Search dblp for Publications

export results for "toc:db/conf/iscisc/iscisc2016.bht:"

 download as .bib file

@inproceedings{DBLP:conf/iscisc/AhangarkolaeiNA16,
  author       = {Mohammad Zare Ahangarkolaei and
                  Seyed Reza Hoseini Najarkolaei and
                  Siavash Ahmadi and
                  Mohammad Reza Aref},
  title        = {Zero correlation linear attack on reduced round Piccolo-80},
  booktitle    = {13th International Iranian Society of Cryptology Conference on Information
                  Security and Cryptology, {ISCISC} 2016, Tehran, Iran, September 7-8,
                  2016},
  pages        = {66--71},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISCISC.2016.7736453},
  doi          = {10.1109/ISCISC.2016.7736453},
  timestamp    = {Mon, 09 Aug 2021 14:54:02 +0200},
  biburl       = {https://dblp.org/rec/conf/iscisc/AhangarkolaeiNA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/AhmadiG16,
  author       = {Mohsen Ahmadi and
                  Behrouz Shahgholi Ghahfarokhi},
  title        = {Preserving privacy in location based mobile coupon systems using anonymous
                  authentication scheme},
  booktitle    = {13th International Iranian Society of Cryptology Conference on Information
                  Security and Cryptology, {ISCISC} 2016, Tehran, Iran, September 7-8,
                  2016},
  pages        = {60--65},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISCISC.2016.7736452},
  doi          = {10.1109/ISCISC.2016.7736452},
  timestamp    = {Mon, 13 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscisc/AhmadiG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/AhmadianS16,
  author       = {Mohammad Mehdi Ahmadian and
                  Hamid Reza Shahriari},
  title        = {2entFOX: {A} framework for high survivable ransomwares detection},
  booktitle    = {13th International Iranian Society of Cryptology Conference on Information
                  Security and Cryptology, {ISCISC} 2016, Tehran, Iran, September 7-8,
                  2016},
  pages        = {79--84},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISCISC.2016.7736455},
  doi          = {10.1109/ISCISC.2016.7736455},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscisc/AhmadianS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/ArastehAM16,
  author       = {Sima Arasteh and
                  Seyed Farhad Aghili and
                  Hamid Mala},
  title        = {A new lightweight authentication and key agreement protocol for Internet
                  of Things},
  booktitle    = {13th International Iranian Society of Cryptology Conference on Information
                  Security and Cryptology, {ISCISC} 2016, Tehran, Iran, September 7-8,
                  2016},
  pages        = {52--59},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISCISC.2016.7736451},
  doi          = {10.1109/ISCISC.2016.7736451},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscisc/ArastehAM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/Bagheri0EP16,
  author       = {Khadijeh Bagheri and
                  Mohammad{-}Reza Sadeghi and
                  Taraneh Eghlidos and
                  Daniel Panario},
  title        = {A secret key encryption scheme based on 1-level {QC-LDPC} lattices},
  booktitle    = {13th International Iranian Society of Cryptology Conference on Information
                  Security and Cryptology, {ISCISC} 2016, Tehran, Iran, September 7-8,
                  2016},
  pages        = {20--25},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISCISC.2016.7736446},
  doi          = {10.1109/ISCISC.2016.7736446},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscisc/Bagheri0EP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/DehnaviSR16,
  author       = {Seyed Mojtaba Dehnavi and
                  M. R. Mirzaee Shamsabad and
                  Akbar Mahmoodi Rishakani},
  title        = {Construction of new S-boxes via permuting the inverse mapping on special
                  subsets},
  booktitle    = {13th International Iranian Society of Cryptology Conference on Information
                  Security and Cryptology, {ISCISC} 2016, Tehran, Iran, September 7-8,
                  2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISCISC.2016.7736443},
  doi          = {10.1109/ISCISC.2016.7736443},
  timestamp    = {Mon, 13 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscisc/DehnaviSR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/Deypir16,
  author       = {Mahmood Deypir},
  title        = {A new approach for effective malware detection in Android-based devices},
  booktitle    = {13th International Iranian Society of Cryptology Conference on Information
                  Security and Cryptology, {ISCISC} 2016, Tehran, Iran, September 7-8,
                  2016},
  pages        = {112--116},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISCISC.2016.7736461},
