Volume 2, Issue 3

 

ارسال های اخیر

  • Toward automatic Transformation of Service Choreography into UML State Machine 

    Rastegari, Yousef؛ Shams, Fereidoon (University of Isfahan & Iranian Society of Cryptology, 2015-07-01)
    An adaptive process consists of dynamic elements, and management rules which govern their run-time behaviors. The WS-CDL describes collaborative business processes between service consumers and providers. Adapting the ...

  • New Functions for Mass Calculation in Gravitational Search Algorithm 

    Ebrahimi Mood, Sepehr؛ Rashedi, Esmat؛ Javidi, Mohammad Masoud (University of Isfahan & Iranian Society of Cryptology, 2015-07-01)
    Nowadays, optimization problems are large-scale and complicated, so heuristic optimization algorithms have become common for solving them. Gravitational Search Algorithm (GSA) is one of the heuristic algorithms for solving ...

  • Adaptive Interval Type-2 Fuzzy Inference System for Facial Expression Recognition 

    Safayani, Mehran؛ Farmani, Vahid؛ Ahmadi, Maedeh؛ Mirzaei, Abdolreza (University of Isfahan & Iranian Society of Cryptology, 2015-07-01)
    Fuzzy Inference systems have been successfully applied for different pattern recognition problems. However, in some real-world applications such as facial expression recognition, the uncertainties related to the feature ...

  • Some Primitives Based on Jumping LFSRs with Determined Period 

    Sadjadieh, Mahdi؛ Mirzaei, Arash؛ Dakhilalian, Mohammad (University of Isfahan & Iranian Society of Cryptology, 2015-07-01)
    Linear feedback shift registers (LFSRs) are used in manystream ciphers because of their maximal period and good statistical prop-erties. Due to the linearity of the LFSR, its output cannot be directlyused as the keystream. ...

  • Improved Secure and Privacy Preserving Keyword Searching Cryptography 

    Tajiki, Mohammad Mahdi؛ Akhaee, Mohammad Ali؛ Bahrak, Behnam (University of Isfahan & Iranian Society of Cryptology, 2015-07-01)
    Using storage systems outside a company may endanger data security. This leads users to mostly encrypt their information for risk mitigation. Although encryption improves confidentiality, it causes inefficiency such as the ...