


default search action
13th ISCISC 2016: Tehran, Iran
- 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology, ISCISC 2016, Tehran, Iran, September 7-8, 2016. IEEE 2016, ISBN 978-1-5090-3949-4

- Sogand SadrHaghighi

, Siavash Khorsandi:
An identity-based digital signature scheme to detect pollution attacks in intra-session network coding. 7-12 - Samira Hosseini, Mojtaba Mahdavi:

Counterfeiting attack on adjusted expanded-bit multiscale quantization-based semi-fragile watermarking technique. 13-19 - Khadijeh Bagheri

, Mohammad-Reza Sadeghi
, Taraneh Eghlidos, Daniel Panario
:
A secret key encryption scheme based on 1-level QC-LDPC lattices. 20-25 - Abolfazl Zargar, Alireza Nowroozi

, Rasool Jalili:
XABA: A zero-knowledge anomaly-based behavioral analysis method to detect insider threats. 26-31 - Zahra Hatefi, Mojtaba Mahdavi, Pegah Nikbakht Bideh:

Feature extraction for detection of watermarking algorithm. 32-37 - Morteza Safaei Pour, Mahmoud Salmasizadeh:

A new CPA resistant software implementation for symmetric ciphers with smoothed power consumption. 38-45 - Seyed Reza Hoseini Najarkolaei, Mohammad Zare Ahangarkolaei, Siavash Ahmadi, Mohammad Reza Aref:

Biclique cryptanalysis of Twine-128. 46-51 - Sima Arasteh, Seyed Farhad Aghili

, Hamid Mala:
A new lightweight authentication and key agreement protocol for Internet of Things. 52-59 - Mohsen Ahmadi, Behrouz Shahgholi Ghahfarokhi:

Preserving privacy in location based mobile coupon systems using anonymous authentication scheme. 60-65 - Mohammad Zare Ahangarkolaei, Seyed Reza Hoseini Najarkolaei, Siavash Ahmadi, Mohammad Reza Aref:

Zero correlation linear attack on reduced round Piccolo-80. 66-71 - Amir S. Mortazavi, Mahmoud Salmasizadeh, Amir Daneshgar

:
FMNV continuous non-malleable encoding scheme is more efficient than believed. 72-78 - Mohammad Mehdi Ahmadian, Hamid Reza Shahriari

:
2entFOX: A framework for high survivable ransomwares detection. 79-84 - Shahrooz Pooryousef, Morteza Amini

:
Fine-grained access control for hybrid mobile applications in Android using restricted paths. 85-90 - Habib Allah Yajam, Younes Karimi Ahmadabadi

, Mohammad Ali Akhaee:
PapiaPass: Sentence-based passwords using dependency trees. 91-96 - Milad Ghalejughi, Mohammad Ali Akhaee:

Video watermarking in the DT-CWT domain using hyperbolic function. 97-100 - Sharareh Zamanzadeh, Shahram Shahabi, Ali Jahanian

:
Security improvement of FPGA configuration file against the reverse engineering attack. 101-105 - Parvin Rastegari, Mehdi Berenjkoub:

An improved certificateless signcryption scheme. 106-111 - Mahmood Deypir

:
A new approach for effective malware detection in Android-based devices. 112-116 - Ali Sattari, Mohammad Ali Akhaee:

Spread spectrum watermarking robust to silk vocoder using sub-optimal detectors. 117-122

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














