مرور Volume 2, Issue 1 بر اساس عنوان
در حال نمایش موارد 1 - 6 از 6
- 
A High Speed Residue-to-Binary Converter for Balanced 4-Moduli Set (University of Isfahan & Iranian Society of Cryptology, 2015-01-01)The moduli set 2 n−1 − 1, 2 n+1 − 1, 2 n , 2 n − 1 has been recently proposed inliterature for class of 4n-bit dynamic range in residue number system. Due toonly utilizing modulus in the form of 2 k − 1 besides modulo 2 n ...
 
- 
Improving Face Recognition Systems Security Using Local Binary Patterns (University of Isfahan & Iranian Society of Cryptology, 2015-01-01)Face recognition systems suffer from different spoofing attacks like photograph-based and video-based spoofing attacks. This paper presents a new method to empower the face recognition systems against video-based spoofing ...
 
- 
JHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH (University of Isfahan & Iranian Society of Cryptology, 2015-01-01)Authenticated encryption (AE) schemes provide both privacy and integrity ofdata. CAESAR is a competition to design and analysis of the AE schemes. AnAE scheme has two components: a mode of operation and a primitive. In ...
 
- 
A Method for Assessing Maintainability of Software Architectural Styles in Self-healing Systems by Measuring Coupling and Cohesion (University of Isfahan & Iranian Society of Cryptology, 2015-01-01)In this article, our aim is to quantify the impact of three reference architectural styles, i.e. Aspect-peer-to-peer, Aggregator-escalator-peer, and Chain-of-configurators on the maintainability attribute in self-healing ...
 
- 
Steganography of Halftone Images by Group Alteration of Grayscale Pixels (University of Isfahan & Iranian Society of Cryptology, 2015-01-01)Data hiding in halftone images is a challenging task since these images are very susceptible to alterations. Current steganographic methods for these types of images either embed the data after the image is completely ...
 
- 
A Study on Intelligent Authorship Methods in Persian Language (University of Isfahan & Iranian Society of Cryptology, 2015-01-01)Author identification is an attempt to demonstrate the characteristics of the author of a piece of language information so that in the end, it would be possible to significantly distinguish the difference between various ...
 



