default search action
Search dblp for Publications
export results for "toc:db/conf/iscisc/iscisc2016.bht:"
@inproceedings{DBLP:conf/iscisc/AhangarkolaeiNA16, author = {Mohammad Zare Ahangarkolaei and Seyed Reza Hoseini Najarkolaei and Siavash Ahmadi and Mohammad Reza Aref}, title = {Zero correlation linear attack on reduced round Piccolo-80}, booktitle = {13th International Iranian Society of Cryptology Conference on Information Security and Cryptology, {ISCISC} 2016, Tehran, Iran, September 7-8, 2016}, pages = {66--71}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISCISC.2016.7736453}, doi = {10.1109/ISCISC.2016.7736453}, timestamp = {Mon, 09 Aug 2021 14:54:02 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/AhangarkolaeiNA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/AhmadiG16, author = {Mohsen Ahmadi and Behrouz Shahgholi Ghahfarokhi}, title = {Preserving privacy in location based mobile coupon systems using anonymous authentication scheme}, booktitle = {13th International Iranian Society of Cryptology Conference on Information Security and Cryptology, {ISCISC} 2016, Tehran, Iran, September 7-8, 2016}, pages = {60--65}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISCISC.2016.7736452}, doi = {10.1109/ISCISC.2016.7736452}, timestamp = {Mon, 13 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/AhmadiG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/AhmadianS16, author = {Mohammad Mehdi Ahmadian and Hamid Reza Shahriari}, title = {2entFOX: {A} framework for high survivable ransomwares detection}, booktitle = {13th International Iranian Society of Cryptology Conference on Information Security and Cryptology, {ISCISC} 2016, Tehran, Iran, September 7-8, 2016}, pages = {79--84}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISCISC.2016.7736455}, doi = {10.1109/ISCISC.2016.7736455}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/AhmadianS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/ArastehAM16, author = {Sima Arasteh and Seyed Farhad Aghili and Hamid Mala}, title = {A new lightweight authentication and key agreement protocol for Internet of Things}, booktitle = {13th International Iranian Society of Cryptology Conference on Information Security and Cryptology, {ISCISC} 2016, Tehran, Iran, September 7-8, 2016}, pages = {52--59}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISCISC.2016.7736451}, doi = {10.1109/ISCISC.2016.7736451}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/ArastehAM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/Bagheri0EP16, author = {Khadijeh Bagheri and Mohammad{-}Reza Sadeghi and Taraneh Eghlidos and Daniel Panario}, title = {A secret key encryption scheme based on 1-level {QC-LDPC} lattices}, booktitle = {13th International Iranian Society of Cryptology Conference on Information Security and Cryptology, {ISCISC} 2016, Tehran, Iran, September 7-8, 2016}, pages = {20--25}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISCISC.2016.7736446}, doi = {10.1109/ISCISC.2016.7736446}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/Bagheri0EP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/DehnaviSR16, author = {Seyed Mojtaba Dehnavi and M. R. Mirzaee Shamsabad and Akbar Mahmoodi Rishakani}, title = {Construction of new S-boxes via permuting the inverse mapping on special subsets}, booktitle = {13th International Iranian Society of Cryptology Conference on Information Security and Cryptology, {ISCISC} 2016, Tehran, Iran, September 7-8, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISCISC.2016.7736443}, doi = {10.1109/ISCISC.2016.7736443}, timestamp = {Mon, 13 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/DehnaviSR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/Deypir16, author = {Mahmood Deypir}, title = {A new approach for effective malware detection in Android-based devices}, booktitle = {13th International Iranian Society of Cryptology Conference on Information Security and Cryptology, {ISCISC} 2016, Tehran, Iran, September 7-8, 2016}, pages = {112--116}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISCISC.2016.7736461}, doi = {10.1109/ISCISC.2016.7736461}, timestamp = {Mon, 13 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/Deypir16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/GhalejughiA16, author = {Milad Ghalejughi and Mohammad Ali Akhaee}, title = {Video watermarking in the {DT-CWT} domain using hyperbolic function}, booktitle = {13th International Iranian Society of Cryptology Conference on Information Security and Cryptology, {ISCISC} 2016, Tehran, Iran, September 7-8, 2016}, pages = {97--100}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISCISC.2016.7736458}, doi = {10.1109/ISCISC.2016.7736458}, timestamp = {Mon, 13 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/GhalejughiA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/HatefiMB16, author = {Zahra Hatefi and Mojtaba Mahdavi and Pegah Nikbakht Bideh}, title = {Feature extraction for detection of watermarking algorithm}, booktitle = {13th International Iranian Society of Cryptology Conference on Information Security and Cryptology, {ISCISC} 2016, Tehran, Iran, September 7-8, 2016}, pages = {32--37}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISCISC.2016.7736448}, doi = {10.1109/ISCISC.2016.7736448}, timestamp = {Mon, 13 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/HatefiMB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/HosseiniM16, author = {Samira Hosseini and Mojtaba Mahdavi}, title = {Counterfeiting attack on adjusted expanded-bit multiscale quantization-based semi-fragile watermarking technique}, booktitle = {13th International Iranian Society of Cryptology Conference on Information Security and Cryptology, {ISCISC} 2016, Tehran, Iran, September 7-8, 2016}, pages = {13--19}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISCISC.2016.7736445}, doi = {10.1109/ISCISC.2016.7736445}, timestamp = {Mon, 13 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/HosseiniM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/MortazaviSD16, author = {Amir S. Mortazavi and Mahmoud Salmasizadeh and Amir Daneshgar}, title = {{FMNV} continuous non-malleable encoding scheme is more efficient than believed}, booktitle = {13th International Iranian Society of Cryptology Conference on Information Security and Cryptology, {ISCISC} 2016, Tehran, Iran, September 7-8, 2016}, pages = {72--78}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISCISC.2016.7736454}, doi = {10.1109/ISCISC.2016.7736454}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/MortazaviSD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/NajarkolaeiAAA16, author = {Seyed Reza Hoseini Najarkolaei and Mohammad Zare Ahangarkolaei and Siavash Ahmadi and Mohammad Reza Aref}, title = {Biclique cryptanalysis of Twine-128}, booktitle = {13th International Iranian Society of Cryptology Conference on Information Security and Cryptology, {ISCISC} 2016, Tehran, Iran, September 7-8, 2016}, pages = {46--51}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISCISC.2016.7736450}, doi = {10.1109/ISCISC.2016.7736450}, timestamp = {Mon, 13 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/NajarkolaeiAAA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/PooryousefA16, author = {Shahrooz Pooryousef and Morteza Amini}, title = {Fine-grained access control for hybrid mobile applications in Android using restricted paths}, booktitle = {13th International Iranian Society of Cryptology Conference on Information Security and Cryptology, {ISCISC} 2016, Tehran, Iran, September 7-8, 2016}, pages = {85--90}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISCISC.2016.7736456}, doi = {10.1109/ISCISC.2016.7736456}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/PooryousefA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/PourS16, author = {Morteza Safaei Pour and Mahmoud Salmasizadeh}, title = {A new {CPA} resistant software implementation for symmetric ciphers with smoothed power consumption}, booktitle = {13th International Iranian Society of Cryptology Conference on Information Security and Cryptology, {ISCISC} 2016, Tehran, Iran, September 7-8, 2016}, pages = {38--45}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISCISC.2016.7736449}, doi = {10.1109/ISCISC.2016.7736449}, timestamp = {Mon, 13 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/PourS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/RastegariB16, author = {Parvin Rastegari and Mehdi Berenjkoub}, title = {An improved certificateless signcryption scheme}, booktitle = {13th International Iranian Society of Cryptology Conference on Information Security and Cryptology, {ISCISC} 2016, Tehran, Iran, September 7-8, 2016}, pages = {106--111}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISCISC.2016.7736460}, doi = {10.1109/ISCISC.2016.7736460}, timestamp = {Mon, 13 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/RastegariB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/SadrHaghighiK16, author = {Sogand SadrHaghighi and Siavash Khorsandi}, title = {An identity-based digital signature scheme to detect pollution attacks in intra-session network coding}, booktitle = {13th International Iranian Society of Cryptology Conference on Information Security and Cryptology, {ISCISC} 2016, Tehran, Iran, September 7-8, 2016}, pages = {7--12}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISCISC.2016.7736444}, doi = {10.1109/ISCISC.2016.7736444}, timestamp = {Mon, 13 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/SadrHaghighiK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/SattariA16, author = {Ali Sattari and Mohammad Ali Akhaee}, title = {Spread spectrum watermarking robust to silk vocoder using sub-optimal detectors}, booktitle = {13th International Iranian Society of Cryptology Conference on Information Security and Cryptology, {ISCISC} 2016, Tehran, Iran, September 7-8, 2016}, pages = {117--122}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISCISC.2016.7736462}, doi = {10.1109/ISCISC.2016.7736462}, timestamp = {Mon, 13 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/SattariA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/YajamAA16, author = {Habib Allah Yajam and Younes Karimi Ahmadabadi and Mohammad Ali Akhaee}, title = {PapiaPass: Sentence-based passwords using dependency trees}, booktitle = {13th International Iranian Society of Cryptology Conference on Information Security and Cryptology, {ISCISC} 2016, Tehran, Iran, September 7-8, 2016}, pages = {91--96}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISCISC.2016.7736457}, doi = {10.1109/ISCISC.2016.7736457}, timestamp = {Fri, 19 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscisc/YajamAA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/ZamanZadehSJ16, author = {Sharareh Zamanzadeh and Shahram Shahabi and Ali Jahanian}, title = {Security improvement of {FPGA} configuration file against the reverse engineering attack}, booktitle = {13th International Iranian Society of Cryptology Conference on Information Security and Cryptology, {ISCISC} 2016, Tehran, Iran, September 7-8, 2016}, pages = {101--105}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISCISC.2016.7736459}, doi = {10.1109/ISCISC.2016.7736459}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/ZamanZadehSJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/ZargarNJ16, author = {Abolfazl Zargar and Alireza Nowroozi and Rasool Jalili}, title = {{XABA:} {A} zero-knowledge anomaly-based behavioral analysis method to detect insider threats}, booktitle = {13th International Iranian Society of Cryptology Conference on Information Security and Cryptology, {ISCISC} 2016, Tehran, Iran, September 7-8, 2016}, pages = {26--31}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISCISC.2016.7736447}, doi = {10.1109/ISCISC.2016.7736447}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/ZargarNJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iscisc/2016, title = {13th International Iranian Society of Cryptology Conference on Information Security and Cryptology, {ISCISC} 2016, Tehran, Iran, September 7-8, 2016}, publisher = {{IEEE}}, year = {2016}, url = {https://ieeexplore.ieee.org/xpl/conhome/7604981/proceeding}, isbn = {978-1-5090-3949-4}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.