Search dblp for Publications

export results for "toc:db/conf/iscisc/iscisc2013.bht:"

 download as .bib file

@inproceedings{DBLP:conf/iscisc/AfarinM13,
  author       = {Roza Afarin and
                  Saeed Mozaffari},
  title        = {Image encryption using genetic algorithm and binary patterns},
  booktitle    = {10th International {ISC} Conference on Information Security and Cryptology,
                  {ISCISC} 2013, Yazd, Iran, August 29-30, 2013},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISCISC.2013.6767332},
  doi          = {10.1109/ISCISC.2013.6767332},
  timestamp    = {Mon, 09 Aug 2021 14:54:02 +0200},
  biburl       = {https://dblp.org/rec/conf/iscisc/AfarinM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/AfsharizadehM13,
  author       = {Mahsa Afsharizadeh and
                  Majid Mohammadi},
  title        = {A reversible watermarking prediction based scheme using a new sorting
                  technique},
  booktitle    = {10th International {ISC} Conference on Information Security and Cryptology,
                  {ISCISC} 2013, Yazd, Iran, August 29-30, 2013},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISCISC.2013.6767347},
  doi          = {10.1109/ISCISC.2013.6767347},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscisc/AfsharizadehM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/AlavianmehrRHT13,
  author       = {M. A. Alavianmehr and
                  Mehdi Rezaei and
                  Mohammad Sadegh Helfroush and
                  Ashkan Tashk},
  title        = {A reversible data hiding scheme for video robust against {H.264/AVC}
                  compression},
  booktitle    = {10th International {ISC} Conference on Information Security and Cryptology,
                  {ISCISC} 2013, Yazd, Iran, August 29-30, 2013},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISCISC.2013.6767333},
  doi          = {10.1109/ISCISC.2013.6767333},
  timestamp    = {Wed, 16 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscisc/AlavianmehrRHT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/AzarianA13,
  author       = {Ahad Azarian and
                  Mahdi Abadi},
  title        = {On the trade-off between stealth and propagation speed of Internet
                  worms},
  booktitle    = {10th International {ISC} Conference on Information Security and Cryptology,
                  {ISCISC} 2013, Yazd, Iran, August 29-30, 2013},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISCISC.2013.6767337},
  doi          = {10.1109/ISCISC.2013.6767337},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscisc/AzarianA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/BakhshandehBA13,
  author       = {Soodeh Bakhshandeh and
                  Fateme Bakhshande and
                  Mahdi Aliyari},
  title        = {Steganalysis algorithm based on Cellular Automata Transform and Neural
                  Network},
  booktitle    = {10th International {ISC} Conference on Information Security and Cryptology,
                  {ISCISC} 2013, Yazd, Iran, August 29-30, 2013},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISCISC.2013.6767323},
  doi          = {10.1109/ISCISC.2013.6767323},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscisc/BakhshandehBA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/BaraniG13,
  author       = {Fatemeh Barani and
                  Sajjad Gerami},
  title        = {ManetSVM: Dynamic anomaly detection using one-class support vector
                  machine in MANETs},
  booktitle    = {10th International {ISC} Conference on Information Security and Cryptology,
                  {ISCISC} 2013, Yazd, Iran, August 29-30, 2013},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISCISC.2013.6767325},
  doi          = {10.1109/ISCISC.2013.6767325},
  timestamp    = {Mon, 13 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscisc/BaraniG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/BidgolyL13,
  author       = {Amir Jalaly Bidgoly and
                  Behrouz Tork Ladani},
  title        = {Quantitative verification of beta reputation system using {PRISM}
                  probabilistic model checker},
  booktitle    = {10th International {ISC} Conference on Information Security and Cryptology,
                  {ISCISC} 2013, Yazd, Iran, August 29-30, 2013},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISCISC.2013.6767336},
  doi          = {10.1109/ISCISC.2013.6767336},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscisc/BidgolyL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/DaghighDS13,
  author       = {Hassan Daghigh and
                  Somayeh Didari and
                  Fatemeh Seifi Shahpar},
  title        = {Computing elliptic curve discrete logarithm via lifting},
