


default search action
17th ISCISC 2020: Tehran, Iran
- 17th International ISC Conference on Information Security and Cryptology, ISCISC 2020, Tehran, Iran, September 9-10, 2020. IEEE 2020, ISBN 978-1-7281-8569-9
- Mohammad Erfan Mazaheri, Farhad Taheri
, Siavash Bayat Sarmadi:
Lurking Eyes: A Method to Detect Side-Channel Attacks on JavaScript and WebAssembly. 1-6 - Shahrooz Janbaz, Rahim Asghari, Bagher Bagherpour, Ali Zaghian:
A fast non-interactive publicly verifiable secret sharing scheme. 7-13 - Mahsa Monem Moharrer, Sadegh Dorri Nogoorani
:
A Decentralized App Store Using the Blockchain Technology. 14-21 - Farshideh Kordi, Hamed Hossein-Talaee, Ali Jahanian:
Cost-Effective and Practical Countermeasure against the Template Side Channel Attack. 22-27 - Milad Salimian, Ali Jahanian:
Analysis of Geometrical Parameters for Remote Side-Channel Attacks on Multi-Tenant FPGAs. 28-35 - Hamidreza Yazdanpanah, Mahdi Azizi
, Seyed Morteza Pournaghi:
A Secure and Improved Authentication Scheme for Heterogeneous Wireless Sensor Networks in the Internet of Things Environment. 36-43 - Saeed Zarbi, Seyed Amir Mortazavi, Pedram Salehpour:
Security Analysis of an Efficient Authentication Scheme for Vehicular Ad Hoc Networks. 44-47 - Zahra Moti, Sattar Hashemi, Amir Namavar Jahromi:
A Deep Learning-based Malware Hunting Technique to Handle Imbalanced Data. 48-53 - Elnaz Ebadi, Habib Yajam, Mohammad Ali Akhaee:
Improvements on Easypaysy: The Bitcoin's Layer-2 Accounts Protocol. 54-59 - S. Sadegh Mousavi:
Detecting Disk Sectors Data Types Using Hidden Markov Model. 60-64 - Hayyan Hasan, Behrouz Tork Ladani
, Bahman Zamani:
Enhancing Monkey to trigger malicious payloads in Android malware. 65-72 - Amir Ajorlou, Aliazam Abbasfar:
An Optimized Structure of State Channel Network to Improve Scalability of Blockchain Algorithms. 73-76 - Tayebe Abazar, Peyman Masjedi, Mohammad Taheri
:
A Binary Relevance Adaptive Model-Selection for Ensemble Steganalysis. 77-81 - Ali Hadipour, Raheleh Afifi:
Advantages and disadvantages of using cryptography in steganography. 88-94 - Parvin Rastegari:
On the Security of Some Recently Proposed Certificateless Signcryption Schemes. 95-100

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.