Search dblp for Publications

export results for "toc:db/conf/iscisc/iscisc2021.bht:"

 download as .bib file

@inproceedings{DBLP:conf/iscisc/AbdollahiMS21,
  author       = {Sina Abdollahi and
                  Javad Mohajeri and
                  Mahmoud Salmasizadeh},
  title        = {Highly Efficient and Revocable {CP-ABE} with Outsourcing Decryption
                  for IoT},
  booktitle    = {18th International {ISC} Conference on Information Security and Cryptology,
                  {ISCISC} 2021, Isfahan, Iran, Islamic Republic of, September 1-2,
                  2021},
  pages        = {81--88},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ISCISC53448.2021.9720469},
  doi          = {10.1109/ISCISC53448.2021.9720469},
  timestamp    = {Tue, 08 Mar 2022 17:56:51 +0100},
  biburl       = {https://dblp.org/rec/conf/iscisc/AbdollahiMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/AzadmaneshGA21,
  author       = {Maryam Azadmanesh and
                  Behrouz Shahgholi Ghahfarokhi and
                  Maede Ashouri{-}Talouki},
  title        = {A White-Box Generator Membership Inference Attack Against Generative
                  Models},
  booktitle    = {18th International {ISC} Conference on Information Security and Cryptology,
                  {ISCISC} 2021, Isfahan, Iran, Islamic Republic of, September 1-2,
                  2021},
  pages        = {13--17},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ISCISC53448.2021.9720436},
  doi          = {10.1109/ISCISC53448.2021.9720436},
  timestamp    = {Tue, 08 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscisc/AzadmaneshGA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/DeebHLZ21,
  author       = {Hasan Deeb and
                  Hayyan Hasan and
                  Behrouz Tork Ladani and
                  Bahman Zamani},
  title        = {A machine learning approach for detecting and categorizing evasion
                  sources in Android malware},
  booktitle    = {18th International {ISC} Conference on Information Security and Cryptology,
                  {ISCISC} 2021, Isfahan, Iran, Islamic Republic of, September 1-2,
                  2021},
  pages        = {28--34},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ISCISC53448.2021.9720476},
  doi          = {10.1109/ISCISC53448.2021.9720476},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscisc/DeebHLZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/HemmatiH21,
  author       = {Mojtaba Hemmati and
                  Mohammad Ali Hadavi},
  title        = {Using Deep Reinforcement Learning to Evade Web Application Firewalls},
  booktitle    = {18th International {ISC} Conference on Information Security and Cryptology,
                  {ISCISC} 2021, Isfahan, Iran, Islamic Republic of, September 1-2,
                  2021},
  pages        = {35--41},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ISCISC53448.2021.9720473},
  doi          = {10.1109/ISCISC53448.2021.9720473},
  timestamp    = {Tue, 08 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscisc/HemmatiH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/KhalesiA21,
  author       = {Akram Khalesi and
                  Zahra Ahmadian},
  title        = {Integral Analysis of Saturnin Using Bit-Based Division Property},
  booktitle    = {18th International {ISC} Conference on Information Security and Cryptology,
                  {ISCISC} 2021, Isfahan, Iran, Islamic Republic of, September 1-2,
                  2021},
  pages        = {63--67},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ISCISC53448.2021.9720461},
  doi          = {10.1109/ISCISC53448.2021.9720461},
  timestamp    = {Tue, 08 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscisc/KhalesiA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/KhosraviE21,
  author       = {Ali Khosravi and
                  Taraneh Eghlidos},
  title        = {On Relaxation of Simon's Algorithm},
  booktitle    = {18th International {ISC} Conference on Information Security and Cryptology,
                  {ISCISC} 2021, Isfahan, Iran, Islamic Republic of, September 1-2,
                  2021},
  pages        = {50--56},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ISCISC53448.2021.9720441},
  doi          = {10.1109/ISCISC53448.2021.9720441},
  timestamp    = {Tue, 08 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscisc/KhosraviE21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/MirzaieA21,
  author       = {Mansooreh Mirzaie and
                  Maryam Nooraei Abadeh},
  title        = {A Trust-Based Vulnerability Analysis in Signed Social Networks},
  booktitle    = {18th International {ISC} Conference on Information Security and Cryptology,
                  {ISCISC} 2021, Isfahan, Iran, Islamic Republic of, September 1-2,
                  2021},
  pages        = {23--27},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ISCISC53448.2021.9720314},
  doi          = {10.1109/ISCISC53448.2021.9720314},
  timestamp    = {Tue, 08 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscisc/MirzaieA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/MirzamohammadiA21,
  author       = {Omid Mirzamohammadi and
                  Alireza Aghabagherloo and
                  Javad Mohajeri and
                  Mahmoud Salmasizadeh and
                  Mohammad Reza Aref},
  title        = {Analysis and Improvement of the {SPACF} Scheme in Vehicular Ad-hoc
                  Networks},
  booktitle    = {18th International {ISC} Conference on Information Security and Cryptology,
                  {ISCISC} 2021, Isfahan, Iran, Islamic Republic of, September 1-2,
                  2021},
  pages        = {68--74},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ISCISC53448.2021.9720470},