  doi          = {10.1109/ISCISC.2016.7736461},
  timestamp    = {Mon, 13 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscisc/Deypir16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/GhalejughiA16,
  author       = {Milad Ghalejughi and
                  Mohammad Ali Akhaee},
  title        = {Video watermarking in the {DT-CWT} domain using hyperbolic function},
  booktitle    = {13th International Iranian Society of Cryptology Conference on Information
                  Security and Cryptology, {ISCISC} 2016, Tehran, Iran, September 7-8,
                  2016},
  pages        = {97--100},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISCISC.2016.7736458},
  doi          = {10.1109/ISCISC.2016.7736458},
  timestamp    = {Mon, 13 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscisc/GhalejughiA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/HatefiMB16,
  author       = {Zahra Hatefi and
                  Mojtaba Mahdavi and
                  Pegah Nikbakht Bideh},
  title        = {Feature extraction for detection of watermarking algorithm},
  booktitle    = {13th International Iranian Society of Cryptology Conference on Information
                  Security and Cryptology, {ISCISC} 2016, Tehran, Iran, September 7-8,
                  2016},
  pages        = {32--37},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISCISC.2016.7736448},
  doi          = {10.1109/ISCISC.2016.7736448},
  timestamp    = {Mon, 13 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscisc/HatefiMB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/HosseiniM16,
  author       = {Samira Hosseini and
                  Mojtaba Mahdavi},
  title        = {Counterfeiting attack on adjusted expanded-bit multiscale quantization-based
                  semi-fragile watermarking technique},
  booktitle    = {13th International Iranian Society of Cryptology Conference on Information
                  Security and Cryptology, {ISCISC} 2016, Tehran, Iran, September 7-8,
                  2016},
  pages        = {13--19},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISCISC.2016.7736445},
  doi          = {10.1109/ISCISC.2016.7736445},
  timestamp    = {Mon, 13 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscisc/HosseiniM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/MortazaviSD16,
  author       = {Amir S. Mortazavi and
                  Mahmoud Salmasizadeh and
                  Amir Daneshgar},
  title        = {{FMNV} continuous non-malleable encoding scheme is more efficient
                  than believed},
  booktitle    = {13th International Iranian Society of Cryptology Conference on Information
                  Security and Cryptology, {ISCISC} 2016, Tehran, Iran, September 7-8,
                  2016},
  pages        = {72--78},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISCISC.2016.7736454},
  doi          = {10.1109/ISCISC.2016.7736454},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscisc/MortazaviSD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/NajarkolaeiAAA16,
  author       = {Seyed Reza Hoseini Najarkolaei and
                  Mohammad Zare Ahangarkolaei and
                  Siavash Ahmadi and
                  Mohammad Reza Aref},
  title        = {Biclique cryptanalysis of Twine-128},
  booktitle    = {13th International Iranian Society of Cryptology Conference on Information
                  Security and Cryptology, {ISCISC} 2016, Tehran, Iran, September 7-8,
                  2016},
  pages        = {46--51},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISCISC.2016.7736450},
  doi          = {10.1109/ISCISC.2016.7736450},
  timestamp    = {Mon, 13 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscisc/NajarkolaeiAAA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/PooryousefA16,
  author       = {Shahrooz Pooryousef and
                  Morteza Amini},
  title        = {Fine-grained access control for hybrid mobile applications in Android
                  using restricted paths},
  booktitle    = {13th International Iranian Society of Cryptology Conference on Information
                  Security and Cryptology, {ISCISC} 2016, Tehran, Iran, September 7-8,
                  2016},
  pages        = {85--90},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISCISC.2016.7736456},
  doi          = {10.1109/ISCISC.2016.7736456},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscisc/PooryousefA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/PourS16,
  author       = {Morteza Safaei Pour and
                  Mahmoud Salmasizadeh},
  title        = {A new {CPA} resistant software implementation for symmetric ciphers
                  with smoothed power consumption},
  booktitle    = {13th International Iranian Society of Cryptology Conference on Information
                  Security and Cryptology, {ISCISC} 2016, Tehran, Iran, September 7-8,
                  2016},
