


default search action
16th ISCISC 2019: Mashhad, Iran
- Abbas Ghaemi Bafghi, Haleh Amintoosi:
16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, ISCISC 2019, Mashhad, Iran, August 28-29, 2019. IEEE 2019, ISBN 978-1-7281-4374-3 - Sorour Sheidani, Ziba Eslami:
Blind Multipurpose Image Watermarking Based on Secret Sharing. 1-8 - Faezeh Sadat Babamir
, Murvet Kirci
:
Improvement of Digest Based Authentication Scheme for Biometric Verification. 9-14 - Mohammad Mahdi Modiri, Javad Mohajeri, Mahmoud Salmasizadeh:
GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication. 15-20 - Amir Ashtari, Ahmad Shabani, Bijan Alizadeh:
A New RF-PUF Based Authentication of Internet of Things Using Random Forest Classification. 21-26 - Abbas Rahnama, Mohammad Beheshti-Atashgah, Taraneh Eghlidos, Mohammad Reza Aref:
An Ultra-Lightweight RFID Mutual Authentication Protocol. 27-32 - Reyhane Attarian
, Sattar Hashemi:
Investigating the Streaming Algorithms Usage in Website Fingerprinting Attack Against Tor Privacy Enhancing Technology. 33-38 - Abbas Rahnama, Mohammad Beheshti-Atashgah, Taraneh Eghlidos, Mohammad Reza Aref:
A Lightweight Anonymous Authentication Protocol For IoT Wireless Sensor Networks. 39-44 - Hamid Amiryousefi, Zahra Ahmadian:
Cryptanalysis of SP2DAS and 3PDA, Two Data Aggregation Schemes for Smart Grid. 45-48 - Aref Rezaei, Leili Farzinvash, Ali Farzamnia
:
A Novel Steganography Algorithm using Edge Detection and MPC Algorithm. 49-54 - Parvin Rastegari, Mohammad Dakhilalian
:
Cryptanalysis of a Certificateless Signcryption Scheme. 67-71 - Ala Bahrani, Amir Jalaly Bidgly
:
Ransomware detection using process mining and classification algorithms. 73-77 - Majid Zolfaghari
, Solmaz Salimi, Mehdi Kharrazi:
Inferring API Correct Usage Rules: A Tree-based Approach. 78-84 - Mostafa Chegenizadeh, Mohammad Ali
, Javad Mohajeri, Mohammad Reza Aref:
An Anonymous Attribute-based Access Control System Supporting Access Structure Update. 85-91 - Abbas Nejatifar, Mohammad Ali Hadavi:
Threat Extraction in IoT-Based Systems Focusing on Smart Cities. 92-98 - Hadi Aghaee, Bahareh Akhbari:
Classical-Quantum Multiple Access Wiretap Channel. 99-103 - Zahra Saffar, Siamak Mohammadi:
Fault tolerant non-linear techniques for scalar multiplication in ECC. 104-113 - Shayan Mehranpoor, Naser Mohammadzadeh, Hossein Gharaee:
IoT-Based Anonymous Authentication Protocol Using Biometrics in Smart Homes. 114-121 - Majid Farhadi, Hamideh Bypour, Reza Mortazavi:
An efficient secret sharing-based storage system for cloud-based IoTs. 122-127 - Fakhroddin Noorbehbahani, Farzaneh Rasouli, Mohammad Saberi:
Analysis of Machine Learning Techniques for Ransomware Detection. 128-133 - Alireza Ghaemi, Habibollah Danyali:
CRT-Based Robust Data Hiding Method by Extracting Features in DCT Domain. 134-138 - Arian Balouchestani, Mojtaba Mahdavi, Yeganeh Hallaj, Delaram Javdani:
SANUB: A new method for Sharing and Analyzing News Using Blockchain. 139-143

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.