The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ISCISC"( http://dblp.L3S.de/Venues/ISCISC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/iscisc

Publication years (Num. hits)
2013 (38) 2014 (42) 2016 (21) 2017 (23) 2018 (17) 2019 (23) 2020 (17) 2021 (16)
Publication types (Num. hits)
inproceedings(189) proceedings(8)
Venues (Conferences, Journals, ...)
ISCISC(197)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 197 publication records. Showing 197 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Mohammad Reza Saeidi, Hamid Mala Secure Outsourcing of Boneh-Franklin Identity-Based Encryption Scheme. Search on Bibsonomy ISCISC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Ali Khosravi, Taraneh Eghlidos On Relaxation of Simon's Algorithm. Search on Bibsonomy ISCISC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Omid Torki, Maede Ashouri-Talouki, Mojtaba Mahdavi Blockchain for steganography: advantages, new algorithms and open challenges. Search on Bibsonomy ISCISC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Maryam Azadmanesh, Behrouz Shahgholi Ghahfarokhi, Maede Ashouri-Talouki A White-Box Generator Membership Inference Attack Against Generative Models. Search on Bibsonomy ISCISC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Hasan Deeb, Hayyan Hasan, Behrouz Tork Ladani, Bahman Zamani A machine learning approach for detecting and categorizing evasion sources in Android malware. Search on Bibsonomy ISCISC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Alireza Shahanaghi, Mohammad Ali Akhaee, Saeed Sarreshtedari, Ramin Toosi Optimum Group Pixel Matching Strategies for Image Steganography. Search on Bibsonomy ISCISC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Mansooreh Mirzaie, Maryam Nooraei Abadeh A Trust-Based Vulnerability Analysis in Signed Social Networks. Search on Bibsonomy ISCISC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Parvin Rastegari, Mojtaba Khalili Cryptanalysis and Improvement of an Access Control Protocol for Wireless Body Area Networks. Search on Bibsonomy ISCISC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Sina Abdollahi, Javad Mohajeri, Mahmoud Salmasizadeh Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT. Search on Bibsonomy ISCISC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Mojtaba Hemmati, Mohammad Ali Hadavi Using Deep Reinforcement Learning to Evade Web Application Firewalls. Search on Bibsonomy ISCISC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1 18th International ISC Conference on Information Security and Cryptology, ISCISC 2021, Isfahan, Iran, Islamic Republic of, September 1-2, 2021 Search on Bibsonomy ISCISC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Maryam Zarezadeh, Hamid Mala Secure Parameterized Multi-Pattern Matching in Multi-Text Owner Setting. Search on Bibsonomy ISCISC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Omid Mirzamohammadi, Alireza Aghabagherloo, Javad Mohajeri, Mahmoud Salmasizadeh, Mohammad Reza Aref Analysis and Improvement of the SPACF Scheme in Vehicular Ad-hoc Networks. Search on Bibsonomy ISCISC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Pouya Narimani, Mohammad Ali Akhaee, Seyedamin Habibi Side-Channel based Disassembler for AVR Micro-Controllers using Convolutional Neural Networks. Search on Bibsonomy ISCISC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Faeze Rasouli, Mohammad Taheri A Perfect Recovery for Fragile Watermarking by Hamming Code on Distributed Pixels. Search on Bibsonomy ISCISC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Akram Khalesi, Zahra Ahmadian Integral Analysis of Saturnin Using Bit-Based Division Property. Search on Bibsonomy ISCISC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Tayebe Abazar, Peyman Masjedi, Mohammad Taheri A Binary Relevance Adaptive Model-Selection for Ensemble Steganalysis. Search on Bibsonomy ISCISC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Mahsa Monem Moharrer, Sadegh Dorri Nogoorani A Decentralized App Store Using the Blockchain Technology. Search on Bibsonomy ISCISC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Hayyan Hasan, Behrouz Tork Ladani, Bahman Zamani Enhancing Monkey to trigger malicious payloads in Android malware. Search on Bibsonomy ISCISC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Ali Hadipour, Raheleh Afifi Advantages and disadvantages of using cryptography in steganography. Search on Bibsonomy ISCISC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1 17th International ISC Conference on Information Security and Cryptology, ISCISC 2020, Tehran, Iran, September 9-10, 2020 Search on Bibsonomy ISCISC The full citation details ... 2020 DBLP  BibTeX  RDF
