Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/iscisc/iscisc2019.bht:"
@inproceedings{DBLP:conf/iscisc/AghaeeA19, author = {Hadi Aghaee and Bahareh Akhbari}, editor = {Abbas Ghaemi Bafghi and Haleh Amintoosi}, title = {Classical-Quantum Multiple Access Wiretap Channel}, booktitle = {16th International {ISC} (Iranian Society of Cryptology) Conference on Information Security and Cryptology, {ISCISC} 2019, Mashhad, Iran, August 28-29, 2019}, pages = {99--103}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISCISC48546.2019.8985142}, doi = {10.1109/ISCISC48546.2019.8985142}, timestamp = {Tue, 11 Feb 2020 10:16:49 +0100}, biburl = {https://dblp.org/rec/conf/iscisc/AghaeeA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/AmiryousefiA19, author = {Hamid Amiryousefi and Zahra Ahmadian}, editor = {Abbas Ghaemi Bafghi and Haleh Amintoosi}, title = {Cryptanalysis of SP\({}^{\mbox{2}}\)DAS and 3PDA, Two Data Aggregation Schemes for Smart Grid}, booktitle = {16th International {ISC} (Iranian Society of Cryptology) Conference on Information Security and Cryptology, {ISCISC} 2019, Mashhad, Iran, August 28-29, 2019}, pages = {45--48}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISCISC48546.2019.8985140}, doi = {10.1109/ISCISC48546.2019.8985140}, timestamp = {Tue, 11 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscisc/AmiryousefiA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/AshtariSA19, author = {Amir Ashtari and Ahmad Shabani and Bijan Alizadeh}, editor = {Abbas Ghaemi Bafghi and Haleh Amintoosi}, title = {A New {RF-PUF} Based Authentication of Internet of Things Using Random Forest Classification}, booktitle = {16th International {ISC} (Iranian Society of Cryptology) Conference on Information Security and Cryptology, {ISCISC} 2019, Mashhad, Iran, August 28-29, 2019}, pages = {21--26}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISCISC48546.2019.8985161}, doi = {10.1109/ISCISC48546.2019.8985161}, timestamp = {Tue, 11 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscisc/AshtariSA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/AttarianH19, author = {Reyhane Attarian and Sattar Hashemi}, editor = {Abbas Ghaemi Bafghi and Haleh Amintoosi}, title = {Investigating the Streaming Algorithms Usage in Website Fingerprinting Attack Against Tor Privacy Enhancing Technology}, booktitle = {16th International {ISC} (Iranian Society of Cryptology) Conference on Information Security and Cryptology, {ISCISC} 2019, Mashhad, Iran, August 28-29, 2019}, pages = {33--38}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISCISC48546.2019.8985162}, doi = {10.1109/ISCISC48546.2019.8985162}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscisc/AttarianH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/BabamirK19, author = {Faezeh Sadat Babamir and Murvet Kirci}, editor = {Abbas Ghaemi Bafghi and Haleh Amintoosi}, title = {Improvement of Digest Based Authentication Scheme for Biometric Verification}, booktitle = {16th International {ISC} (Iranian Society of Cryptology) Conference on Information Security and Cryptology, {ISCISC} 2019, Mashhad, Iran, August 28-29, 2019}, pages = {9--14}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISCISC48546.2019.8985143}, doi = {10.1109/ISCISC48546.2019.8985143}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/BabamirK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/BahraniB19, author = {Ala Bahrani and Amir Jalaly Bidgly}, editor = {Abbas Ghaemi Bafghi and Haleh Amintoosi}, title = {Ransomware detection using process mining and classification algorithms}, booktitle = {16th International {ISC} (Iranian Society of Cryptology) Conference on Information Security and Cryptology, {ISCISC} 2019, Mashhad, Iran, August 28-29, 2019}, pages = {73--77}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISCISC48546.2019.8985149}, doi = {10.1109/ISCISC48546.2019.8985149}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscisc/BahraniB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/BalouchestaniMH19, author = {Arian Balouchestani and Mojtaba Mahdavi and Yeganeh Hallaj and Delaram Javdani}, editor = {Abbas Ghaemi Bafghi and Haleh Amintoosi}, title = {{SANUB:} {A} new method for Sharing and Analyzing News Using Blockchain}, booktitle = {16th International {ISC} (Iranian Society of Cryptology) Conference on Information Security and Cryptology, {ISCISC} 2019, Mashhad, Iran, August 28-29, 2019}, pages = {139--143}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISCISC48546.2019.8985152}, doi = {10.1109/ISCISC48546.2019.8985152}, timestamp = {Tue, 11 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscisc/BalouchestaniMH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/ChegenizadehAMA19, author = {Mostafa Chegenizadeh and Mohammad Ali and Javad Mohajeri and Mohammad Reza Aref}, editor = {Abbas Ghaemi Bafghi and Haleh Amintoosi}, title = {An Anonymous Attribute-based Access Control System Supporting Access Structure Update}, booktitle = {16th International {ISC} (Iranian Society of Cryptology) Conference