  pages        = {38--45},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISCISC.2016.7736449},
  doi          = {10.1109/ISCISC.2016.7736449},
  timestamp    = {Mon, 13 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscisc/PourS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/RastegariB16,
  author       = {Parvin Rastegari and
                  Mehdi Berenjkoub},
  title        = {An improved certificateless signcryption scheme},
  booktitle    = {13th International Iranian Society of Cryptology Conference on Information
                  Security and Cryptology, {ISCISC} 2016, Tehran, Iran, September 7-8,
                  2016},
  pages        = {106--111},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISCISC.2016.7736460},
  doi          = {10.1109/ISCISC.2016.7736460},
  timestamp    = {Mon, 13 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscisc/RastegariB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/SadrHaghighiK16,
  author       = {Sogand SadrHaghighi and
                  Siavash Khorsandi},
  title        = {An identity-based digital signature scheme to detect pollution attacks
                  in intra-session network coding},
  booktitle    = {13th International Iranian Society of Cryptology Conference on Information
                  Security and Cryptology, {ISCISC} 2016, Tehran, Iran, September 7-8,
                  2016},
  pages        = {7--12},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISCISC.2016.7736444},
  doi          = {10.1109/ISCISC.2016.7736444},
  timestamp    = {Mon, 13 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscisc/SadrHaghighiK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/SattariA16,
  author       = {Ali Sattari and
                  Mohammad Ali Akhaee},
  title        = {Spread spectrum watermarking robust to silk vocoder using sub-optimal
                  detectors},
  booktitle    = {13th International Iranian Society of Cryptology Conference on Information
                  Security and Cryptology, {ISCISC} 2016, Tehran, Iran, September 7-8,
                  2016},
  pages        = {117--122},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISCISC.2016.7736462},
  doi          = {10.1109/ISCISC.2016.7736462},
  timestamp    = {Mon, 13 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscisc/SattariA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/YajamAA16,
  author       = {Habib Allah Yajam and
                  Younes Karimi Ahmadabadi and
                  Mohammad Ali Akhaee},
  title        = {PapiaPass: Sentence-based passwords using dependency trees},
  booktitle    = {13th International Iranian Society of Cryptology Conference on Information
                  Security and Cryptology, {ISCISC} 2016, Tehran, Iran, September 7-8,
                  2016},
  pages        = {91--96},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISCISC.2016.7736457},
  doi          = {10.1109/ISCISC.2016.7736457},
  timestamp    = {Fri, 19 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscisc/YajamAA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/ZamanZadehSJ16,
  author       = {Sharareh Zamanzadeh and
                  Shahram Shahabi and
                  Ali Jahanian},
  title        = {Security improvement of {FPGA} configuration file against the reverse
                  engineering attack},
  booktitle    = {13th International Iranian Society of Cryptology Conference on Information
                  Security and Cryptology, {ISCISC} 2016, Tehran, Iran, September 7-8,
                  2016},
  pages        = {101--105},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISCISC.2016.7736459},
  doi          = {10.1109/ISCISC.2016.7736459},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscisc/ZamanZadehSJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/ZargarNJ16,
  author       = {Abolfazl Zargar and
                  Alireza Nowroozi and
                  Rasool Jalili},
  title        = {{XABA:} {A} zero-knowledge anomaly-based behavioral analysis method
                  to detect insider threats},
  booktitle    = {13th International Iranian Society of Cryptology Conference on Information
                  Security and Cryptology, {ISCISC} 2016, Tehran, Iran, September 7-8,
                  2016},
  pages        = {26--31},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISCISC.2016.7736447},
  doi          = {10.1109/ISCISC.2016.7736447},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscisc/ZargarNJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iscisc/2016,
  title        = {13th International Iranian Society of Cryptology Conference on Information
                  Security and Cryptology, {ISCISC} 2016, Tehran, Iran, September 7-8,
                  2016},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7604981/proceeding},
  isbn         = {978-1-5090-3949-4},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscisc/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics