


default search action
10th ISCISC 2013: Yazd, Iran
- 10th International ISC Conference on Information Security and Cryptology, ISCISC 2013, Yazd, Iran, August 29-30, 2013. IEEE 2013

- M. A. Alavianmehr, Mehdi Rezaei, Mohammad Sadegh Helfroush, Ashkan Tashk

:
A reversible data hiding scheme for video robust against H.264/AVC compression. 1-6 - Mahsa Afsharizadeh

, Majid Mohammadi:
A reversible watermarking prediction based scheme using a new sorting technique. 1-5 - Rahim Toluee, Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh:

Attribute-based ring signatures: Security analysis and a new construction. 1-6 - Zohre Raghebi, Mahmoud Reza Hashemi

:
A new trust evaluation method based on reliability of customer feedback for cloud computing. 1-6 - Reza Hooshmand, Masoumeh Koochak Shooshtari, Mohammad Reza Aref:

Secret key cryptosystem based on polar codes over Binary Erasure Channel. 1-6 - Zeinab Lashkaripour

, Abbas Ghaemi Bafghi:
A security analysis tool for web application reinforcement against SQL injection attacks (SQLIAs). 1-8 - Nematollah Zarmehi, Morteza Banagar

, Mohammad Ali Akhaee:
Optimum decoder for an additive video watermarking with Laplacian noise in H.264. 1-5 - Sajad Pourmohseni, Hassan Asgharian, Ahmad Akbari

:
Detecting authentication misuse attacks against SIP entities. 1-5 - Donia Malekian, Mahmoud Reza Hashemi

:
An adaptive profile based fraud detection framework for handling concept drift. 1-6 - Hamzeh Ghasemzadeh, Mohammad Reza Aref, Ali Payandeh:

A novel and low-energy PKC-based key agreement protocol for WSNs. 1-6 - Shahla Mardani, Hamid Reza Shahriari

:
A new method for occupational fraud detection in process aware information systems. 1-5 - Shirin Najdi

, Afshin Ebrahimi:
Audio fingerprinting based on multi-resolution analysis of Discrete Wavelet Transform. 1-5 - Farzad Pahlavani, Ali Pourmohammad:

A block set interpolation technique based Additive-White-Noise robust audio watermarking method. 1-5 - Ehsan Meamari, Khadijeh Afhamisisi, Hadi Shahriar Shahhoseini

:
An analysis on interactions among secondary user and unknown jammer in cognitive radio systems by fictitious play. 1-6 - Vahid Khodabakhshi, Mahdi Soltani, Rasool Jalili, Mostafa Rezvani:

Chaos-based selective key (CSK) Cryptosystem: A new direction to secure VPN. 1-7 - Hassan Shakeri, Abbas Ghaemi Bafghi:

CATEF: Confidence-aware trust estimation framework. 1-6 - Hassan Daghigh, Somayeh Didari, Fatemeh Seifi Shahpar:

Computing elliptic curve discrete logarithm via lifting. 1-4 - Alireza Toroghi Haghighat, Mohammad Ali Kargar, Mohammad Sadeq Dousti

, Rasool Jalili:
Minimal assumptions to achieve privacy in e-voting protocols. 1-5 - Soodeh Bakhshandeh, Fateme Bakhshande, Mahdi Aliyari Shoorehdeli

:
Steganalysis algorithm based on Cellular Automata Transform and Neural Network. 1-5 - Roza Afarin, Saeed Mozaffari:

Image encryption using genetic algorithm and binary patterns. 1-5 - Mohammad K. Houri Zarch, Masih Abedini, Mehdi Berenjkoub, Amin Mirhosseini:

An unsupervised anomaly detection engine with an efficient feature set for AODV. 1-6 - Habib Allah Yajam, Ali Mahmoodi, Javad Mohajeri, Mahmoud Salmasizadeh:

Security analysis of an identity-based mix net. 1-4 - Morteza Heidari

, Shahrokh Gaemmaghami:
Universal image steganalysis using singular values of DCT coefficients. 1-5 - Fatemeh Barani, Sajjad Gerami:

ManetSVM: Dynamic anomaly detection using one-class support vector machine in MANETs. 1-6 - Zahra Salek

, Fariborz Mousavi Madani, Reza Azmi
:
Intrusion detection using neuarl networks trained by differential evaluation algorithm. 1-6 - Ehsan Shakeri, Shahrokh Ghaemmaghami:

An efficient feature extraction methodology for blind image steganalysis using contourlet transform and Zernike moments. 1-6 - Ahad Azarian, Mahdi Abadi

:
On the trade-off between stealth and propagation speed of Internet worms. 1-6 - Hassan Nasiraee

, Jamshid Bagherzadeh Mohasefi:
A novel three party key establishment scheme in the context of Internet-of-Things. 1-5 - Zahra Hakimi, Karim Faez

, Morteza Barati:
An efficient architecture for distributed intrusion detection system. 1-5 - Amir Jalaly Bidgoly

, Behrouz Tork Ladani
:
Quantitative verification of beta reputation system using PRISM probabilistic model checker. 1-6 - Sonu Kumar Jha:

Scan based side channel attack on Grain v1. 1-4 - Mohammad-Reza Zare-Mirakabad, Fatemeh Kaveh-Yazdy

, Mohammad Tahmasebi
:
Privacy preservation by k-anonymizing Ngrams of time series. 1-6 - Hamid Bagheriand Saeed Mozaffari:

Robust reversible data hiding in encrypted image: Using fractal coding approach. 1-4 - Taha Yasin Rezapour, Meer Soheil Abolghasemi, Reza Ebrahimi Atani

:
A position-based key management scheme for heterogeneous sensor networks. 1-6 - Habib Allah Yajam, Javad Mohajeri, Mahmoud Salmasizadeh:

Identity based universal re-encryption for mix nets. 1-5 - Amin Mohajer

, Maryam Bavaghar, Rashin Saboor, Ali Payandeh:
Secure dominating set-based routing protocol in MANET: Using reputation. 1-7 - Rahim Toluee, Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh:

A new ring signature scheme. 1-7

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














