در حال نمایش موارد 1 - 4 از 4
A Graph-based Online Feature Selection to Improve Detection of New Attacks
(Iranian Society of Cryptology, 2022-07-01)
Today, intrusion detection systems are used in the networks as one of the essential methods to detect new attacks. Usually, these systems deal with a broad set of data and many features. Therefore, selecting proper features ...
A New Variant of the Winternitz One Time Signature Based on Graded Encoding Schemes
(Iranian Society of Cryptology, 2022-01-01)
Digital signature schemes are used to guarantee for non-repudiation and authenticity of any kind of data like documents, messages or software. The Winternitz one-time signature (WOTS) scheme, which can be described using ...
Designated-Server Hierarchical Searchable Encryption in Identity-Based Setting
(Iranian Society of Cryptology, 2023-10-01)
Public key encryption with keyword search (PEKS) is a cryptographic primitive designed for performing secure search operations over encrypted data stored on untrusted cloud servers. However, in some applications of cloud ...
Light-Weight Privacy-Preserving Data Aggregation Protocols in Smart Grid Metering Networks
(Iranian Society of Cryptology, 2022-10-01)
Smart grids using information technology (IT) and communication networks control smart home appliances to reduce costs and increase reliability and transparency. Preserving the privacy of the user data is one of the biggest ...