


default search action
13th ISCISC 2016: Tehran, Iran
- 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology, ISCISC 2016, Tehran, Iran, September 7-8, 2016. IEEE 2016, ISBN 978-1-5090-3949-4
- Sogand SadrHaghighi, Siavash Khorsandi:
An identity-based digital signature scheme to detect pollution attacks in intra-session network coding. 7-12 - Samira Hosseini, Mojtaba Mahdavi:
Counterfeiting attack on adjusted expanded-bit multiscale quantization-based semi-fragile watermarking technique. 13-19 - Khadijeh Bagheri
, Mohammad-Reza Sadeghi
, Taraneh Eghlidos, Daniel Panario
:
A secret key encryption scheme based on 1-level QC-LDPC lattices. 20-25 - Abolfazl Zargar, Alireza Nowroozi
, Rasool Jalili:
XABA: A zero-knowledge anomaly-based behavioral analysis method to detect insider threats. 26-31 - Zahra Hatefi, Mojtaba Mahdavi, Pegah Nikbakht Bideh:
Feature extraction for detection of watermarking algorithm. 32-37 - Morteza Safaei Pour, Mahmoud Salmasizadeh:
A new CPA resistant software implementation for symmetric ciphers with smoothed power consumption. 38-45 - Seyed Reza Hoseini Najarkolaei, Mohammad Zare Ahangarkolaei, Siavash Ahmadi, Mohammad Reza Aref:
Biclique cryptanalysis of Twine-128. 46-51 - Sima Arasteh, Seyed Farhad Aghili
, Hamid Mala:
A new lightweight authentication and key agreement protocol for Internet of Things. 52-59 - Mohsen Ahmadi, Behrouz Shahgholi Ghahfarokhi:
Preserving privacy in location based mobile coupon systems using anonymous authentication scheme. 60-65 - Mohammad Zare Ahangarkolaei, Seyed Reza Hoseini Najarkolaei, Siavash Ahmadi, Mohammad Reza Aref:
Zero correlation linear attack on reduced round Piccolo-80. 66-71 - Amir S. Mortazavi, Mahmoud Salmasizadeh, Amir Daneshgar
:
FMNV continuous non-malleable encoding scheme is more efficient than believed. 72-78 - Mohammad Mehdi Ahmadian, Hamid Reza Shahriari
:
2entFOX: A framework for high survivable ransomwares detection. 79-84 - Shahrooz Pooryousef, Morteza Amini
:
Fine-grained access control for hybrid mobile applications in Android using restricted paths. 85-90 - Habib Allah Yajam, Younes Karimi Ahmadabadi
, Mohammad Ali Akhaee:
PapiaPass: Sentence-based passwords using dependency trees. 91-96 - Milad Ghalejughi, Mohammad Ali Akhaee:
Video watermarking in the DT-CWT domain using hyperbolic function. 97-100 - Sharareh Zamanzadeh, Shahram Shahabi, Ali Jahanian
:
Security improvement of FPGA configuration file against the reverse engineering attack. 101-105 - Parvin Rastegari, Mehdi Berenjkoub:
An improved certificateless signcryption scheme. 106-111 - Mahmood Deypir:
A new approach for effective malware detection in Android-based devices. 112-116 - Ali Sattari, Mohammad Ali Akhaee:
Spread spectrum watermarking robust to silk vocoder using sub-optimal detectors. 117-122

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.