researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2013
2014
2016
2017
2018
2019
2020
2021
Filter by Tag
Filter by Author
[+]
OR
AND
NOT
1
Akbar Mahmoodi Rishakani
Behrouz Tork Ladani
Habib Allah Yajam
Hamid Mala
Hamid Reza Shahriari
Javad Mohajeri
M. R. Mirzaee Shamsabad
Maede Ashouri-Talouki
Mahmoud Salmasizadeh
Maryam Rajabzadeh Asaar
Mehdi Berenjkoub
Mohammad Ali Akhaee
Mohammad Ali Hadavi
Mohammad Reza Aref
Mojtaba Mahdavi
Parvin Rastegari
Rasool Jalili
Seyed Mojtaba Dehnavi
Siavash Ahmadi
Taraneh Eghlidos
Filter by Top terms
[+]
OR
AND
NOT
1
analysis
attack
attacks
authentication
data
detection
efficient
information
key
lightweight
method
model
networks
new
protocol
scheme
secure
security
using
watermarking
ISCISC (iscisc)
Editions
Publications
Viewing Publication 1 - 100 from 197
2021
18th International ISC Conference on Information Security and Cryptology, ISCISC 2021, Isfahan, Iran, Islamic Republic of, September 1-2, 2021
IEEE,
2021.
[doi]
Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT
Sina Abdollahi
,
Javad Mohajeri
,
Mahmoud Salmasizadeh
.
iscisc 2021
:
81-88
[doi]
A White-Box Generator Membership Inference Attack Against Generative Models
Maryam Azadmanesh
,
Behrouz Shahgholi Ghahfarokhi
,
Maede Ashouri-Talouki
.
iscisc 2021
:
13-17
[doi]
A machine learning approach for detecting and categorizing evasion sources in Android malware
Hasan Deeb
,
Hayyan Hasan
,
Behrouz Tork Ladani
,
Bahman Zamani
.
iscisc 2021
:
28-34
[doi]
Using Deep Reinforcement Learning to Evade Web Application Firewalls
Mojtaba Hemmati
,
Mohammad Ali Hadavi
.
iscisc 2021
:
35-41
[doi]
Integral Analysis of Saturnin Using Bit-Based Division Property
Akram Khalesi
,
Zahra Ahmadian
.
iscisc 2021
:
63-67
[doi]
On Relaxation of Simon's Algorithm
Ali Khosravi
,
Taraneh Eghlidos
.
iscisc 2021
:
50-56
[doi]
A Trust-Based Vulnerability Analysis in Signed Social Networks
Mansooreh Mirzaie
,
Maryam Nooraei Abadeh
.
iscisc 2021
:
23-27
[doi]
Analysis and Improvement of the SPACF Scheme in Vehicular Ad-hoc Networks
Omid Mirzamohammadi
,
Alireza Aghabagherloo
,
Javad Mohajeri
,
Mahmoud Salmasizadeh
,
Mohammad Reza Aref
.
iscisc 2021
:
68-74
[doi]
Side-Channel based Disassembler for AVR Micro-Controllers using Convolutional Neural Networks
Pouya Narimani
,
Mohammad Ali Akhaee
,
Seyed Amin Habibi
.
iscisc 2021
:
75-80
[doi]
A Perfect Recovery for Fragile Watermarking by Hamming Code on Distributed Pixels
Faeze Rasouli
,
Mohammad Taheri
.
iscisc 2021
:
18-22
[doi]
Cryptanalysis and Improvement of an Access Control Protocol for Wireless Body Area Networks
Parvin Rastegari
,
Mojtaba Khalili
.
iscisc 2021
:
57-62
[doi]
Secure Outsourcing of Boneh-Franklin Identity-Based Encryption Scheme
Mohammad Reza Saeidi
,
Hamid Mala
.
iscisc 2021
:
42-49
[doi]
Optimum Group Pixel Matching Strategies for Image Steganography
Alireza Shahanaghi
,
Mohammad Ali Akhaee
,
Saeed Sarreshtedari
,
Ramin Toosi
.
iscisc 2021
:
89-94
[doi]
Blockchain for steganography: advantages, new algorithms and open challenges
Omid Torki
,
Maede Ashouri-Talouki
,
Mojtaba Mahdavi
.
iscisc 2021
:
1-5
[doi]
Secure Parameterized Multi-Pattern Matching in Multi-Text Owner Setting
Maryam Zarezadeh
,
Hamid Mala
.
iscisc 2021
:
6-12
[doi]
2020
17th International ISC Conference on Information Security and Cryptology, ISCISC 2020, Tehran, Iran, September 9-10, 2020
IEEE,
2020.
[doi]
A Binary Relevance Adaptive Model-Selection for Ensemble Steganalysis
Tayebe Abazar
,
Peyman Masjedi
,
Mohammad Taheri
.
iscisc 2020
:
77-81
[doi]
An Optimized Structure of State Channel Network to Improve Scalability of Blockchain Algorithms
Amir Ajorlou
,
Aliazam Abbasfar
.
iscisc 2020
:
73-76
[doi]
Improvements on Easypaysy: The Bitcoin's Layer-2 Accounts Protocol
Elnaz Ebadi
,
Habib Yajam
,
Mohammad Ali Akhaee
.
iscisc 2020
:
54-59
[doi]
Advantages and disadvantages of using cryptography in steganography
Ali Hadipour
,
Raheleh Afifi
.
iscisc 2020
:
88-94
[doi]
Enhancing Monkey to trigger malicious payloads in Android malware
Hayyan Hasan
,
Behrouz Tork Ladani
,
Bahman Zamani
.
iscisc 2020
:
65-72
[doi]
A fast non-interactive publicly verifiable secret sharing scheme
Shahrooz Janbaz
,
Rahim Asghari
,
Bagher Bagherpour
,
Ali Zaghian
.
iscisc 2020
:
7-13
[doi]
Cost-Effective and Practical Countermeasure against the Template Side Channel Attack
Farshideh Kordi
,
Hamed Hossein-Talaee
,
Ali Jahanian 0001
.
iscisc 2020
:
22-27
[doi]
A New Method for Ransomware Detection Based on PE Header Using Convolutional Neural Networks
Farnoush Manavi
,
Ali Hamzeh
.
iscisc 2020
:
82-87
[doi]
Lurking Eyes: A Method to Detect Side-Channel Attacks on JavaScript and WebAssembly
Mohammad Erfan Mazaheri
,
Farhad Taheri
,
Siavash Bayat Sarmadi
.
iscisc 2020
:
1-6
[doi]
A Decentralized App Store Using the Blockchain Technology
Mahsa Monem Moharrer
,
Sadegh Dorri Nogoorani
.
iscisc 2020
:
14-21
[doi]
A Deep Learning-based Malware Hunting Technique to Handle Imbalanced Data
Zahra Moti
,
Sattar Hashemi
,
Amir Namavar Jahromi
.
iscisc 2020
:
48-53
[doi]
Detecting Disk Sectors Data Types Using Hidden Markov Model
S. Sadegh Mousavi
.
iscisc 2020
:
60-64
[doi]
On the Security of Some Recently Proposed Certificateless Signcryption Schemes
Parvin Rastegari
.
iscisc 2020
:
95-100
[doi]
Analysis of Geometrical Parameters for Remote Side-Channel Attacks on Multi-Tenant FPGAs
Milad Salimian
,
Ali Jahanian
.
iscisc 2020
:
28-35
[doi]
A Secure and Improved Authentication Scheme for Heterogeneous Wireless Sensor Networks in the Internet of Things Environment
Hamidreza Yazdanpanah
,
Mahdi Azizi
,
Seyed Morteza Pournaghi
.
iscisc 2020
:
36-43
[doi]
Security Analysis of an Efficient Authentication Scheme for Vehicular Ad Hoc Networks
Saeed Zarbi
,
Seyed Amir Mortazavi
,
Pedram Salehpour
.
iscisc 2020
:
44-47
[doi]
2019
Classical-Quantum Multiple Access Wiretap Channel
Hadi Aghaee
,
Bahareh Akhbari
.
iscisc 2019
:
99-103
[doi]
2DAS and 3PDA, Two Data Aggregation Schemes for Smart Grid
Hamid Amiryousefi
,
Zahra Ahmadian
.
iscisc 2019
:
45-48
[doi]
A New RF-PUF Based Authentication of Internet of Things Using Random Forest Classification
Amir Ashtari
,
Ahmad Shabani
,
Bijan Alizadeh
.
iscisc 2019
:
21-26
[doi]
Investigating the Streaming Algorithms Usage in Website Fingerprinting Attack Against Tor Privacy Enhancing Technology
Reyhane Attarian
,
Sattar Hashemi
.
iscisc 2019
:
33-38
[doi]
Improvement of Digest Based Authentication Scheme for Biometric Verification
Faezeh Sadat Babamir
,
Murvet Kirci
.
iscisc 2019
:
9-14
[doi]
16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, ISCISC 2019, Mashhad, Iran, August 28-29, 2019
Abbas Ghaemi Bafghi
,
Haleh Amintoosi
, editors,
IEEE,
2019.
[doi]
Ransomware detection using process mining and classification algorithms
Ala Bahrani
,
Amir Jalaly Bidgly
.
iscisc 2019
:
73-77
[doi]
SANUB: A new method for Sharing and Analyzing News Using Blockchain
Arian Balouchestani
,
Mojtaba Mahdavi
,
Yeganeh Hallaj
,
Delaram Javdani
.
iscisc 2019
:
139-143
[doi]
An Anonymous Attribute-based Access Control System Supporting Access Structure Update
Mostafa Chegenizadeh
,
Mohammad Ali
,
Javad Mohajeri
,
Mohammad Reza Aref
.
iscisc 2019
:
85-91
[doi]
Lightweight Involutive Components for Symmetric Cryptography
Seyed Mojtaba Dehnavi
,
M. R. Mirzaee Shamsabad
,
Akbar Mahmoodi Rishakani
.
iscisc 2019
:
61-66
[doi]
An efficient secret sharing-based storage system for cloud-based IoTs
Majid Farhadi
,
Hamideh Bypour
,
Reza Mortazavi
.
iscisc 2019
:
122-127
[doi]
CRT-Based Robust Data Hiding Method by Extracting Features in DCT Domain
Alireza Ghaemi
,
Habibollah Danyali
.
iscisc 2019
:
134-138
[doi]
GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
Mohammad Mahdi Modiri
,
Javad Mohajeri
,
Mahmoud Salmasizadeh
.
iscisc 2019
:
15-20
[doi]
Threat Extraction in IoT-Based Systems Focusing on Smart Cities
Abbas Nejatifar
,
Mohammad Ali Hadavi
.
iscisc 2019
:
92-98
[doi]
Analysis of Machine Learning Techniques for Ransomware Detection
Fakhroddin Noorbehbahani
,
Farzaneh Rasouli
,
Mohammad Saberi
.
iscisc 2019
:
128-133
[doi]
An Ultra-Lightweight RFID Mutual Authentication Protocol
Abbas Rahnama
,
Mohammad Beheshti-Atashgah
,
Taraneh Eghlidos
,
Mohammad Reza Aref
.
iscisc 2019
:
27-32
[doi]
A Lightweight Anonymous Authentication Protocol For IoT Wireless Sensor Networks
Abbas Rahnama
,
Mohammad Beheshti-Atashgah
,
Taraneh Eghlidos
,
Mohammad Reza Aref
.
iscisc 2019
:
39-44
[doi]
Cryptanalysis of a Certificateless Signcryption Scheme
Parvin Rastegari
,
Mohammad Dakhilalian
.
iscisc 2019
:
67-71
[doi]
A Novel Steganography Algorithm using Edge Detection and MPC Algorithm
Aref Rezaei
,
Leili Farzinvash
,
Ali Farzamnia
.
iscisc 2019
:
49-54
[doi]
Fault tolerant non-linear techniques for scalar multiplication in ECC
Zahra Saffar
,
Siamak Mohammadi
.
iscisc 2019
:
104-113
[doi]
IoT-Based Anonymous Authentication Protocol Using Biometrics in Smart Homes
Mehranpoor. Shayan
,
Mohammadzadeh. Naser
,
Gharaee. Hossein
.
iscisc 2019
:
114-121
[doi]
Blind Multipurpose Image Watermarking Based on Secret Sharing
Sorour Sheidani
,
Ziba Eslami
.
iscisc 2019
:
1-8
[doi]
Inferring API Correct Usage Rules: A Tree-based Approach
Majid Zolfaghari
,
Solmaz Salimi
,
Mehdi Kharrazi
.
iscisc 2019
:
78-84
[doi]
2018
15th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, ISCISC 2018, Tehran, Iran, August 28-29, 2018
IEEE,
2018.