  booktitle    = {10th International {ISC} Conference on Information Security and Cryptology,
                  {ISCISC} 2013, Yazd, Iran, August 29-30, 2013},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISCISC.2013.6767331},
  doi          = {10.1109/ISCISC.2013.6767331},
  timestamp    = {Mon, 13 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscisc/DaghighDS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/GhasemzadehAP13,
  author       = {Hamzeh Ghasemzadeh and
                  Mohammad Reza Aref and
                  Ali Payandeh},
  title        = {A novel and low-energy PKC-based key agreement protocol for WSNs},
  booktitle    = {10th International {ISC} Conference on Information Security and Cryptology,
                  {ISCISC} 2013, Yazd, Iran, August 29-30, 2013},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISCISC.2013.6767321},
  doi          = {10.1109/ISCISC.2013.6767321},
  timestamp    = {Mon, 13 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscisc/GhasemzadehAP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/HaghighatKDJ13,
  author       = {Alireza Toroghi Haghighat and
                  Mohammad Ali Kargar and
                  Mohammad Sadeq Dousti and
                  Rasool Jalili},
  title        = {Minimal assumptions to achieve privacy in e-voting protocols},
  booktitle    = {10th International {ISC} Conference on Information Security and Cryptology,
                  {ISCISC} 2013, Yazd, Iran, August 29-30, 2013},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISCISC.2013.6767345},
  doi          = {10.1109/ISCISC.2013.6767345},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscisc/HaghighatKDJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/HakimiFB13,
  author       = {Zahra Hakimi and
                  Karim Faez and
                  Morteza Barati},
  title        = {An efficient architecture for distributed intrusion detection system},
  booktitle    = {10th International {ISC} Conference on Information Security and Cryptology,
                  {ISCISC} 2013, Yazd, Iran, August 29-30, 2013},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISCISC.2013.6767356},
  doi          = {10.1109/ISCISC.2013.6767356},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscisc/HakimiFB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/HeidariG13,
  author       = {Morteza Heidari and
                  Shahrokh Gaemmaghami},
  title        = {Universal image steganalysis using singular values of {DCT} coefficients},
  booktitle    = {10th International {ISC} Conference on Information Security and Cryptology,
                  {ISCISC} 2013, Yazd, Iran, August 29-30, 2013},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISCISC.2013.6767340},
  doi          = {10.1109/ISCISC.2013.6767340},
  timestamp    = {Tue, 27 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscisc/HeidariG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/HooshmandSA13,
  author       = {Reza Hooshmand and
                  Masoumeh Koochak Shooshtari and
                  Mohammad Reza Aref},
  title        = {Secret key cryptosystem based on polar codes over Binary Erasure Channel},
  booktitle    = {10th International {ISC} Conference on Information Security and Cryptology,
                  {ISCISC} 2013, Yazd, Iran, August 29-30, 2013},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISCISC.2013.6767351},
  doi          = {10.1109/ISCISC.2013.6767351},
  timestamp    = {Sun, 09 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscisc/HooshmandSA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/Jha13,
  author       = {Sonu Kumar Jha},
  title        = {Scan based side channel attack on Grain v1},
  booktitle    = {10th International {ISC} Conference on Information Security and Cryptology,
                  {ISCISC} 2013, Yazd, Iran, August 29-30, 2013},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISCISC.2013.6767320},
  doi          = {10.1109/ISCISC.2013.6767320},
  timestamp    = {Mon, 13 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscisc/Jha13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/KhodabakhshiSJR13,
  author       = {Vahid Khodabakhshi and
                  Mahdi Soltani and
                  Rasool Jalili and
                  Mostafa Rezvani},
  title        = {Chaos-based selective key {(CSK)} Cryptosystem: {A} new direction
                  to secure {VPN}},
  booktitle    = {10th International {ISC} Conference on Information Security and Cryptology,
                  {ISCISC} 2013, Yazd, Iran, August 29-30, 2013},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISCISC.2013.6767355},
  doi          = {10.1109/ISCISC.2013.6767355},
  timestamp    = {Mon, 13 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscisc/KhodabakhshiSJR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/LashkaripourB13,
  author       = {Z. Lashkaripour and
                  Abbas Ghaemi Bafghi},
  title        = {A security analysis tool for web application reinforcement against
                  {SQL} injection attacks (SQLIAs)},
  booktitle    = {10th International {ISC} Conference on Information Security and Cryptology,
                  {ISCISC} 2013, Yazd, Iran, August 29-30, 2013},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISCISC.2013.6767326},
  doi          = {10.1109/ISCISC.2013.6767326},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscisc/LashkaripourB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/MalekianH13,
  author       = {Donia Malekian and
                  Mahmoud Reza Hashemi},
  title        = {An adaptive profile based fraud detection framework for handling concept
                  drift},
  booktitle    = {10th International {ISC} Conference on Information Security and Cryptology,
                  {ISCISC} 2013, Yazd, Iran, August 29-30, 2013},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISCISC.2013.6767338},
  doi          = {10.1109/ISCISC.2013.6767338},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscisc/MalekianH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/MardaniS13,
  author       = {Shahla Mardani and
                  Hamid Reza Shahriari},
  title        = {A new method for occupational fraud detection in process aware information
                  systems},
  booktitle    = {10th International {ISC} Conference on Information Security and Cryptology,
                  {ISCISC} 2013, Yazd, Iran, August 29-30, 2013},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISCISC.2013.6767348},
  doi          = {10.1109/ISCISC.2013.6767348},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscisc/MardaniS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/MeamariAS13,
  author       = {Ehsan Meamari and
                  Khadijeh Afhamisisi and
                  Hadi Shahriar Shahhoseini},
  title        = {An analysis on interactions among secondary user and unknown jammer
                  in cognitive radio systems by fictitious play},
  booktitle    = {10th International {ISC} Conference on Information Security and Cryptology,
                  {ISCISC} 2013, Yazd, Iran, August 29-30, 2013},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISCISC.2013.6767327},
  doi          = {10.1109/ISCISC.2013.6767327},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscisc/MeamariAS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/MohajerBSP13,
  author       = {Amin Mohajer and
                  Maryam Bavaghar and
                  Rashin Saboor and
                  Ali Payandeh},
  title        = {Secure dominating set-based routing protocol in {MANET:} Using reputation},
  booktitle    = {10th International {ISC} Conference on Information Security and Cryptology,
                  {ISCISC} 2013, Yazd, Iran, August 29-30, 2013},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISCISC.2013.6767346},
  doi          = {10.1109/ISCISC.2013.6767346},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscisc/MohajerBSP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/Mozaffari13,
  author       = {Hamid Bagheriand Saeed Mozaffari},
  title        = {Robust reversible data hiding in encrypted image: Using fractal coding
                  approach},
  booktitle    = {10th International {ISC} Conference on Information Security and Cryptology,
                  {ISCISC} 2013, Yazd, Iran, August 29-30, 2013},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISCISC.2013.6767354},
  doi          = {10.1109/ISCISC.2013.6767354},
  timestamp    = {Mon, 13 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscisc/Mozaffari13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/NajdiE13,
  author       = {Shirin Najdi and
                  Afshin Ebrahimi},
  title        = {Audio fingerprinting based on multi-resolution analysis of Discrete
                  Wavelet Transform},
  booktitle    = {10th International {ISC} Conference on Information Security and Cryptology,
                  {ISCISC} 2013, Yazd, Iran, August 29-30, 2013},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISCISC.2013.6767349},
  doi          = {10.1109/ISCISC.2013.6767349},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscisc/NajdiE13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/NasiraeeM13,
  author       = {Hassan Nasiraee and
                  Jamshid Bagherzadeh Mohasefi},
  title        = {A novel three party key establishment scheme in the context of Internet-of-Things},
  booktitle    = {10th International {ISC} Conference on Information Security and Cryptology,