on Information Security and Cryptology, {ISCISC} 2019, Mashhad, Iran, August 28-29, 2019}, pages = {85--91}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISCISC48546.2019.8985155}, doi = {10.1109/ISCISC48546.2019.8985155}, timestamp = {Fri, 19 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscisc/ChegenizadehAMA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/DehnaviSR19, author = {Seyed Mojtaba Dehnavi and M. R. Mirzaee Shamsabad and Akbar Mahmoodi Rishakani}, editor = {Abbas Ghaemi Bafghi and Haleh Amintoosi}, title = {Lightweight Involutive Components for Symmetric Cryptography}, booktitle = {16th International {ISC} (Iranian Society of Cryptology) Conference on Information Security and Cryptology, {ISCISC} 2019, Mashhad, Iran, August 28-29, 2019}, pages = {61--66}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISCISC48546.2019.8985148}, doi = {10.1109/ISCISC48546.2019.8985148}, timestamp = {Tue, 11 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscisc/DehnaviSR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/FarhadiBM19, author = {Majid Farhadi and Hamideh Bypour and Reza Mortazavi}, editor = {Abbas Ghaemi Bafghi and Haleh Amintoosi}, title = {An efficient secret sharing-based storage system for cloud-based IoTs}, booktitle = {16th International {ISC} (Iranian Society of Cryptology) Conference on Information Security and Cryptology, {ISCISC} 2019, Mashhad, Iran, August 28-29, 2019}, pages = {122--127}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISCISC48546.2019.8985146}, doi = {10.1109/ISCISC48546.2019.8985146}, timestamp = {Tue, 11 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscisc/FarhadiBM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/GhaemiD19, author = {Alireza Ghaemi and Habibollah Danyali}, editor = {Abbas Ghaemi Bafghi and Haleh Amintoosi}, title = {CRT-Based Robust Data Hiding Method by Extracting Features in {DCT} Domain}, booktitle = {16th International {ISC} (Iranian Society of Cryptology) Conference on Information Security and Cryptology, {ISCISC} 2019, Mashhad, Iran, August 28-29, 2019}, pages = {134--138}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISCISC48546.2019.8985163}, doi = {10.1109/ISCISC48546.2019.8985163}, timestamp = {Tue, 11 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscisc/GhaemiD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/ModiriMS19, author = {Mohammad Mahdi Modiri and Javad Mohajeri and Mahmoud Salmasizadeh}, editor = {Abbas Ghaemi Bafghi and Haleh Amintoosi}, title = {{GSLHA:} Group-based Secure Lightweight Handover Authentication Protocol for {M2M} Communication}, booktitle = {16th International {ISC} (Iranian Society of Cryptology) Conference on Information Security and Cryptology, {ISCISC} 2019, Mashhad, Iran, August 28-29, 2019}, pages = {15--20}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISCISC48546.2019.8985145}, doi = {10.1109/ISCISC48546.2019.8985145}, timestamp = {Tue, 11 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscisc/ModiriMS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/NejatifarH19, author = {Abbas Nejatifar and Mohammad Ali Hadavi}, editor = {Abbas Ghaemi Bafghi and Haleh Amintoosi}, title = {Threat Extraction in IoT-Based Systems Focusing on Smart Cities}, booktitle = {16th International {ISC} (Iranian Society of Cryptology) Conference on Information Security and Cryptology, {ISCISC} 2019, Mashhad, Iran, August 28-29, 2019}, pages = {92--98}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISCISC48546.2019.8985147}, doi = {10.1109/ISCISC48546.2019.8985147}, timestamp = {Tue, 11 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscisc/NejatifarH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/NoorbehbahaniRS19, author = {Fakhroddin Noorbehbahani and Farzaneh Rasouli and Mohammad Saberi}, editor = {Abbas Ghaemi Bafghi and Haleh Amintoosi}, title = {Analysis of Machine Learning Techniques for Ransomware Detection}, booktitle = {16th International {ISC} (Iranian Society of Cryptology) Conference on Information Security and Cryptology, {ISCISC} 2019, Mashhad, Iran, August 28-29, 2019}, pages = {128--133}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISCISC48546.2019.8985139}, doi = {10.1109/ISCISC48546.2019.8985139}, timestamp = {Tue, 11 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscisc/NoorbehbahaniRS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/RahnamaBEA19, author = {Abbas Rahnama and Mohammad Beheshti{-}Atashgah and Taraneh Eghlidos and Mohammad Reza Aref}, editor = {Abbas Ghaemi Bafghi and Haleh Amintoosi}, title = {An Ultra-Lightweight {RFID} Mutual Authentication Protocol}, booktitle = {16th International {ISC} (Iranian Society of Cryptology) Conference on Information Security and Cryptology, {ISCISC} 2019, Mashhad, Iran, August 28-29, 2019}, pages = {27--32}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISCISC48546.2019.8985164}, doi = {10.1109/ISCISC48546.2019.8985164}, timestamp = {Tue, 11 