


default search action
17th ISCISC 2020: Tehran, Iran
- 17th International ISC Conference on Information Security and Cryptology, ISCISC 2020, Tehran, Iran, September 9-10, 2020. IEEE 2020, ISBN 978-1-7281-8569-9

- Mohammad Erfan Mazaheri, Farhad Taheri

, Siavash Bayat Sarmadi:
Lurking Eyes: A Method to Detect Side-Channel Attacks on JavaScript and WebAssembly. 1-6 - Shahrooz Janbaz, Rahim Asghari, Bagher Bagherpour, Ali Zaghian:

A fast non-interactive publicly verifiable secret sharing scheme. 7-13 - Mahsa Monem Moharrer, Sadegh Dorri Nogoorani

:
A Decentralized App Store Using the Blockchain Technology. 14-21 - Farshideh Kordi, Hamed Hossein-Talaee, Ali Jahanian:

Cost-Effective and Practical Countermeasure against the Template Side Channel Attack. 22-27 - Milad Salimian, Ali Jahanian:

Analysis of Geometrical Parameters for Remote Side-Channel Attacks on Multi-Tenant FPGAs. 28-35 - Hamidreza Yazdanpanah, Mahdi Azizi

, Seyed Morteza Pournaghi:
A Secure and Improved Authentication Scheme for Heterogeneous Wireless Sensor Networks in the Internet of Things Environment. 36-43 - Saeed Zarbi, Seyed Amir Mortazavi, Pedram Salehpour:

Security Analysis of an Efficient Authentication Scheme for Vehicular Ad Hoc Networks. 44-47 - Zahra Moti, Sattar Hashemi, Amir Namavar Jahromi:

A Deep Learning-based Malware Hunting Technique to Handle Imbalanced Data. 48-53 - Elnaz Ebadi, Habib Yajam, Mohammad Ali Akhaee:

Improvements on Easypaysy: The Bitcoin's Layer-2 Accounts Protocol. 54-59 - S. Sadegh Mousavi

:
Detecting Disk Sectors Data Types Using Hidden Markov Model. 60-64 - Hayyan Hasan

, Behrouz Tork Ladani
, Bahman Zamani:
Enhancing Monkey to trigger malicious payloads in Android malware. 65-72 - Amir Ajorlou, Aliazam Abbasfar:

An Optimized Structure of State Channel Network to Improve Scalability of Blockchain Algorithms. 73-76 - Tayebe Abazar, Peyman Masjedi, Mohammad Taheri

:
A Binary Relevance Adaptive Model-Selection for Ensemble Steganalysis. 77-81 - Ali Hadipour, Raheleh Afifi:

Advantages and disadvantages of using cryptography in steganography. 88-94 - Parvin Rastegari:

On the Security of Some Recently Proposed Certificateless Signcryption Schemes. 95-100

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














