Login / Signup
ISCISC
2013
2016
2021
2013
2021
Keyphrases
Publications
2021
Sina Abdollahi
,
Javad Mohajeri
,
Mahmoud Salmasizadeh
Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT.
ISCISC
(2021)
Parvin Rastegari
,
Mojtaba Khalili
Cryptanalysis and Improvement of an Access Control Protocol for Wireless Body Area Networks.
ISCISC
(2021)
Maryam Azadmanesh
,
Behrouz Shahgholi Ghahfarokhi
,
Maede Ashouri-Talouki
A White-Box Generator Membership Inference Attack Against Generative Models.
ISCISC
(2021)
Omid Torki
,
Maede Ashouri-Talouki
,
Mojtaba Mahdavi
Blockchain for steganography: advantages, new algorithms and open challenges.
ISCISC
(2021)
Alireza Shahanaghi
,
Mohammad Ali Akhaee
,
Saeed Sarreshtedari
,
Ramin Toosi
Optimum Group Pixel Matching Strategies for Image Steganography.
ISCISC
(2021)
18th International ISC Conference on Information Security and Cryptology, ISCISC 2021, Isfahan, Iran, Islamic Republic of, September 1-2, 2021
ISCISC
(2021)
Mohammad Reza Saeidi
,
Hamid Mala
Secure Outsourcing of Boneh-Franklin Identity-Based Encryption Scheme.
ISCISC
(2021)
Mojtaba Hemmati
,
Mohammad Ali Hadavi
Using Deep Reinforcement Learning to Evade Web Application Firewalls.
ISCISC
(2021)
Ali Khosravi
,
Taraneh Eghlidos
On Relaxation of Simon's Algorithm.
ISCISC
(2021)
Faeze Rasouli
,
Mohammad Taheri
A Perfect Recovery for Fragile Watermarking by Hamming Code on Distributed Pixels.
ISCISC
(2021)
Pouya Narimani
,
Mohammad Ali Akhaee
,
Seyed Amin Habibi
Side-Channel based Disassembler for AVR Micro-Controllers using Convolutional Neural Networks.
ISCISC
(2021)
Maryam Zarezadeh
,
Hamid Mala
Secure Parameterized Multi-Pattern Matching in Multi-Text Owner Setting.
ISCISC
(2021)
Hasan Deeb
,
Hayyan Hasan
,
Behrouz Tork Ladani
,
Bahman Zamani
A machine learning approach for detecting and categorizing evasion sources in Android malware.
ISCISC
(2021)
Akram Khalesi
,
Zahra Ahmadian
Integral Analysis of Saturnin Using Bit-Based Division Property.
ISCISC
(2021)
Omid Mirzamohammadi
,
Alireza Aghabagherloo
,
Javad Mohajeri
,
Mahmoud Salmasizadeh
,
Mohammad Reza Aref
Analysis and Improvement of the SPACF Scheme in Vehicular Ad-hoc Networks.
ISCISC
(2021)
Mansooreh Mirzaie
,
Maryam Nooraei Abadeh
A Trust-Based Vulnerability Analysis in Signed Social Networks.
ISCISC
(2021)
2020
Mohammad Erfan Mazaheri
,
Farhad Taheri
,
Siavash Bayat Sarmadi
Lurking Eyes: A Method to Detect Side-Channel Attacks on JavaScript and WebAssembly.
ISCISC
(2020)
Parvin Rastegari
On the Security of Some Recently Proposed Certificateless Signcryption Schemes.
ISCISC
(2020)
Amir Ajorlou
,
Aliazam Abbasfar
An Optimized Structure of State Channel Network to Improve Scalability of Blockchain Algorithms.
ISCISC
(2020)
Zahra Moti
,
Sattar Hashemi
,
Amir Namavar Jahromi
A Deep Learning-based Malware Hunting Technique to Handle Imbalanced Data.
ISCISC
(2020)
Farnoush Manavi
,
Ali Hamzeh
A New Method for Ransomware Detection Based on PE Header Using Convolutional Neural Networks.
ISCISC
(2020)
Mahsa Monem Moharrer
,
Sadegh Dorri Nogoorani
A Decentralized App Store Using the Blockchain Technology.
ISCISC
(2020)
S. Sadegh Mousavi
Detecting Disk Sectors Data Types Using Hidden Markov Model.
ISCISC
(2020)
17th International ISC Conference on Information Security and Cryptology, ISCISC 2020, Tehran, Iran, September 9-10, 2020
ISCISC
(2020)
Hamidreza Yazdanpanah
,
Mahdi Azizi
,
Seyed Morteza Pournaghi
A Secure and Improved Authentication Scheme for Heterogeneous Wireless Sensor Networks in the Internet of Things Environment.
ISCISC
(2020)
Hayyan Hasan
,
Behrouz Tork Ladani
,
Bahman Zamani
Enhancing Monkey to trigger malicious payloads in Android malware.
ISCISC
(2020)
Tayebe Abazar
,
Peyman Masjedi
,
Mohammad Taheri
A Binary Relevance Adaptive Model-Selection for Ensemble Steganalysis.
ISCISC
(2020)
Saeed Zarbi
,
Seyed Amir Mortazavi
,
Pedram Salehpour
Security Analysis of an Efficient Authentication Scheme for Vehicular Ad Hoc Networks.
ISCISC
(2020)
Farshideh Kordi
,
Hamed Hossein-Talaee
,
Ali Jahanian
Cost-Effective and Practical Countermeasure against the Template Side Channel Attack.
ISCISC
(2020)
Milad Salimian
,
Ali Jahanian
Analysis of Geometrical Parameters for Remote Side-Channel Attacks on Multi-Tenant FPGAs.
ISCISC
(2020)
Ali Hadipour
,
Raheleh Afifi
Advantages and disadvantages of using cryptography in steganography.
ISCISC
(2020)
Elnaz Ebadi
,
Habib Yajam
,
Mohammad Ali Akhaee
Improvements on Easypaysy: The Bitcoin's Layer-2 Accounts Protocol.
ISCISC
(2020)
Shahrooz Janbaz
,
Rahim Asghari
,
Bagher Bagherpour
,
Ali Zaghian
A fast non-interactive publicly verifiable secret sharing scheme.
ISCISC
(2020)
2019
Faezeh Sadat Babamir
,
Murvet Kirci
Improvement of Digest Based Authentication Scheme for Biometric Verification.
ISCISC
(2019)
Mohammad Mahdi Modiri
,
Javad Mohajeri
,
Mahmoud Salmasizadeh
GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication.
ISCISC
(2019)
Mehranpoor Shayan
,
Mohammadzadeh Naser
,
Gharaee Hossein
IoT-Based Anonymous Authentication Protocol Using Biometrics in Smart Homes.
ISCISC
(2019)
Abbas Rahnama
,
Mohammad Beheshti-Atashgah
,
Taraneh Eghlidos
,
Mohammad Reza Aref
A Lightweight Anonymous Authentication Protocol For IoT Wireless Sensor Networks.
ISCISC
(2019)
Mostafa Chegenizadeh
,
Mohammad Ali
,
Javad Mohajeri
,
Mohammad Reza Aref
An Anonymous Attribute-based Access Control System Supporting Access Structure Update.
ISCISC
(2019)
Zahra Saffar
,
Siamak Mohammadi
Fault tolerant non-linear techniques for scalar multiplication in ECC.
ISCISC
(2019)
Ala Bahrani
,
Amir Jalaly Bidgly
Ransomware detection using process mining and classification algorithms.
ISCISC
(2019)
Hamid Amiryousefi
,
Zahra Ahmadian
DAS and 3PDA, Two Data Aggregation Schemes for Smart Grid.
ISCISC
(2019)
Majid Zolfaghari
,
Solmaz Salimi
,
Mehdi Kharrazi
Inferring API Correct Usage Rules: A Tree-based Approach.
ISCISC
(2019)
Majid Farhadi
,
Hamideh Bypour
,
Reza Mortazavi
An efficient secret sharing-based storage system for cloud-based IoTs.
ISCISC
(2019)
Aref Rezaei
,
Leili Farzinvash
,
Ali Farzamnia
A Novel Steganography Algorithm using Edge Detection and MPC Algorithm.
ISCISC
(2019)
Sorour Sheidani
,
Ziba Eslami
Blind Multipurpose Image Watermarking Based on Secret Sharing.
ISCISC
(2019)
Fakhroddin Noorbehbahani
,
Farzaneh Rasouli
,
Mohammad Saberi
Analysis of Machine Learning Techniques for Ransomware Detection.
ISCISC
(2019)
Abbas Rahnama
,
Mohammad Beheshti-Atashgah
,
Taraneh Eghlidos
,
Mohammad Reza Aref
An Ultra-Lightweight RFID Mutual Authentication Protocol.
ISCISC
(2019)
Hadi Aghaee
,
Bahareh Akhbari
Classical-Quantum Multiple Access Wiretap Channel.
ISCISC
(2019)
16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, ISCISC 2019, Mashhad, Iran, August 28-29, 2019
ISCISC
(2019)
Parvin Rastegari
,
Mohammad Dakhilalian
Cryptanalysis of a Certificateless Signcryption Scheme.
ISCISC
(2019)