                  {ISCISC} 2013, Yazd, Iran, August 29-30, 2013},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISCISC.2013.6767322},
  doi          = {10.1109/ISCISC.2013.6767322},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscisc/NasiraeeM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/PahlavaniP13,
  author       = {Farzad Pahlavani and
                  Ali Pourmohammad},
  title        = {A block set interpolation technique based Additive-White-Noise robust
                  audio watermarking method},
  booktitle    = {10th International {ISC} Conference on Information Security and Cryptology,
                  {ISCISC} 2013, Yazd, Iran, August 29-30, 2013},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISCISC.2013.6767330},
  doi          = {10.1109/ISCISC.2013.6767330},
  timestamp    = {Mon, 13 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscisc/PahlavaniP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/PourmohseniAA13,
  author       = {Sajad Pourmohseni and
                  Hassan Asgharian and
                  Ahmad Akbari},
  title        = {Detecting authentication misuse attacks against {SIP} entities},
  booktitle    = {10th International {ISC} Conference on Information Security and Cryptology,
                  {ISCISC} 2013, Yazd, Iran, August 29-30, 2013},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISCISC.2013.6767324},
  doi          = {10.1109/ISCISC.2013.6767324},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscisc/PourmohseniAA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/RaghebiH13,
  author       = {Zohre Raghebi and
                  Mahmoud Reza Hashemi},
  title        = {A new trust evaluation method based on reliability of customer feedback
                  for cloud computing},
  booktitle    = {10th International {ISC} Conference on Information Security and Cryptology,
                  {ISCISC} 2013, Yazd, Iran, August 29-30, 2013},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISCISC.2013.6767353},
  doi          = {10.1109/ISCISC.2013.6767353},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscisc/RaghebiH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/RezapourAA13,
  author       = {Taha Yasin Rezapour and
                  Meer Soheil Abolghasemi and
                  Reza Ebrahimi Atani},
  title        = {A position-based key management scheme for heterogeneous sensor networks},
  booktitle    = {10th International {ISC} Conference on Information Security and Cryptology,
                  {ISCISC} 2013, Yazd, Iran, August 29-30, 2013},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISCISC.2013.6767350},
  doi          = {10.1109/ISCISC.2013.6767350},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscisc/RezapourAA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/SalekMA13,
  author       = {Zahra Salek and
                  Fariborz Mousavi Madani and
                  Reza Azmi},
  title        = {Intrusion detection using neuarl networks trained by differential
                  evaluation algorithm},
  booktitle    = {10th International {ISC} Conference on Information Security and Cryptology,
                  {ISCISC} 2013, Yazd, Iran, August 29-30, 2013},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISCISC.2013.6767341},
  doi          = {10.1109/ISCISC.2013.6767341},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscisc/SalekMA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/ShakeriB13,
  author       = {Hassan Shakeri and
                  Abbas Ghaemi Bafghi},
  title        = {{CATEF:} Confidence-aware trust estimation framework},
  booktitle    = {10th International {ISC} Conference on Information Security and Cryptology,
                  {ISCISC} 2013, Yazd, Iran, August 29-30, 2013},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISCISC.2013.6767328},
  doi          = {10.1109/ISCISC.2013.6767328},
  timestamp    = {Mon, 13 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscisc/ShakeriB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/ShakeriG13,
  author       = {Ehsan Shakeri and
                  Shahrokh Ghaemmaghami},
  title        = {An efficient feature extraction methodology for blind image steganalysis
                  using contourlet transform and Zernike moments},
  booktitle    = {10th International {ISC} Conference on Information Security and Cryptology,
                  {ISCISC} 2013, Yazd, Iran, August 29-30, 2013},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISCISC.2013.6767329},
  doi          = {10.1109/ISCISC.2013.6767329},
  timestamp    = {Mon, 13 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscisc/ShakeriG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/TolueeAS13,
  author       = {Rahim Toluee and
                  Maryam Rajabzadeh Asaar and
                  Mahmoud Salmasizadeh},
