default search action
14th ISCISC 2017: Shiraz, Iran
- 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, ISCISC 2017, Shiraz, Iran, September 6-7, 2017. IEEE 2017, ISBN 978-1-5386-6560-2
- Sima Arasteh, Maede Ashouri-Talouki, Seyed Farhad Aghili:
Lightweight and Secure Authentication Protocol for the Internet of Things in Vehicular Systems. 1-7 - Marzieh Bitaab, Sattar Hashemi:
Hybrid Intrusion Detection: Combining Decision Tree and Gaussian Mixture Model. 8-12 - Seyed Asgary Ghasempouri, Behrouz Tork Ladani:
A Formal Model for Security Analysis of Trust and Reputation systems. 13-18 - Hamed Soleimani, Mohammad Ali Hadavi, Arash Bagherdaei:
WAVE: Black Box Detection of XSS, CSRF and Information Leakage Vulnerabilities. 19-24 - Banafsheh Heydari, Habib Yajam, Mohammad Ali Akhaee, Sadaf Salehkalaibar:
Utilizing Features of Aggregated Flows to Identify Botnet Network Traffic. 25-30 - Hoda Jannati, Nasour Bagheri, Masoumeh Safkhani:
Analysis of a Distance Bounding Protocol for Verifying the Proximity of Two-Hop Neighbors. 31-36 - Mojtaba Mohammadi, Alireza Keshavarz-Haddad:
A New Distributed Group Key Management Scheme for Wireless Sensor Networks. 37-41 - Atefeh Mohseni-Ejiyeh, Maede Ashouri-Talouki, Mojtaba Mahdavi:
A Lightweight and Secure Data Sharing Protocol for D2D Communications. 42-47 - Nazanin Habibollahi, Mahdi Abadi, Mahila Dadfarnia:
CAFD: Detecting Collusive Frauds in Online Auction Networks by Combining One-Class Classification and Collective Classification. 48-53 - Siavash Ahmadi, Mohammad Reza Aref:
Improved Fixed Point Attack on Gost2. 54-57 - Sadegh Attari, Aein Rezaei Shahmirzadi, Mahmoud Salmasizadeh, Iman Gholampour:
Finite State Machine Based Countermeasure for Cryptographic Algorithms. 58-63 - Seyed Reza Hoseini Najarkolaei, Siavash Ahmadi, Mohammad Reza Aref:
A New Approach to Key Schedule Designing. 64-69 - Narges Kazempour, Mahtab Mirmohseni, Mohammad Reza Aref:
New Techniques for Localization Based Information Theoretic Secret Key Agreement. 70-76 - Mehdi Mahdavi Oliaee, Mahshid Delavar, Mohammad Hassan Ameri, Javad Mohajeri, Mohammad Reza Aref:
On the Security of O-PSI a Delegated Private Set Intersection on Outsourced Datasets. 77-81 - Fahimeh Zare, Hamid Mala:
Cryptanalysis of an Asymmetric Searchable Encryption Scheme. 82-85 - Ali Soleimani, Mahtab Mirmohseni, Mohammad Reza Aref:
Physical Layer Security in AF and CF Relay Networks with RF-Energy Harvesting. 86-92 - Shahrooz Pooryousef, Kazim Fouladi:
Proposing a New Feature for Structure-Aware Analysis of Android Malwares. 93-98 - Aein Rezaei Shahmirzadi, Seyyed Arash Azimi, Mahmoud Salmasizadeh, Javad Mohajeri, Mohammad Reza Aref:
Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher. 99-104 - Farid Saleh, Maryam Amirmazlaghani:
A Novel Multiplicative Steganography Technique in Contourlet Domain. 105-110 - Amirreza Sarencheh, Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Mohammad Reza Aref:
An Efficient Cooperative Message Authentication Scheme in Vehicular Ad-hoc Networks. 111-118 - Naeimeh Soltani, Rasool Jalili:
Enforcing Access Control Policies over Data Stored on Untrusted Server. 119-124 - Behnam Zahednejad, Mahdi Azizi, Seyed Morteza Pournaghi:
A Novel and Efficient Privacy Preserving TETRA Authentication Protocol. 125-132
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.