[doi]
BLProM: Business-Layer Process Miner of the Web Application
Mitra Alidoosti
,
Alireza Nowroozi
.
iscisc 2018
:
1-6
[doi]
A New Statistical Method for Wormhole Attack Detection in MANETs
Hossein As'adi
,
Alireza Keshavarz-Haddad
,
Ali Jamshidi
.
iscisc 2018
:
1-6
[doi]
Tampering Detection and Restoration of Compressed Video
Bardia Azizian
,
Shahrokh Ghaemmaghami
.
iscisc 2018
:
1-5
[doi]
An efficient user identification approach based on Netflow analysis
Atieh Bakhshandeh
,
Zahra Eskandari
.
iscisc 2018
:
1-5
[doi]
Detecting Privacy Leaks in Android Apps using Inter-Component Information Flow Control Analysis
Zohreh Bohluli
,
Hamid Reza Shahriari
.
iscisc 2018
:
1-6
[doi]
Polynomials over ℤ2n and their applications in symmetric cryptography
S. M. Dehnavi
,
M. R. Mirzaee Shamsabad
.
iscisc 2018
:
1-6
[doi]
Compressed Video Watermarking for Authentication and Reconstruction of the Audio Part
Zahra Esmaeilbeig
,
Shahrokh Ghaemmaghami
.
iscisc 2018
:
1-6
[doi]
SMSBotHunter: A Novel Anomaly Detection Technique to Detect SMS Botnets
Farnood Faghihi
,
Mahdi Abadi
,
Asghar Tajoddin
.
iscisc 2018
:
1-6
[doi]
Software Security Analysis Based on the Principle of Defense-in-Depth
Ahmad Jalali
,
Mohammad Ali Hadavi
.
iscisc 2018
:
1-6
[doi]
A Practical and Secure Lattice-based Scheme for Full-Duplex Gaussian One-Way Relay Channels
Hassan Khodaiemehr
,
Taraneh Eghlidos
.
iscisc 2018
:
1-8
[doi]
Modular Construction a Lattices from Cyclotomic Fields and their Applications in Information Security
Hassan Khodaiemehr
,
Daniel Panario
,
Mohammad-Reza Sadeghi 0001
.
iscisc 2018
:
1-8
[doi]
Phase Jamming Attack: A Practical Attack on Physical layer-Based Key Derivation
S. Mohamad MirhoseiniNejad
,
Ali Rahmanpour
,
S. Mohammad Razavizadeh
.
iscisc 2018
:
1-4
[doi]
Cryptanalysis and Improvement of a Pairing-Free Certificateless Signature Scheme
Nasrollah Pakniat
,
Behnam Abasi Vanda
.
iscisc 2018
:
1-5
[doi]
A Novel Approach for Detecting DGA-based Ransomwares
Saeid Salehi
,
HamidReza Shahriari
,
Mohammad Mehdi Ahmadian
,
Ladan Tazik
.
iscisc 2018
:
1-7
[doi]
BotcoinTrap: Detection of Bitcoin Miner Botnet Using Host Based Approach
Atefeh Zareh
,
Atefeh Zareh
.
iscisc 2018
:
1-6
[doi]
Threat Extraction Method Based on UML Software Description
Masoumeh Zeinali
,
Mohammad Ali Hadavi
.
iscisc 2018
:
1-8
[doi]
2017
14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, ISCISC 2017, Shiraz, Iran, September 6-7, 2017
IEEE,
2017.
[doi]
Improved Fixed Point Attack on Gost2
Siavash Ahmadi
,
Mohammad Reza Aref
.
iscisc 2017
:
54-57
[doi]
Lightweight and Secure Authentication Protocol for the Internet of Things in Vehicular Systems
Sima Arasteh
,
Maede Ashouri-Talouki
,
Seyed Farhad Aghili
.
iscisc 2017
:
1-7
[doi]
Finite State Machine Based Countermeasure for Cryptographic Algorithms
Sadegh Attari
,
Aein Rezaei Shahmirzadi
,
Mahmoud Salmasizadeh
,
Iman Gholampour
.
iscisc 2017
:
58-63
[doi]
Hybrid Intrusion Detection: Combining Decision Tree and Gaussian Mixture Model
Marzieh Bitaab
,
Sattar Hashemi
.
iscisc 2017
:
8-12
[doi]
A Formal Model for Security Analysis of Trust and Reputation systems
Seyed Asgary Ghasempouri
,
Behrouz Tork Ladani
.
iscisc 2017
:
13-18
[doi]
CAFD: Detecting Collusive Frauds in Online Auction Networks by Combining One-Class Classification and Collective Classification
Nazanin Habibollahi
,
Mahdi Abadi
,
Mahila Dadfarnia
.
iscisc 2017
:
48-53
[doi]
Utilizing Features of Aggregated Flows to Identify Botnet Network Traffic
Banafsheh Heydari
,
Habib Yajam
,
Mohammad Ali Akhaee
,
Sadaf Salehkalaibar
.
iscisc 2017
:
25-30
[doi]
Analysis of a Distance Bounding Protocol for Verifying the Proximity of Two-Hop Neighbors
Hoda Jannati
,
Nasour Bagheri
,
Masoumeh Safkhani
.
iscisc 2017
:
31-36
[doi]
New Techniques for Localization Based Information Theoretic Secret Key Agreement
Narges Kazempour
,
Mahtab Mirmohseni
,
Mohammad Reza Aref
.
iscisc 2017
:
70-76
[doi]
A New Distributed Group Key Management Scheme for Wireless Sensor Networks
Mojtaba Mohammadi
,
Alireza Keshavarz-Haddad
.
iscisc 2017
:
37-41
[doi]
A Lightweight and Secure Data Sharing Protocol for D2D Communications
Atefeh Mohseni-Ejiyeh
,
Maede Ashouri-Talouki
,
Mojtaba Mahdavi
.
iscisc 2017
:
42-47
[doi]
A New Approach to Key Schedule Designing
Seyed Reza Hoseini Najarkolaei
,
Siavash Ahmadi
,
Mohammad Reza Aref
.
iscisc 2017
:
64-69
[doi]
On the Security of O-PSI a Delegated Private Set Intersection on Outsourced Datasets
Mehdi Mahdavi Oliaee
,
Mahshid Delavar
,
Mohammad Hassan Ameri
,
Javad Mohajeri
,
Mohammad Reza Aref
.
iscisc 2017
:
77-81
[doi]
Proposing a New Feature for Structure-Aware Analysis of Android Malwares
Shahrooz Pooryousef
,
Kazim Fouladi
.
iscisc 2017
:
93-98
[doi]
A Novel Multiplicative Steganography Technique in Contourlet Domain
Farid Saleh
,
Maryam Amirmazlaghani
.
iscisc 2017
:
105-110
[doi]
An Efficient Cooperative Message Authentication Scheme in Vehicular Ad-hoc Networks
Amirreza Sarencheh
,
Maryam Rajabzadeh Asaar
,
Mahmoud Salmasizadeh
,
Mohammad Reza Aref
.
iscisc 2017
:
111-118
[doi]
Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher
Aein Rezaei Shahmirzadi
,
Seyyed Arash Azimi
,
Mahmoud Salmasizadeh
,
Javad Mohajeri
,
Mohammad Reza Aref
.
iscisc 2017
:
99-104
[doi]
WAVE: Black Box Detection of XSS, CSRF and Information Leakage Vulnerabilities
Hamed Soleimani
,
Mohammad Ali Hadavi
,
Arash Bagherdaei
.
iscisc 2017
:
19-24
[doi]
Physical Layer Security in AF and CF Relay Networks with RF-Energy Harvesting
Ali Soleimani
,
Mahtab Mirmohseni
,
Mohammad Reza Aref
.
iscisc 2017
:
86-92
[doi]
Enforcing Access Control Policies over Data Stored on Untrusted Server
Naeimeh Soltani
,
Rasool Jalili
.
iscisc 2017
:
119-124
[doi]
A Novel and Efficient Privacy Preserving TETRA Authentication Protocol
Behnam Zahednejad
,
Mahdi Azizi
,
Seyed Morteza Pournaghi
.
iscisc 2017
:
125-132
[doi]
Cryptanalysis of an Asymmetric Searchable Encryption Scheme
Fahimeh Zare
,
Hamid Mala
.
iscisc 2017
:
82-85
[doi]
2016
13th International Iranian Society of Cryptology Conference on Information Security and Cryptology, ISCISC 2016, Tehran, Iran, September 7-8, 2016
IEEE,
2016.
[doi]
Construction of new S-boxes via permuting the inverse mapping on special subsets
Seyed Mojtaba Dehnavi
,
M. R. Mirzaee Shamsabad
,
Akbar Mahmoodi Rishakani
.
iscisc 2016
:
1-6
[doi]
A new approach for effective malware detection in Android-based devices
Mahmood Deypir
.
iscisc 2016
:
112-116
[doi]
Fine-grained access control for hybrid mobile applications in Android using restricted paths
Shahrooz Pooryousef
,
Morteza Amini
.
iscisc 2016
:
85-90
[doi]
Sign in
or
sign up
to see more results.