مرور Volume 1, Issue 1 بر اساس عنوان

  • Editorial Note 

    Naghsh-Nilchi, Ahmad (University of Isfahan & Iranian Society of Cryptology, 2014-01-01)

  • The Effect of Correlogram Properties on Blind Steganalysis in JPEG Images 

    Alimoradi, Dariush؛ Hasanzadeh, Maryam (University of Isfahan & Iranian Society of Cryptology, 2014-01-01)
    Blind image steganalysis is a technique for discovering the message hidden in images in an independent manner than embedding the hidden message. The content of the image contribute to the success of steganalysis drastically. ...

  • An Efficient End to End Key Establishment Protocol for Wireless Sensor Networks 

    Fanian, Ali؛ Berenjkoub, Mehdi (University of Isfahan & Iranian Society of Cryptology, 2014-01-01)
    Sensor networks are eligible candidates for military and scientific applications such as border security and environmental monitoring. They are usually deployed in unattended or hostile environments; therefore, security ...

  • A Growing Hierarchical Approach to Batch Linear Manifold Topographic Map Formation 

    Adibi, Peyman (University of Isfahan & Iranian Society of Cryptology, 2014-01-01)
    The linear manifold topographic map (LMTM) is a model for unsupervised learning of multiple low-dimensional linear manifolds from a set of data samples in a topology-preserving map. Several limitations exist in LMTM and ...

  • An Optimal Traffic Distribution Method Supporting End-to-End Delay Bound 

    Shabanian, Touraj؛ Hashemi, Massoud؛ Askarian, Ahmad؛ Omoomi, Behnaz (University of Isfahan & Iranian Society of Cryptology, 2014-01-01)
    Routing methods for optimal distribution of traffic in data networks that can also provide quality of service (QoS) for users is one of the challenges in recent years' research on next generation networks. The major QoS ...

  • A Trust-Based Approach for Correctness verification of Query Results in Data Outsourcing 

    Noferesti, Morteza؛ Ghasemi, Simin؛ Hadavi, Mohammad Ali؛ Jalili, Rasool (University of Isfahan & Iranian Society of Cryptology, 2014-01-01)
    Correctness verification of query results is an important security concern in data outsourcing scenarios. In previous approaches, the correctness verification was impossible in real applications due to its high overhead. ...

  • Unified Byte Permutations for the Block Cipher 3D 

    Mala, Hamid (University of Isfahan & Iranian Society of Cryptology, 2014-01-01)
    3D is a 512-bit block cipher whose design is inspired from the Advanced Encryption Standard (AES). Like the AES, each round of 3D is composed of 4 transformations including a round-key addition, a byte-wise substitution, ...

  • Vol. 6, No. 2, 2019 

    پدیدآور نامشخص (University of Isfahan & Iranian Society of Cryptology, 2014-01-01)
    Vol. 6, No. 2, 2019