default search action
Search dblp for Publications
export results for "toc:db/conf/iscisc/iscisc2013.bht:"
@inproceedings{DBLP:conf/iscisc/AfarinM13, author = {Roza Afarin and Saeed Mozaffari}, title = {Image encryption using genetic algorithm and binary patterns}, booktitle = {10th International {ISC} Conference on Information Security and Cryptology, {ISCISC} 2013, Yazd, Iran, August 29-30, 2013}, pages = {1--5}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISCISC.2013.6767332}, doi = {10.1109/ISCISC.2013.6767332}, timestamp = {Mon, 09 Aug 2021 14:54:02 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/AfarinM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/AfsharizadehM13, author = {Mahsa Afsharizadeh and Majid Mohammadi}, title = {A reversible watermarking prediction based scheme using a new sorting technique}, booktitle = {10th International {ISC} Conference on Information Security and Cryptology, {ISCISC} 2013, Yazd, Iran, August 29-30, 2013}, pages = {1--5}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISCISC.2013.6767347}, doi = {10.1109/ISCISC.2013.6767347}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/AfsharizadehM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/AlavianmehrRHT13, author = {M. A. Alavianmehr and Mehdi Rezaei and Mohammad Sadegh Helfroush and Ashkan Tashk}, title = {A reversible data hiding scheme for video robust against {H.264/AVC} compression}, booktitle = {10th International {ISC} Conference on Information Security and Cryptology, {ISCISC} 2013, Yazd, Iran, August 29-30, 2013}, pages = {1--6}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISCISC.2013.6767333}, doi = {10.1109/ISCISC.2013.6767333}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/AlavianmehrRHT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/AzarianA13, author = {Ahad Azarian and Mahdi Abadi}, title = {On the trade-off between stealth and propagation speed of Internet worms}, booktitle = {10th International {ISC} Conference on Information Security and Cryptology, {ISCISC} 2013, Yazd, Iran, August 29-30, 2013}, pages = {1--6}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISCISC.2013.6767337}, doi = {10.1109/ISCISC.2013.6767337}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/AzarianA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/BakhshandehBA13, author = {Soodeh Bakhshandeh and Fateme Bakhshande and Mahdi Aliyari}, title = {Steganalysis algorithm based on Cellular Automata Transform and Neural Network}, booktitle = {10th International {ISC} Conference on Information Security and Cryptology, {ISCISC} 2013, Yazd, Iran, August 29-30, 2013}, pages = {1--5}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISCISC.2013.6767323}, doi = {10.1109/ISCISC.2013.6767323}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/BakhshandehBA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/BaraniG13, author = {Fatemeh Barani and Sajjad Gerami}, title = {ManetSVM: Dynamic anomaly detection using one-class support vector machine in MANETs}, booktitle = {10th International {ISC} Conference on Information Security and Cryptology, {ISCISC} 2013, Yazd, Iran, August 29-30, 2013}, pages = {1--6}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISCISC.2013.6767325}, doi = {10.1109/ISCISC.2013.6767325}, timestamp = {Mon, 13 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/BaraniG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/BidgolyL13, author = {Amir Jalaly Bidgoly and Behrouz Tork Ladani}, title = {Quantitative verification of beta reputation system using {PRISM} probabilistic model checker}, booktitle = {10th International {ISC} Conference on Information Security and Cryptology, {ISCISC} 2013, Yazd, Iran, August 29-30, 2013}, pages = {1--6}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISCISC.2013.6767336}, doi = {10.1109/ISCISC.2013.6767336}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/BidgolyL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/DaghighDS13, author = {Hassan Daghigh and Somayeh Didari and Fatemeh Seifi Shahpar}, title = {Computing elliptic curve discrete logarithm via lifting}, booktitle = {10th International {ISC} Conference on Information Security and Cryptology, {ISCISC} 2013, Yazd, Iran, August 29-30, 2013}, pages = {1--4}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISCISC.2013.6767331}, doi = {10.1109/ISCISC.2013.6767331}, timestamp = {Mon, 13 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/DaghighDS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/GhasemzadehAP13, author = {Hamzeh Ghasemzadeh and Mohammad Reza Aref and Ali Payandeh}, title = {A novel and low-energy PKC-based key agreement protocol for WSNs}, booktitle = {10th International {ISC} Conference on Information Security and Cryptology, {ISCISC} 2013, Yazd, Iran, August 29-30, 2013}, pages = {1--6}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISCISC.2013.6767321}, doi = {10.1109/ISCISC.2013.6767321}, timestamp = {Mon, 13 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/GhasemzadehAP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/HaghighatKDJ13, author = {Alireza Toroghi Haghighat and Mohammad Ali Kargar and Mohammad Sadeq Dousti and Rasool Jalili}, title = {Minimal