghaemmaghami:
An efficient feature extraction methodology for blind image steganalysis using contourlet transform and Zernike moments. 1-6 - Ahad Azarian, Mahdi Abadi
:
On the trade-off between stealth and propagation speed of Internet worms. 1-6 - Hassan Nasiraee
, Jamshid Bagherzadeh Mohasefi:
A novel three party key establishment scheme in the context of Internet-of-Things. 1-5 - Zahra Hakimi, Karim Faez
, Morteza Barati:
An efficient architecture for distributed intrusion detection system. 1-5 - Amir Jalaly Bidgoly
, Behrouz Tork Ladani
:
Quantitative verification of beta reputation system using PRISM probabilistic model checker. 1-6 - Sonu Kumar Jha:
Scan based side channel attack on Grain v1. 1-4 - Mohammad-Reza Zare-Mirakabad, Fatemeh Kaveh-Yazdy
, Mohammad Tahmasebi
:
Privacy preservation by k-anonymizing Ngrams of time series. 1-6 - Hamid Bagheriand Saeed Mozaffari:
Robust reversible data hiding in encrypted image: Using fractal coding approach. 1-4 - Taha Yasin Rezapour, Meer Soheil Abolghasemi, Reza Ebrahimi Atani
:
A position-based key management scheme for heterogeneous sensor networks. 1-6 - Habib Allah Yajam, Javad Mohajeri, Mahmoud Salmasizadeh:
Identity based universal re-encryption for mix nets. 1-5 - Amin Mohajer
, Maryam Bavaghar, Rashin Saboor, Ali Payandeh:
Secure dominating set-based routing protocol in MANET: Using reputation. 1-7 - Rahim Toluee, Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh:
A new ring signature scheme. 1-7
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.