Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/iscisc/iscisc2021.bht:"
@inproceedings{DBLP:conf/iscisc/AbdollahiMS21, author = {Sina Abdollahi and Javad Mohajeri and Mahmoud Salmasizadeh}, title = {Highly Efficient and Revocable {CP-ABE} with Outsourcing Decryption for IoT}, booktitle = {18th International {ISC} Conference on Information Security and Cryptology, {ISCISC} 2021, Isfahan, Iran, Islamic Republic of, September 1-2, 2021}, pages = {81--88}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISCISC53448.2021.9720469}, doi = {10.1109/ISCISC53448.2021.9720469}, timestamp = {Tue, 08 Mar 2022 17:56:51 +0100}, biburl = {https://dblp.org/rec/conf/iscisc/AbdollahiMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/AzadmaneshGA21, author = {Maryam Azadmanesh and Behrouz Shahgholi Ghahfarokhi and Maede Ashouri{-}Talouki}, title = {A White-Box Generator Membership Inference Attack Against Generative Models}, booktitle = {18th International {ISC} Conference on Information Security and Cryptology, {ISCISC} 2021, Isfahan, Iran, Islamic Republic of, September 1-2, 2021}, pages = {13--17}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISCISC53448.2021.9720436}, doi = {10.1109/ISCISC53448.2021.9720436}, timestamp = {Tue, 08 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscisc/AzadmaneshGA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/DeebHLZ21, author = {Hasan Deeb and Hayyan Hasan and Behrouz Tork Ladani and Bahman Zamani}, title = {A machine learning approach for detecting and categorizing evasion sources in Android malware}, booktitle = {18th International {ISC} Conference on Information Security and Cryptology, {ISCISC} 2021, Isfahan, Iran, Islamic Republic of, September 1-2, 2021}, pages = {28--34}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISCISC53448.2021.9720476}, doi = {10.1109/ISCISC53448.2021.9720476}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscisc/DeebHLZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/HemmatiH21, author = {Mojtaba Hemmati and Mohammad Ali Hadavi}, title = {Using Deep Reinforcement Learning to Evade Web Application Firewalls}, booktitle = {18th International {ISC} Conference on Information Security and Cryptology, {ISCISC} 2021, Isfahan, Iran, Islamic Republic of, September 1-2, 2021}, pages = {35--41}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISCISC53448.2021.9720473}, doi = {10.1109/ISCISC53448.2021.9720473}, timestamp = {Tue, 08 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscisc/HemmatiH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/KhalesiA21, author = {Akram Khalesi and Zahra Ahmadian}, title = {Integral Analysis of Saturnin Using Bit-Based Division Property}, booktitle = {18th International {ISC} Conference on Information Security and Cryptology, {ISCISC} 2021, Isfahan, Iran, Islamic Republic of, September 1-2, 2021}, pages = {63--67}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISCISC53448.2021.9720461}, doi = {10.1109/ISCISC53448.2021.9720461}, timestamp = {Tue, 08 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscisc/KhalesiA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/KhosraviE21, author = {Ali Khosravi and Taraneh Eghlidos}, title = {On Relaxation of Simon's Algorithm}, booktitle = {18th International {ISC} Conference on Information Security and Cryptology, {ISCISC} 2021, Isfahan, Iran, Islamic Republic of, September 1-2, 2021}, pages = {50--56}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISCISC53448.2021.9720441}, doi = {10.1109/ISCISC53448.2021.9720441}, timestamp = {Tue, 08 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscisc/KhosraviE21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/MirzaieA21, author = {Mansooreh Mirzaie and Maryam Nooraei Abadeh}, title = {A Trust-Based Vulnerability Analysis in Signed Social Networks}, booktitle = {18th International {ISC} Conference on Information Security and Cryptology, {ISCISC} 2021, Isfahan, Iran, Islamic Republic of, September 1-2, 2021}, pages = {23--27}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISCISC53448.2021.9720314}, doi = {10.1109/ISCISC53448.2021.9720314}, timestamp = {Tue, 08 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscisc/MirzaieA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/MirzamohammadiA21, author = {Omid Mirzamohammadi and Alireza Aghabagherloo and Javad Mohajeri and Mahmoud Salmasizadeh and Mohammad Reza Aref}, title = {Analysis and Improvement of the {SPACF} Scheme in Vehicular Ad-hoc Networks}, booktitle = {18th International {ISC} Conference on Information Security and Cryptology, {ISCISC} 2021, Isfahan, Iran, Islamic Republic of, September 1-2, 2021}, pages = {68--74}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISCISC53448.2021.9720470}, doi = {10.1109/ISCISC53448.2021.9720470}, timestamp = {Tue, 08 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscisc/MirzamohammadiA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/NarimaniAH21, author = {Pouya Narimani and Mohammad Ali Akhaee and Seyedamin Habibi}, title = {Side-Channel based Disassembler for {AVR} Micro-Controllers using Convolutional Neural Networks}, booktitle = {18th International {ISC} Conference on Information Security and Cryptology, {ISCISC} 2021, Isfahan, Iran, Islamic Republic of, September 1-2, 2021}, pages = {75--80}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISCISC53448.2021.9720466}, doi = {10.1109/ISCISC53448.2021.9720466}, timestamp = {Mon, 30 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/NarimaniAH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/RasouliT21, author = {Faeze Rasouli and Mohammad Taheri}, title = {A Perfect Recovery for Fragile Watermarking by Hamming Code on Distributed Pixels}, booktitle = {18th International {ISC} Conference on Information Security and Cryptology, {ISCISC} 2021, Isfahan, Iran, Islamic Republic of, September 1-2, 2021}, pages = {18--22}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISCISC53448.2021.9720465}, doi = {10.1109/ISCISC53448.2021.9720465}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscisc/RasouliT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/RastegariK21, author = {Parvin Rastegari and Mojtaba Khalili}, title = {Cryptanalysis and Improvement of an Access Control Protocol for Wireless Body Area Networks}, booktitle = {18th International {ISC} Conference on Information Security and Cryptology, {ISCISC} 2021, Isfahan, Iran, Islamic Republic of, September 1-2, 2021}, pages = {57--62}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISCISC53448.2021.9720438}, doi = {10.1109/ISCISC53448.2021.9720438}, timestamp = {Tue, 08 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscisc/RastegariK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/SaeidiM21, author = {Mohammad Reza Saeidi and Hamid Mala}, title = {Secure Outsourcing of Boneh-Franklin Identity-Based Encryption Scheme}, booktitle = {18th International {ISC} Conference on Information Security and Cryptology, {ISCISC} 2021, Isfahan, Iran, Islamic Republic of, September 1-2, 2021}, pages = {42--49}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISCISC53448.2021.9720303}, doi = {10.1109/ISCISC53448.2021.9720303}, timestamp = {Tue, 08 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscisc/SaeidiM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/ShahanaghiAST21, author = {Alireza Shahanaghi and Mohammad Ali Akhaee and Saeed Sarreshtedari and Ramin Toosi}, title = {Optimum Group Pixel Matching Strategies for Image Steganography}, booktitle = {18th International {ISC} Conference on Information Security and Cryptology, {ISCISC} 2021, Isfahan, Iran, Islamic Republic of, September 1-2, 2021}, pages = {89--94}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISCISC53448.2021.9720302}, doi = {10.1109/ISCISC53448.2021.9720302}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscisc/ShahanaghiAST21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/TorkiAM21, author = {Omid Torki and Maede Ashouri{-}Talouki and Mojtaba Mahdavi}, title = {Blockchain for steganography: advantages, new algorithms and open challenges}, booktitle = {18th International {ISC} Conference on Information Security and Cryptology, {ISCISC} 2021, Isfahan, Iran, Islamic Republic of, September 1-2, 2021}, pages = {1--5}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISCISC53448.2021.9720480}, doi = {10.1109/ISCISC53448.2021.9720480}, timestamp = {Tue, 08 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscisc/TorkiAM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscisc/ZarezadehM21, author = {Maryam Zarezadeh and Hamid Mala}, title = {Secure Parameterized Multi-Pattern Matching in Multi-Text Owner Setting}, booktitle = {18th International {ISC} Conference on Information Security and Cryptology, {ISCISC} 2021, Isfahan, Iran, Islamic Republic of, September 1-2, 2021}, pages = {6--12}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISCISC53448.2021.9720311}, doi = {10.1109/ISCISC53448.2021.9720311}, timestamp = {Tue, 08 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscisc/ZarezadehM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iscisc/2021, title = {18th International {ISC} Conference on Information Security and Cryptology, {ISCISC} 2021, Isfahan, Iran, Islamic Republic of, September 1-2, 2021}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISCISC53448.2021}, doi = {10.1109/ISCISC53448.2021}, isbn = {978-1-6654-1329-9}, timestamp = {Tue, 08 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscisc/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.