assumptions to achieve privacy in e-voting protocols}, booktitle = {10th International {ISC} Conference on Information Security and Cryptology, {ISCISC} 2013, Yazd, Iran, August 29-30, 2013}, pages = {1--5}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISCISC.2013.6767345}, doi = {10.1109/ISCISC.2013.6767345}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/HaghighatKDJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/HakimiFB13, author = {Zahra Hakimi and Karim Faez and Morteza Barati}, title = {An efficient architecture for distributed intrusion detection system}, booktitle = {10th International {ISC} Conference on Information Security and Cryptology, {ISCISC} 2013, Yazd, Iran, August 29-30, 2013}, pages = {1--5}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISCISC.2013.6767356}, doi = {10.1109/ISCISC.2013.6767356}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/HakimiFB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/HeidariG13, author = {Morteza Heidari and Shahrokh Gaemmaghami}, title = {Universal image steganalysis using singular values of {DCT} coefficients}, booktitle = {10th International {ISC} Conference on Information Security and Cryptology, {ISCISC} 2013, Yazd, Iran, August 29-30, 2013}, pages = {1--5}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISCISC.2013.6767340}, doi = {10.1109/ISCISC.2013.6767340}, timestamp = {Tue, 27 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/HeidariG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/HooshmandSA13, author = {Reza Hooshmand and Masoumeh Koochak Shooshtari and Mohammad Reza Aref}, title = {Secret key cryptosystem based on polar codes over Binary Erasure Channel}, booktitle = {10th International {ISC} Conference on Information Security and Cryptology, {ISCISC} 2013, Yazd, Iran, August 29-30, 2013}, pages = {1--6}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISCISC.2013.6767351}, doi = {10.1109/ISCISC.2013.6767351}, timestamp = {Sun, 09 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/HooshmandSA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/Jha13, author = {Sonu Kumar Jha}, title = {Scan based side channel attack on Grain v1}, booktitle = {10th International {ISC} Conference on Information Security and Cryptology, {ISCISC} 2013, Yazd, Iran, August 29-30, 2013}, pages = {1--4}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISCISC.2013.6767320}, doi = {10.1109/ISCISC.2013.6767320}, timestamp = {Mon, 13 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/Jha13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/KhodabakhshiSJR13, author = {Vahid Khodabakhshi and Mahdi Soltani and Rasool Jalili and Mostafa Rezvani}, title = {Chaos-based selective key {(CSK)} Cryptosystem: {A} new direction to secure {VPN}}, booktitle = {10th International {ISC} Conference on Information Security and Cryptology, {ISCISC} 2013, Yazd, Iran, August 29-30, 2013}, pages = {1--7}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISCISC.2013.6767355}, doi = {10.1109/ISCISC.2013.6767355}, timestamp = {Mon, 13 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/KhodabakhshiSJR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/LashkaripourB13, author = {Z. Lashkaripour and Abbas Ghaemi Bafghi}, title = {A security analysis tool for web application reinforcement against {SQL} injection attacks (SQLIAs)}, booktitle = {10th International {ISC} Conference on Information Security and Cryptology, {ISCISC} 2013, Yazd, Iran, August 29-30, 2013}, pages = {1--8}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISCISC.2013.6767326}, doi = {10.1109/ISCISC.2013.6767326}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/LashkaripourB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/MalekianH13, author = {Donia Malekian and Mahmoud Reza Hashemi}, title = {An adaptive profile based fraud detection framework for handling concept drift}, booktitle = {10th International {ISC} Conference on Information Security and Cryptology, {ISCISC} 2013, Yazd, Iran, August 29-30, 2013}, pages = {1--6}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISCISC.2013.6767338}, doi = {10.1109/ISCISC.2013.6767338}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/MalekianH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/MardaniS13, author = {Shahla Mardani and Hamid Reza Shahriari}, title = {A new method for occupational fraud detection in process aware information systems}, booktitle = {10th International {ISC} Conference on Information Security and Cryptology, {ISCISC} 2013, Yazd, Iran, August 29-30, 2013}, pages = {1--5}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISCISC.2013.6767348}, doi = {10.1109/ISCISC.2013.6767348}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/MardaniS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/MeamariAS13, author = {Ehsan Meamari and Khadijeh Afhamisisi and Hadi Shahriar Shahhoseini}, title = {An analysis on interactions among secondary user and unknown jammer in cognitive radio systems by fictitious play}, booktitle = {10th International {ISC} Conference on Information Security and Cryptology, {ISCISC} 2013, Yazd, Iran, August 29-30, 2013}, pages = {1--6}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISCISC.2013.6767327}, doi = {10.1109/ISCISC.2013.6767327}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/MeamariAS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/MohajerBSP13, author = {Amin Mohajer and Maryam Bavaghar and Rashin Saboor and Ali Payandeh}, title = {Secure dominating set-based routing protocol in {MANET:} Using reputation}, booktitle = {10th International {ISC} Conference on Information Security and Cryptology, {ISCISC} 2013, Yazd, Iran, August 29-30, 2013}, pages = {1--7}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISCISC.2013.6767346}, doi = {10.1109/ISCISC.2013.6767346}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscisc/MohajerBSP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/Mozaffari13, author = {Hamid Bagheriand Saeed Mozaffari}, title = {Robust reversible data hiding in encrypted image: Using fractal coding approach}, booktitle = {10th International {ISC} Conference on Information Security and Cryptology, {ISCISC} 2013, Yazd, Iran, August 29-30, 2013}, pages = {1--4}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISCISC.2013.6767354}, doi = {10.1109/ISCISC.2013.6767354}, timestamp = {Mon, 13 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/Mozaffari13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/NajdiE13, author = {Shirin Najdi and Afshin Ebrahimi}, title = {Audio fingerprinting based on multi-resolution analysis of Discrete Wavelet Transform}, booktitle = {10th International {ISC} Conference on Information Security and Cryptology, {ISCISC} 2013, Yazd, Iran, August 29-30, 2013}, pages = {1--5}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISCISC.2013.6767349}, doi = {10.1109/ISCISC.2013.6767349}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/NajdiE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/NasiraeeM13, author = {Hassan Nasiraee and Jamshid Bagherzadeh Mohasefi}, title = {A novel three party key establishment scheme in the context of Internet-of-Things}, booktitle = {10th International {ISC} Conference on Information Security and Cryptology, {ISCISC} 2013, Yazd, Iran, August 29-30, 2013}, pages = {1--5}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISCISC.2013.6767322}, doi = {10.1109/ISCISC.2013.6767322}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/NasiraeeM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/PahlavaniP13, author = {Farzad Pahlavani and Ali Pourmohammad}, title = {A block set interpolation technique based Additive-White-Noise robust audio watermarking method}, booktitle = {10th International {ISC} Conference on Information Security and Cryptology, {ISCISC} 2013, Yazd, Iran, August 29-30, 2013}, pages = {1--5}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISCISC.2013.6767330}, doi = {10.1109/ISCISC.2013.6767330}, timestamp = {Mon, 13 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/PahlavaniP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/PourmohseniAA13, author = {Sajad Pourmohseni and Hassan Asgharian and Ahmad Akbari}, title = {Detecting authentication misuse attacks against {SIP} entities}, booktitle = {10th International {ISC} Conference on Information Security and Cryptology, {ISCISC} 2013, Yazd, Iran, August 29-30, 2013}, pages = {1--5}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISCISC.2013.6767324}, doi = {10.1109/ISCISC.2013.6767324}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/PourmohseniAA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/RaghebiH13, author = {Zohre Raghebi and Mahmoud Reza Hashemi}, title = {A new trust evaluation method based on reliability of customer feedback for cloud computing}, booktitle = {10th International {ISC} Conference on Information Security and Cryptology, {ISCISC} 2013, Yazd, Iran, August 29-30, 2013}, pages = {1--6}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISCISC.2013.6767353}, doi = {10.1109/ISCISC.2013.6767353}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/RaghebiH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/RezapourAA13, author = {Taha Yasin Rezapour and Meer Soheil Abolghasemi and Reza Ebrahimi Atani}, title = {A position-based key management scheme for heterogeneous sensor networks}, booktitle = {10th International {ISC} Conference on Information Security and Cryptology, {ISCISC} 2013, Yazd, Iran, August 29-30, 2013}, pages = {1--6}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISCISC.2013.6767350}, doi = {10.1109/ISCISC.2013.6767350}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/RezapourAA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/SalekMA13, author = {Zahra Salek and Fariborz Mousavi Madani and Reza Azmi}, title = {Intrusion detection using neuarl networks trained by differential evaluation algorithm}, booktitle = {10th International {ISC} Conference on Information Security and Cryptology, {ISCISC} 2013, Yazd, Iran, August 29-30, 2013}, pages = {1--6}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISCISC.2013.6767341}, doi = {10.1109/ISCISC.2013.6767341}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/SalekMA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/ShakeriB13, author = {Hassan Shakeri and Abbas Ghaemi Bafghi}, title = {{CATEF:} Confidence-aware trust estimation framework}, booktitle = {10th International {ISC} Conference on Information Security and Cryptology, {ISCISC} 2013, Yazd, Iran, August 29-30, 2013}, pages = {1--6}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISCISC.2013.6767328}, doi = {10.1109/ISCISC.2013.6767328}, timestamp = {Mon, 13 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/ShakeriB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/ShakeriG13, author = {Ehsan Shakeri and Shahrokh Ghaemmaghami}, title = {An efficient feature extraction methodology for blind image steganalysis using contourlet transform and Zernike moments}, booktitle = {10th International {ISC} Conference on Information Security and Cryptology, {ISCISC} 2013, Yazd, Iran, August 29-30, 2013}, pages = {1--6}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISCISC.2013.6767329}, doi = {10.1109/ISCISC.2013.6767329}, timestamp = {Mon, 13 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/ShakeriG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/TolueeAS13, author = {Rahim Toluee and Maryam Rajabzadeh Asaar and Mahmoud Salmasizadeh}, title = {Attribute-based ring signatures: Security analysis and a new construction}, booktitle = {10th International {ISC} Conference on Information Security and Cryptology, {ISCISC} 2013, Yazd, Iran, August 29-30, 2013}, pages = {1--6}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISCISC.2013.6767342}, doi = {10.1109/ISCISC.2013.6767342}, timestamp = {Mon, 13 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/TolueeAS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/TolueeAS13a, author = {Rahim Toluee and Maryam Rajabzadeh Asaar and Mahmoud Salmasizadeh}, title = {A new ring signature scheme}, booktitle = {10th International {ISC} Conference on Information Security and Cryptology, {ISCISC} 2013, Yazd, Iran, August 29-30, 2013}, pages = {1--7}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISCISC.2013.6767343}, doi = {10.1109/ISCISC.2013.6767343}, timestamp = {Mon, 13 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/TolueeAS13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/YajamMMS13, author = {Habib Allah Yajam and Ali Mahmoodi and Javad Mohajeri and Mahmoud Salmasizadeh}, title = {Security analysis of an identity-based mix net}, booktitle = {10th International {ISC} Conference on Information Security and Cryptology, {ISCISC} 2013, Yazd, Iran, August 29-30, 2013}, pages = {1--4}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISCISC.2013.6767339}, doi = {10.1109/ISCISC.2013.6767339}, timestamp = {Mon, 13 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/YajamMMS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/YajamMS13, author = {Habib Allah Yajam and Javad Mohajeri and Mahmoud Salmasizadeh}, title = {Identity based universal re-encryption for mix nets}, booktitle = {10th International {ISC} Conference on Information Security and Cryptology, {ISCISC} 2013, Yazd, Iran, August 29-30, 2013}, pages = {1--5}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISCISC.2013.6767344}, doi = {10.1109/ISCISC.2013.6767344}, timestamp = {Mon, 13 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/YajamMS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/ZarchABM13, author = {Mohammad K. Houri Zarch and Masih Abedini and Mehdi Berenjkoub and Amin Mirhosseini}, title = {An unsupervised anomaly detection engine with an efficient feature set for {AODV}}, booktitle = {10th International {ISC} Conference on Information Security and Cryptology, {ISCISC} 2013, Yazd, Iran, August 29-30, 2013}, pages = {1--6}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISCISC.2013.6767334}, doi = {10.1109/ISCISC.2013.6767334}, timestamp = {Mon, 13 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/ZarchABM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/Zare-MirakabadK13, author = {Mohammad{-}Reza Zare{-}Mirakabad and Fatemeh Kaveh{-}Yazdy and Mohammad Tahmasebi}, title = {Privacy preservation by k-anonymizing Ngrams of time series}, booktitle = {10th International {ISC} Conference on Information Security and Cryptology, {ISCISC} 2013, Yazd, Iran, August 29-30, 2013}, pages = {1--6}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISCISC.2013.6767335}, doi = {10.1109/ISCISC.2013.6767335}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/Zare-MirakabadK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/ZarmehiBA13, author = {Nematollah Zarmehi and Morteza Banagar and Mohammad Ali Akhaee}, title = {Optimum decoder for an additive video watermarking with Laplacian noise in {H.264}}, booktitle = {10th International {ISC} Conference on Information Security and Cryptology, {ISCISC} 2013, Yazd, Iran, August 29-30, 2013}, pages = {1--5}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISCISC.2013.6767352}, doi = {10.1109/ISCISC.2013.6767352}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/ZarmehiBA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iscisc/2013, title = {10th International {ISC} Conference on Information Security and Cryptology, {ISCISC} 2013, Yazd, Iran, August 29-30, 2013}, publisher = {{IEEE}}, year = {2013}, url = {https://ieeexplore.ieee.org/xpl/conhome/6765549/proceeding}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.