Volume 3, Issue 1

 

ارسال های اخیر

  • Determining the Number of Accusations for Decision Making in Key Revocation Protocol for MANET 

    Zarezadeh, Maryam؛ Doostari, Mohammad Ali؛ Haj Seyyed Javadi, Seyyed Hamid (University of Isfahan & Iranian Society of Cryptology, 2016-01-01)
    Considering the dynamic and wireless topology of the mobile ad hoc networks (MANETs), the implementation of security in such networks is an important problem. Key revocation is a solution for this challenge which prevents ...

  • Multiple-Fault Tolerant Hardware Structure for Cellular Genetic Algorithm 

    Ashooriyan, Peyman؛ Baleghi Damavandi, Yasser (University of Isfahan & Iranian Society of Cryptology, 2016-01-01)
    This paper presents the hardware simulation (based on VHDL code) of a multiple-fault tolerant cellular genetic algorithm. This study aims to increase the immunity of cellular genetic algorithm in multiple-fault situation. ...

  • A Novel Block Cipher Algorithm with Feistel-Like Structure 

    Deypir, Mahmood؛ Purebrahim, Yousef (University of Isfahan & Iranian Society of Cryptology, 2016-01-01)
    Block ciphers have wide applications for hardware and software implementations. In this paper, a new block cipher algorithm with provable security is proposed. The whole structure of the algorithm is novel and has a good ...

  • A CCA2-Secure Incomparable Public Key Encryption Scheme 

    Rajabi, Bahman؛ Eslami, Ziba (University of Isfahan & Iranian Society of Cryptology, 2016-01-01)
    In 2003, Waters, Felten and Sahai introduced a novel cryptographic primitive called Incomparable Public Key cryptosystem to protect anonymity of message receivers in an untrusted network. In this setting, a receiver is ...

  • Enhancing the Sense of Immersion and Quality of Experience in Mobile Games Using Augmented Reality 

    Sekhavat, Yoones؛ Zarei, Hosein (University of Isfahan & Iranian Society of Cryptology, 2016-01-01)
    Augmented Reality (AR) has introduced new forms of interaction and presentation in mobile applications. Mobile games have also taken the advantages of this technology to implement novel techniques for interaction between ...

  • Structural and Non-Structural Similarity Combination of Users in Social Networks 

    Malekmohammad, Azam؛ Khosravi, Hadi (University of Isfahan & Iranian Society of Cryptology, 2016-01-01)
    Estimating similarity is expressed in many domains and sciences. For instance, data mining, web mining, clustering, search engines, ontology mapping and social networks require the definition and deployment of similarity. ...