1S. Sadegh Mousavi Detecting Disk Sectors Data Types Using Hidden Markov Model. Search on Bibsonomy ISCISC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Farnoush Manavi, Ali Hamzeh A New Method for Ransomware Detection Based on PE Header Using Convolutional Neural Networks. Search on Bibsonomy ISCISC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Hamidreza Yazdanpanah, Mahdi Azizi, Seyed Morteza Pournaghi A Secure and Improved Authentication Scheme for Heterogeneous Wireless Sensor Networks in the Internet of Things Environment. Search on Bibsonomy ISCISC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Parvin Rastegari On the Security of Some Recently Proposed Certificateless Signcryption Schemes. Search on Bibsonomy ISCISC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Mohammad Erfan Mazaheri, Farhad Taheri, Siavash Bayat Sarmadi Lurking Eyes: A Method to Detect Side-Channel Attacks on JavaScript and WebAssembly. Search on Bibsonomy ISCISC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Saeed Zarbi, Seyed Amir Mortazavi, Pedram Salehpour Security Analysis of an Efficient Authentication Scheme for Vehicular Ad Hoc Networks. Search on Bibsonomy ISCISC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Amir Ajorlou, Aliazam Abbasfar An Optimized Structure of State Channel Network to Improve Scalability of Blockchain Algorithms. Search on Bibsonomy ISCISC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Zahra Moti, Sattar Hashemi, Amir Namavar Jahromi A Deep Learning-based Malware Hunting Technique to Handle Imbalanced Data. Search on Bibsonomy ISCISC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Shahrooz Janbaz, Rahim Asghari, Bagher Bagherpour, Ali Zaghian A fast non-interactive publicly verifiable secret sharing scheme. Search on Bibsonomy ISCISC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Milad Salimian, Ali Jahanian 0001 Analysis of Geometrical Parameters for Remote Side-Channel Attacks on Multi-Tenant FPGAs. Search on Bibsonomy ISCISC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Farshideh Kordi, Hamed Hossein-Talaee, Ali Jahanian 0001 Cost-Effective and Practical Countermeasure against the Template Side Channel Attack. Search on Bibsonomy ISCISC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Elnaz Ebadi, Habib Yajam 0001, Mohammad Ali Akhaee Improvements on Easypaysy: The Bitcoin's Layer-2 Accounts Protocol. Search on Bibsonomy ISCISC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Parvin Rastegari, Mohammad Dakhilalian Cryptanalysis of a Certificateless Signcryption Scheme. Search on Bibsonomy ISCISC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Amir Ashtari, Ahmad Shabani, Bijan Alizadeh A New RF-PUF Based Authentication of Internet of Things Using Random Forest Classification. Search on Bibsonomy ISCISC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Zahra Saffar, Siamak Mohammadi Fault tolerant non-linear techniques for scalar multiplication in ECC. Search on Bibsonomy ISCISC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Ala Bahrani, Amir Jalaly Bidgly Ransomware detection using process mining and classification algorithms. Search on Bibsonomy ISCISC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Abbas Ghaemi Bafghi, Haleh Amintoosi (eds.) 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, ISCISC 2019, Mashhad, Iran, August 28-29, 2019 Search on Bibsonomy ISCISC The full citation details ... 2019 DBLP  BibTeX  RDF
1Arian Balouchestani, Mojtaba Mahdavi, Yeganeh Hallaj, Delaram Javdani SANUB: A new method for Sharing and Analyzing News Using Blockchain. Search on Bibsonomy ISCISC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Faezeh Sadat Babamir, Murvet Kirci Improvement of Digest Based Authentication Scheme for Biometric Verification. Search on Bibsonomy ISCISC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Shayan Mehranpoor, Naser Mohammadzadeh, Hossein Gharaee IoT-Based Anonymous Authentication Protocol Using Biometrics in Smart Homes. Search on Bibsonomy ISCISC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Mostafa Chegenizadeh, Mohammad Ali 0003, Javad Mohajeri, Mohammad Reza Aref An Anonymous Attribute-based Access Control System Supporting Access Structure Update. Search on Bibsonomy ISCISC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Majid Zolfaghari, Solmaz Salimi, Mehdi Kharrazi Inferring API Correct Usage Rules: A Tree-based Approach. Search on Bibsonomy ISCISC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Majid Farhadi, Hamideh Bypour, Reza Mortazavi An efficient secret sharing-based storage system for cloud-based IoTs. Search on Bibsonomy ISCISC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Seyed Mojtaba Dehnavi, M. R. Mirzaee Shamsabad, Akbar Mahmoodi Rishakani Lightweight Involutive Components for Symmetric Cryptography. Search on Bibsonomy ISCISC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Abbas Rahnama, Mohammad Beheshti-Atashgah, Taraneh Eghlidos, Mohammad Reza Aref An Ultra-Lightweight RFID Mutual Authentication Protocol. Search on Bibsonomy ISCISC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Alireza Ghaemi, Habibollah Danyali CRT-Based Robust Data Hiding Method by Extracting Features in DCT Domain. Search on Bibsonomy ISCISC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Mohammad Mahdi Modiri, Javad Mohajeri, Mahmoud Salmasizadeh GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication. Search on Bibsonomy ISCISC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Abbas Rahnama, Mohammad Beheshti-Atashgah, Taraneh Eghlidos, Mohammad Reza Aref A Lightweight Anonymous Authentication Protocol For IoT Wireless Sensor Networks. Search on Bibsonomy ISCISC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Hamid Amiryousefi, Zahra Ahmadian Cryptanalysis of SP2DAS and 3PDA, Two Data Aggregation Schemes for Smart Grid. Search on Bibsonomy ISCISC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Fakhroddin Noorbehbahani, Farzaneh Rasouli, Mohammad Saberi Analysis of Machine Learning Techniques for Ransomware Detection. Search on Bibsonomy ISCISC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Abbas Nejatifar, Mohammad Ali Hadavi Threat Extraction in IoT-Based Systems Focusing on Smart Cities. Search on Bibsonomy ISCISC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Reyhane Attarian, Sattar Hashemi Investigating the Streaming Algorithms Usage in Website Fingerprinting Attack Against Tor Privacy Enhancing Technology. Search on Bibsonomy ISCISC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Aref Rezaei, Leili Farzinvash, Ali Farzamnia A Novel Steganography Algorithm using Edge Detection and MPC Algorithm. Search on Bibsonomy ISCISC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Sorour Sheidani, Ziba Eslami Blind Multipurpose Image Watermarking Based on Secret Sharing. Search on Bibsonomy ISCISC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Hadi Aghaee, Bahareh Akhbari Classical-Quantum Multiple Access Wiretap Channel. Search on Bibsonomy ISCISC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Mitra Alidoosti, Alireza Nowroozi BLProM: Business-Layer Process Miner of the Web Application. Search on Bibsonomy ISCISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Bardia Azizian, Shahrokh Ghaemmaghami Tampering Detection and Restoration of Compressed Video. Search on Bibsonomy ISCISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hossein As'adi, Alireza Keshavarz-Haddad, Ali Jamshidi 0001 A New Statistical Method for Wormhole Attack Detection in MANETs. Search on Bibsonomy ISCISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Zohreh Bohluli, Hamid Reza Shahriari Detecting Privacy Leaks in Android Apps using Inter-Component Information Flow Control Analysis. Search on Bibsonomy ISCISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1SeyedMohamad MirhoseiniNejad, Ali Rahmanpour, Seyed Mohammad Razavizadeh Phase Jamming Attack: A Practical Attack on Physical layer-Based Key Derivation. Search on Bibsonomy ISCISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Zahra Esmaeilbeig, Shahrokh Ghaemmaghami Compressed Video Watermarking for Authentication and Reconstruction of the Audio Part. Search on Bibsonomy ISCISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ahmad Jalali, Mohammad Ali Hadavi Software Security Analysis Based on the Principle of Defense-in-Depth. Search on Bibsonomy ISCISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Seyed Mojtaba Dehnavi, M. R. Mirzaee Shamsabad Polynomials over ℤ2n and their applications in symmetric cryptography. Search on Bibsonomy ISCISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Atieh Bakhshandeh, Zahra Eskandari An efficient user identification approach based on Netflow analysis. Search on Bibsonomy ISCISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Farnood Faghihi, Mahdi Abadi, Asghar Tajoddin SMSBotHunter: A Novel Anomaly Detection Technique to Detect SMS Botnets. Search on Bibsonomy ISCISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Saeid Salehi, Hamid Reza Shahriari, Mohammad Mehdi Ahmadian, Ladan Tazik A Novel Approach for Detecting DGA-based Ransomwares. Search on Bibsonomy ISCISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Masoumeh Zeinali, Mohammad Ali Hadavi Threat Extraction Method Based on UML Software Description. Search on Bibsonomy ISCISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1 15th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, ISCISC 2018, Tehran, Iran, August 28-29, 2018 Search on Bibsonomy ISCISC The full citation details ... 2018 DBLP  BibTeX  RDF
1Hassan Khodaiemehr, Taraneh Eghlidos A Practical and Secure Lattice-based Scheme for Full-Duplex Gaussian One-Way Relay Channels. Search on Bibsonomy ISCISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Atefeh Zareh BotcoinTrap: Detection of Bitcoin Miner Botnet Using Host Based Approach. Search on Bibsonomy ISCISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hassan Khodaiemehr, Daniel Panario, Mohammad-Reza Sadeghi 0001 Modular Construction a Lattices from Cyclotomic Fields and their Applications in Information Security. Search on Bibsonomy ISCISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Nasrollah Pakniat, Behnam Abasi Vanda Cryptanalysis and Improvement of a Pairing-Free Certificateless Signature Scheme. Search on Bibsonomy ISCISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Siavash Ahmadi, Mohammad Reza Aref Improved Fixed Point Attack on Gost2. Search on Bibsonomy ISCISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Hamed Soleimani, Mohammad Ali Hadavi, Arash Bagherdaei WAVE: Black Box Detection of XSS, CSRF and Information Leakage Vulnerabilities. Search on Bibsonomy ISCISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sadegh Attari, Aein Rezaei Shahmirzadi, Mahmoud Salmasizadeh, Iman Gholampour Finite State Machine Based Countermeasure for Cryptographic Algorithms. Search on Bibsonomy ISCISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Farid Saleh, Maryam Amirmazlaghani A Novel Multiplicative Steganography Technique in Contourlet Domain. Search on Bibsonomy ISCISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Aein Rezaei Shahmirzadi, Seyyed Arash Azimi, Mahmoud Salmasizadeh, Javad Mohajeri, Mohammad Reza Aref Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher. Search on Bibsonomy ISCISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Narges Kazempour, Mahtab Mirmohseni, Mohammad Reza Aref New Techniques for Localization Based Information Theoretic Secret Key Agreement. Search on Bibsonomy ISCISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ali Soleimani, Mahtab Mirmohseni, Mohammad Reza Aref Physical Layer Security in AF and CF Relay Networks with RF-Energy Harvesting. Search on Bibsonomy ISCISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Shahrooz Pooryousef, Kazim Fouladi Proposing a New Feature for Structure-Aware Analysis of Android Malwares. Search on Bibsonomy ISCISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Nazanin Habibollahi, Mahdi Abadi, Mahila Dadfarnia CAFD: Detecting Collusive Frauds in Online Auction Networks by Combining One-Class Classification and Collective Classification. Search on Bibsonomy ISCISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, ISCISC 2017, Shiraz, Iran, September 6-7, 2017 Search on Bibsonomy ISCISC The full citation details ... 2017 DBLP  BibTeX  RDF
1Seyed Reza Hoseini Najarkolaei, Siavash Ahmadi, Mohammad Reza Aref A New Approach to Key Schedule Designing. Search on Bibsonomy ISCISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Fahimeh Zare, Hamid Mala Cryptanalysis of an Asymmetric Searchable Encryption Scheme. Search on Bibsonomy ISCISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Banafsheh Heydari, Habib Yajam 0001, Mohammad Ali Akhaee, Sadaf Salehkalaibar Utilizing Features of Aggregated Flows to Identify Botnet Network Traffic. Search on Bibsonomy ISCISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Hoda Jannati, Nasour Bagheri, Masoumeh Safkhani Analysis of a Distance Bounding Protocol for Verifying the Proximity of Two-Hop Neighbors. Search on Bibsonomy ISCISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Behnam Zahednejad, Mahdi Azizi, Seyed Morteza Pournaghi A Novel and Efficient Privacy Preserving TETRA Authentication Protocol. Search on Bibsonomy ISCISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Naeimeh Soltani, Rasool Jalili Enforcing Access Control Policies over Data Stored on Untrusted Server. Search on Bibsonomy ISCISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mehdi Mahdavi Oliaee, Mahshid Delavar, Mohammad Hassan Ameri, Javad Mohajeri, Mohammad Reza Aref On the Security of O-PSI a Delegated Private Set Intersection on Outsourced Datasets. Search on Bibsonomy ISCISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Marzieh Bitaab, Sattar Hashemi Hybrid Intrusion Detection: Combining Decision Tree and Gaussian Mixture Model. Search on Bibsonomy ISCISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Atefeh Mohseni-Ejiyeh, Maede Ashouri-Talouki, Mojtaba Mahdavi A Lightweight and Secure Data Sharing Protocol for D2D Communications. Search on Bibsonomy ISCISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Seyed Asgary Ghasempouri, Behrouz Tork Ladani A Formal Model for Security Analysis of Trust and Reputation systems. Search on Bibsonomy ISCISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Amirreza Sarencheh, Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Mohammad Reza Aref An Efficient Cooperative Message Authentication Scheme in Vehicular Ad-hoc Networks. Search on Bibsonomy ISCISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mojtaba Mohammadi, Alireza Keshavarz-Haddad A New Distributed Group Key Management Scheme for Wireless Sensor Networks. Search on Bibsonomy ISCISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sima Arasteh, Maede Ashouri-Talouki, Seyed Farhad Aghili Lightweight and Secure Authentication Protocol for the Internet of Things in Vehicular Systems. Search on Bibsonomy ISCISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Amir S. Mortazavi, Mahmoud Salmasizadeh, Amir Daneshgar FMNV continuous non-malleable encoding scheme is more efficient than believed. Search on Bibsonomy ISCISC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Samira Hosseini, Mojtaba Mahdavi Counterfeiting attack on adjusted expanded-bit multiscale quantization-based semi-fragile watermarking technique. Search on Bibsonomy ISCISC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mahmood Deypir A new approach for effective malware detection in Android-based devices. Search on Bibsonomy ISCISC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Abolfazl Zargar, Alireza Nowroozi, Rasool Jalili XABA: A zero-knowledge anomaly-based behavioral analysis method to detect insider threats. Search on Bibsonomy ISCISC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 197 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license