  title        = {Attribute-based ring signatures: Security analysis and a new construction},
  booktitle    = {10th International {ISC} Conference on Information Security and Cryptology,
                  {ISCISC} 2013, Yazd, Iran, August 29-30, 2013},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISCISC.2013.6767342},
  doi          = {10.1109/ISCISC.2013.6767342},
  timestamp    = {Mon, 13 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscisc/TolueeAS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/TolueeAS13a,
  author       = {Rahim Toluee and
                  Maryam Rajabzadeh Asaar and
                  Mahmoud Salmasizadeh},
  title        = {A new ring signature scheme},
  booktitle    = {10th International {ISC} Conference on Information Security and Cryptology,
                  {ISCISC} 2013, Yazd, Iran, August 29-30, 2013},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISCISC.2013.6767343},
  doi          = {10.1109/ISCISC.2013.6767343},
  timestamp    = {Mon, 13 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscisc/TolueeAS13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/YajamMMS13,
  author       = {Habib Allah Yajam and
                  Ali Mahmoodi and
                  Javad Mohajeri and
                  Mahmoud Salmasizadeh},
  title        = {Security analysis of an identity-based mix net},
  booktitle    = {10th International {ISC} Conference on Information Security and Cryptology,
                  {ISCISC} 2013, Yazd, Iran, August 29-30, 2013},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISCISC.2013.6767339},
  doi          = {10.1109/ISCISC.2013.6767339},
  timestamp    = {Mon, 13 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscisc/YajamMMS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/YajamMS13,
  author       = {Habib Allah Yajam and
                  Javad Mohajeri and
                  Mahmoud Salmasizadeh},
  title        = {Identity based universal re-encryption for mix nets},
  booktitle    = {10th International {ISC} Conference on Information Security and Cryptology,
                  {ISCISC} 2013, Yazd, Iran, August 29-30, 2013},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISCISC.2013.6767344},
  doi          = {10.1109/ISCISC.2013.6767344},
  timestamp    = {Mon, 13 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscisc/YajamMS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/ZarchABM13,
  author       = {Mohammad K. Houri Zarch and
                  Masih Abedini and
                  Mehdi Berenjkoub and
                  Amin Mirhosseini},
  title        = {An unsupervised anomaly detection engine with an efficient feature
                  set for {AODV}},
  booktitle    = {10th International {ISC} Conference on Information Security and Cryptology,
                  {ISCISC} 2013, Yazd, Iran, August 29-30, 2013},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISCISC.2013.6767334},
  doi          = {10.1109/ISCISC.2013.6767334},
  timestamp    = {Mon, 13 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscisc/ZarchABM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/Zare-MirakabadK13,
  author       = {Mohammad{-}Reza Zare{-}Mirakabad and
                  Fatemeh Kaveh{-}Yazdy and
                  Mohammad Tahmasebi},
  title        = {Privacy preservation by k-anonymizing Ngrams of time series},
  booktitle    = {10th International {ISC} Conference on Information Security and Cryptology,
                  {ISCISC} 2013, Yazd, Iran, August 29-30, 2013},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISCISC.2013.6767335},
  doi          = {10.1109/ISCISC.2013.6767335},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscisc/Zare-MirakabadK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscisc/ZarmehiBA13,
  author       = {Nematollah Zarmehi and
                  Morteza Banagar and
                  Mohammad Ali Akhaee},
  title        = {Optimum decoder for an additive video watermarking with Laplacian
                  noise in {H.264}},
  booktitle    = {10th International {ISC} Conference on Information Security and Cryptology,
                  {ISCISC} 2013, Yazd, Iran, August 29-30, 2013},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISCISC.2013.6767352},
  doi          = {10.1109/ISCISC.2013.6767352},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscisc/ZarmehiBA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iscisc/2013,
  title        = {10th International {ISC} Conference on Information Security and Cryptology,
                  {ISCISC} 2013, Yazd, Iran, August 29-30, 2013},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6765549/proceeding},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscisc/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics