Volume 6, Issue 1
مرور بر اساس
ارسال های اخیر
-
Full Secret Disclosure Attack against an EPC- C1 G2 Compliant Authentication Protocol
(University of Isfahan & Iranian Society of Cryptology, 2019-01-01)Security analysis of a protocol is an important step toward the public trust on its security. Recently, in 2018, Moradi et al. considered the security of the Wei and Zhang RFID EPC-C1 G2 compliant authentication protocol ...
-
Identifying Explicit Features of Persian Comments
(University of Isfahan & Iranian Society of Cryptology, 2019-01-01)Recently, the approach towards mining various opinions on weblogs, forums and websites has gained attentions and interests of numerous researchers. In this regard, feature-based opinion mining has been extensively studied ...
-
An Extension of CryptoPAi to the Formal Analysis of E-voting Protocols
(University of Isfahan & Iranian Society of Cryptology, 2019-01-01)CryptoPAi is a hybrid operational-epistemic framework for specification and analysis of security protocols with genuine support for cryptographic constructs. This framework includes a process algebraic formalism for the ...
-
Vol. 6, No. 1, 2019
(University of Isfahan & Iranian Society of Cryptology, 2019-01-01)Vol. 6, No. 1, 2019



