Volume 3, Issue 3
مرور بر اساس
ارسال های اخیر
-
Effect of Purposeful Feature Extraction in High-dimensional Kinship Verification Problem
(University of Isfahan & Iranian Society of Cryptology, 2016-07-01)Recently, researchers have shown an increased interest in kinship verification via facial images in the field of computer vision. The matter of fact is that kinship verification is done according to similarities of parent ...
-
Security Analysis of an EPC Class-1 Generation-2 Compliant RFID Authentication Protocol
(University of Isfahan & Iranian Society of Cryptology, 2016-07-01)Design of secure authentication solutions for low-cost RFID tags is still an open and quite challenging problem, though many protocols have been published in the last decade. In 2013, Wei and Zhang proposed a new lightweight ...
-
A New Hybrid Method for VoIP Stream Steganography
(University of Isfahan & Iranian Society of Cryptology, 2016-07-01)In this article, a new stream steganography method for real time digital data network environment with the focus on VoIP is presented. This method consists of a combination of Least Significant Bits (LSB) algorithm and an ...
-
Expected Coverage of Perfect Chains in the Hellman Time Memory Trade-Off
(University of Isfahan & Iranian Society of Cryptology, 2016-07-01)Critical overlap situations in the classical Hellman's cryptanalytic time memory trade-off method can be avoided, provided that during the precomputation phase, we generate perfect chains which are merge-free and loop-free ...