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscisc/RahnamaBEA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/RahnamaBEA19a, author = {Abbas Rahnama and Mohammad Beheshti{-}Atashgah and Taraneh Eghlidos and Mohammad Reza Aref}, editor = {Abbas Ghaemi Bafghi and Haleh Amintoosi}, title = {A Lightweight Anonymous Authentication Protocol For IoT Wireless Sensor Networks}, booktitle = {16th International {ISC} (Iranian Society of Cryptology) Conference on Information Security and Cryptology, {ISCISC} 2019, Mashhad, Iran, August 28-29, 2019}, pages = {39--44}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISCISC48546.2019.8985154}, doi = {10.1109/ISCISC48546.2019.8985154}, timestamp = {Tue, 11 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscisc/RahnamaBEA19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/RastegariD19, author = {Parvin Rastegari and Mohammad Dakhilalian}, editor = {Abbas Ghaemi Bafghi and Haleh Amintoosi}, title = {Cryptanalysis of a Certificateless Signcryption Scheme}, booktitle = {16th International {ISC} (Iranian Society of Cryptology) Conference on Information Security and Cryptology, {ISCISC} 2019, Mashhad, Iran, August 28-29, 2019}, pages = {67--71}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISCISC48546.2019.8985158}, doi = {10.1109/ISCISC48546.2019.8985158}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/RastegariD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/RezaeiFF19, author = {Aref Rezaei and Leili Farzinvash and Ali Farzamnia}, editor = {Abbas Ghaemi Bafghi and Haleh Amintoosi}, title = {A Novel Steganography Algorithm using Edge Detection and {MPC} Algorithm}, booktitle = {16th International {ISC} (Iranian Society of Cryptology) Conference on Information Security and Cryptology, {ISCISC} 2019, Mashhad, Iran, August 28-29, 2019}, pages = {49--54}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISCISC48546.2019.8985150}, doi = {10.1109/ISCISC48546.2019.8985150}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/RezaeiFF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/SaffarM19, author = {Zahra Saffar and Siamak Mohammadi}, editor = {Abbas Ghaemi Bafghi and Haleh Amintoosi}, title = {Fault tolerant non-linear techniques for scalar multiplication in {ECC}}, booktitle = {16th International {ISC} (Iranian Society of Cryptology) Conference on Information Security and Cryptology, {ISCISC} 2019, Mashhad, Iran, August 28-29, 2019}, pages = {104--113}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISCISC48546.2019.8985153}, doi = {10.1109/ISCISC48546.2019.8985153}, timestamp = {Tue, 11 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscisc/SaffarM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/ShayanNH19, author = {Shayan Mehranpoor and Naser Mohammadzadeh and Hossein Gharaee}, editor = {Abbas Ghaemi Bafghi and Haleh Amintoosi}, title = {IoT-Based Anonymous Authentication Protocol Using Biometrics in Smart Homes}, booktitle = {16th International {ISC} (Iranian Society of Cryptology) Conference on Information Security and Cryptology, {ISCISC} 2019, Mashhad, Iran, August 28-29, 2019}, pages = {114--121}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISCISC48546.2019.8985159}, doi = {10.1109/ISCISC48546.2019.8985159}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/ShayanNH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/SheidaniE19, author = {Sorour Sheidani and Ziba Eslami}, editor = {Abbas Ghaemi Bafghi and Haleh Amintoosi}, title = {Blind Multipurpose Image Watermarking Based on Secret Sharing}, booktitle = {16th International {ISC} (Iranian Society of Cryptology) Conference on Information Security and Cryptology, {ISCISC} 2019, Mashhad, Iran, August 28-29, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISCISC48546.2019.8985160}, doi = {10.1109/ISCISC48546.2019.8985160}, timestamp = {Tue, 11 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscisc/SheidaniE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/ZolfaghariSK19, author = {Majid Zolfaghari and Solmaz Salimi and Mehdi Kharrazi}, editor = {Abbas Ghaemi Bafghi and Haleh Amintoosi}, title = {Inferring {API} Correct Usage Rules: {A} Tree-based Approach}, booktitle = {16th International {ISC} (Iranian Society of Cryptology) Conference on Information Security and Cryptology, {ISCISC} 2019, Mashhad, Iran, August 28-29, 2019}, pages = {78--84}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISCISC48546.2019.8985157}, doi = {10.1109/ISCISC48546.2019.8985157}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/ZolfaghariSK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iscisc/2019, editor = {Abbas Ghaemi Bafghi and Haleh Amintoosi}, title = {16th International {ISC} (Iranian Society of Cryptology) Conference on Information Security and Cryptology, {ISCISC} 2019, Mashhad, Iran, August 28-29, 2019}, publisher = {{IEEE}}, year = {2019}, url = {https://ieeexplore.ieee.org/xpl/conhome/8966935/proceeding}, isbn = {978-1-7281-4374-3}, timestamp = {Tue, 11 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscisc/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.