


default search action
18th ISCISC 2021: Isfahan, Iran
- 18th International ISC Conference on Information Security and Cryptology, ISCISC 2021, Isfahan, Iran, Islamic Republic of, September 1-2, 2021. IEEE 2021, ISBN 978-1-6654-1329-9

- Omid Torki, Maede Ashouri-Talouki, Mojtaba Mahdavi:

Blockchain for steganography: advantages, new algorithms and open challenges. 1-5 - Maryam Zarezadeh, Hamid Mala:

Secure Parameterized Multi-Pattern Matching in Multi-Text Owner Setting. 6-12 - Maryam Azadmanesh

, Behrouz Shahgholi Ghahfarokhi, Maede Ashouri-Talouki:
A White-Box Generator Membership Inference Attack Against Generative Models. 13-17 - Faeze Rasouli, Mohammad Taheri

:
A Perfect Recovery for Fragile Watermarking by Hamming Code on Distributed Pixels. 18-22 - Mansooreh Mirzaie, Maryam Nooraei Abadeh:

A Trust-Based Vulnerability Analysis in Signed Social Networks. 23-27 - Hasan Deeb

, Hayyan Hasan
, Behrouz Tork Ladani, Bahman Zamani:
A machine learning approach for detecting and categorizing evasion sources in Android malware. 28-34 - Mojtaba Hemmati, Mohammad Ali Hadavi:

Using Deep Reinforcement Learning to Evade Web Application Firewalls. 35-41 - Mohammad Reza Saeidi, Hamid Mala:

Secure Outsourcing of Boneh-Franklin Identity-Based Encryption Scheme. 42-49 - Ali Khosravi, Taraneh Eghlidos:

On Relaxation of Simon's Algorithm. 50-56 - Parvin Rastegari, Mojtaba Khalili:

Cryptanalysis and Improvement of an Access Control Protocol for Wireless Body Area Networks. 57-62 - Akram Khalesi, Zahra Ahmadian:

Integral Analysis of Saturnin Using Bit-Based Division Property. 63-67 - Omid Mirzamohammadi, Alireza Aghabagherloo, Javad Mohajeri, Mahmoud Salmasizadeh, Mohammad Reza Aref:

Analysis and Improvement of the SPACF Scheme in Vehicular Ad-hoc Networks. 68-74 - Pouya Narimani, Mohammad Ali Akhaee, Seyedamin Habibi:

Side-Channel based Disassembler for AVR Micro-Controllers using Convolutional Neural Networks. 75-80 - Sina Abdollahi, Javad Mohajeri, Mahmoud Salmasizadeh:

Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT. 81-88 - Alireza Shahanaghi, Mohammad Ali Akhaee, Saeed Sarreshtedari, Ramin Toosi

:
Optimum Group Pixel Matching Strategies for Image Steganography. 89-94

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














