default search action
18th ISCISC 2021: Isfahan, Iran
- 18th International ISC Conference on Information Security and Cryptology, ISCISC 2021, Isfahan, Iran, Islamic Republic of, September 1-2, 2021. IEEE 2021, ISBN 978-1-6654-1329-9
- Omid Torki, Maede Ashouri-Talouki, Mojtaba Mahdavi:
Blockchain for steganography: advantages, new algorithms and open challenges. 1-5 - Maryam Zarezadeh, Hamid Mala:
Secure Parameterized Multi-Pattern Matching in Multi-Text Owner Setting. 6-12 - Maryam Azadmanesh, Behrouz Shahgholi Ghahfarokhi, Maede Ashouri-Talouki:
A White-Box Generator Membership Inference Attack Against Generative Models. 13-17 - Faeze Rasouli, Mohammad Taheri:
A Perfect Recovery for Fragile Watermarking by Hamming Code on Distributed Pixels. 18-22 - Mansooreh Mirzaie, Maryam Nooraei Abadeh:
A Trust-Based Vulnerability Analysis in Signed Social Networks. 23-27 - Hasan Deeb, Hayyan Hasan, Behrouz Tork Ladani, Bahman Zamani:
A machine learning approach for detecting and categorizing evasion sources in Android malware. 28-34 - Mojtaba Hemmati, Mohammad Ali Hadavi:
Using Deep Reinforcement Learning to Evade Web Application Firewalls. 35-41 - Mohammad Reza Saeidi, Hamid Mala:
Secure Outsourcing of Boneh-Franklin Identity-Based Encryption Scheme. 42-49 - Ali Khosravi, Taraneh Eghlidos:
On Relaxation of Simon's Algorithm. 50-56 - Parvin Rastegari, Mojtaba Khalili:
Cryptanalysis and Improvement of an Access Control Protocol for Wireless Body Area Networks. 57-62 - Akram Khalesi, Zahra Ahmadian:
Integral Analysis of Saturnin Using Bit-Based Division Property. 63-67 - Omid Mirzamohammadi, Alireza Aghabagherloo, Javad Mohajeri, Mahmoud Salmasizadeh, Mohammad Reza Aref:
Analysis and Improvement of the SPACF Scheme in Vehicular Ad-hoc Networks. 68-74 - Pouya Narimani, Mohammad Ali Akhaee, Seyedamin Habibi:
Side-Channel based Disassembler for AVR Micro-Controllers using Convolutional Neural Networks. 75-80 - Sina Abdollahi, Javad Mohajeri, Mahmoud Salmasizadeh:
Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT. 81-88 - Alireza Shahanaghi, Mohammad Ali Akhaee, Saeed Sarreshtedari, Ramin Toosi:
Optimum Group Pixel Matching Strategies for Image Steganography. 89-94
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.