  doi          = {10.1109/ISCISC53448.2021.9720470},
  timestamp    = {Tue, 08 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscisc/MirzamohammadiA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/NarimaniAH21,
  author       = {Pouya Narimani and
                  Mohammad Ali Akhaee and
                  Seyedamin Habibi},
  title        = {Side-Channel based Disassembler for {AVR} Micro-Controllers using
                  Convolutional Neural Networks},
  booktitle    = {18th International {ISC} Conference on Information Security and Cryptology,
                  {ISCISC} 2021, Isfahan, Iran, Islamic Republic of, September 1-2,
                  2021},
  pages        = {75--80},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ISCISC53448.2021.9720466},
  doi          = {10.1109/ISCISC53448.2021.9720466},
  timestamp    = {Mon, 30 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscisc/NarimaniAH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/RasouliT21,
  author       = {Faeze Rasouli and
                  Mohammad Taheri},
  title        = {A Perfect Recovery for Fragile Watermarking by Hamming Code on Distributed
                  Pixels},
  booktitle    = {18th International {ISC} Conference on Information Security and Cryptology,
                  {ISCISC} 2021, Isfahan, Iran, Islamic Republic of, September 1-2,
                  2021},
  pages        = {18--22},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ISCISC53448.2021.9720465},
  doi          = {10.1109/ISCISC53448.2021.9720465},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscisc/RasouliT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/RastegariK21,
  author       = {Parvin Rastegari and
                  Mojtaba Khalili},
  title        = {Cryptanalysis and Improvement of an Access Control Protocol for Wireless
                  Body Area Networks},
  booktitle    = {18th International {ISC} Conference on Information Security and Cryptology,
                  {ISCISC} 2021, Isfahan, Iran, Islamic Republic of, September 1-2,
                  2021},
  pages        = {57--62},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ISCISC53448.2021.9720438},
  doi          = {10.1109/ISCISC53448.2021.9720438},
  timestamp    = {Tue, 08 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscisc/RastegariK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/SaeidiM21,
  author       = {Mohammad Reza Saeidi and
                  Hamid Mala},
  title        = {Secure Outsourcing of Boneh-Franklin Identity-Based Encryption Scheme},
  booktitle    = {18th International {ISC} Conference on Information Security and Cryptology,
                  {ISCISC} 2021, Isfahan, Iran, Islamic Republic of, September 1-2,
                  2021},
  pages        = {42--49},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ISCISC53448.2021.9720303},
  doi          = {10.1109/ISCISC53448.2021.9720303},
  timestamp    = {Tue, 08 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscisc/SaeidiM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/ShahanaghiAST21,
  author       = {Alireza Shahanaghi and
                  Mohammad Ali Akhaee and
                  Saeed Sarreshtedari and
                  Ramin Toosi},
  title        = {Optimum Group Pixel Matching Strategies for Image Steganography},
  booktitle    = {18th International {ISC} Conference on Information Security and Cryptology,
                  {ISCISC} 2021, Isfahan, Iran, Islamic Republic of, September 1-2,
                  2021},
  pages        = {89--94},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ISCISC53448.2021.9720302},
  doi          = {10.1109/ISCISC53448.2021.9720302},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscisc/ShahanaghiAST21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/TorkiAM21,
  author       = {Omid Torki and
                  Maede Ashouri{-}Talouki and
                  Mojtaba Mahdavi},
  title        = {Blockchain for steganography: advantages, new algorithms and open
                  challenges},
  booktitle    = {18th International {ISC} Conference on Information Security and Cryptology,
                  {ISCISC} 2021, Isfahan, Iran, Islamic Republic of, September 1-2,
                  2021},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ISCISC53448.2021.9720480},
  doi          = {10.1109/ISCISC53448.2021.9720480},
  timestamp    = {Tue, 08 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscisc/TorkiAM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/ZarezadehM21,
  author       = {Maryam Zarezadeh and
                  Hamid Mala},
  title        = {Secure Parameterized Multi-Pattern Matching in Multi-Text Owner Setting},
  booktitle    = {18th International {ISC} Conference on Information Security and Cryptology,
                  {ISCISC} 2021, Isfahan, Iran, Islamic Republic of, September 1-2,
                  2021},
  pages        = {6--12},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ISCISC53448.2021.9720311},
  doi          = {10.1109/ISCISC53448.2021.9720311},
  timestamp    = {Tue, 08 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscisc/ZarezadehM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iscisc/2021,
  title        = {18th International {ISC} Conference on Information Security and Cryptology,
                  {ISCISC} 2021, Isfahan, Iran, Islamic Republic of, September 1-2,
                  2021},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ISCISC53448.2021},
  doi          = {10.1109/ISCISC53448.2021},
  isbn         = {978-1-6654-1329-9},
  timestamp    = {Tue, 08 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscisc/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics