Volume 3, Issue 4

 

ارسال های اخیر

  • Randomized SVD Based Probabilistic Caching Strategy in Named Data Networks 

    Mehran, Narges؛ Movahhedinia, Naser (University of Isfahan & Iranian Society of Cryptology, 2016-10-01)
    Named Data Networking (NDN), a data-centric enabled-cache architecture, as one of the candidates for the future Internet, has the potential to overcome many of the current Internet difficulties (emph{e.g.}, security, ...

  • Persian Texts Part of Speech Tagging Using Artificial Neural Networks 

    Hosseini Pozveh, Zahra؛ Monadjemi, Amirhassan؛ Ahmadi, Ali (University of Isfahan & Iranian Society of Cryptology, 2016-10-01)
    Part of speech tagging (POS) is a basic task in natural language processing applications such as morphological parsing, information retrieval, machine translation and question answering. POS Tagging is the task of giving ...

  • Multicollision Attack on a recently proposed hash function vMDC-2 

    Zolfaghari, Zahra؛ Asadollahi, Hamid؛ Bagheri, Nasour (University of Isfahan & Iranian Society of Cryptology, 2016-10-01)
    In this paper, we describe an attack on a new double block length hash function which was proposed as a variant of MDC-2 and MDC-4. The vMDC-2 compression function is based on two calls to a block cipher that compresses a ...

  • On the Security of Permutation Based Authentication Protocols for Internet of Things Applications: The Case of Huang et al.'s Protocol 

    Rostampour, Samad؛ Bagheri, Nasour؛ Hosseinzadeh, Mehdi؛ Khademzadeh, Ahmad (University of Isfahan & Iranian Society of Cryptology, 2016-10-01)
    The Internet of Things (IoT) is a new technology, which enables objects to exchange data via the Internet. Authentication process is a method to prevent an unauthorized access to the IoT systems. The using of bit-wise ...