جستجو
در حال نمایش موارد 1 - 10 از 212
Persian Abstract
(Iranian Society of Cryptology, 2018-07-01)
Persian abstracts of the issue's article
Secure Coding Guidelines — Python
(Iranian Society of Cryptology, 2021-11-01)
Recently, the interest in cybercrime and cybersecurity has increased dramatically both in terms of critical security issues and national economic information infrastructure and sensitive dealing policies, such as protection ...
Towards Measuring the Project Management Process During Large Scale Software System Implementation Phase
(Iranian Society of Cryptology, 2019-08-01)
Project management is an important factor to accomplish the decision to implement large-scale software systems (LSS) in a successful manner. The effective project management comes into play to plan, coordinate and control such ...
An Auto-Encoder based Membership Inference Attack against Generative Adversarial Network
(Iranian Society of Cryptology, 2023-07-01)
Using generative models to produce unlimited synthetic samples is a popular replacement for database sharing. Generative Adversarial Network (GAN) is a popular class of generative models which generates synthetic data ...
Improving security of double random phase encoding with chaos theory using fractal images
(Iranian Society of Cryptology, 2012-07-01)
This study presents a new method based on the combination of cryptography and information hiding methods. Firstly, the image is encoded by the Double Random Phase Encoding (DRPE) technique. The real and imaginary parts of ...
Lightweight Cryptographic S-Boxes Based on Efficient Hardware Structures for Block Ciphers
(Iranian Society of Cryptology, 2023-01-01)
In this paper, we present four low-cost substitution boxes (S-boxes) including two 4-bit S-boxes called S1 and S2 and two 8-bit S-boxes called SB1 and SB2, which are suitable for the development of lightweight block ciphers. ...
A collusion attack on the fuzzy vault scheme
(Iranian Society of Cryptology, 2009-01-01)
The Fuzzy Vault scheme is an encryption scheme, which can tolerate errors in the keys. This leads to the possibility of enhancing the security in environments where these errors can be common, such as biometrics storage ...
Forensic-Enabled Security as a Service (FESaaS) - A Readiness Framework for Cloud Forensics
(Iranian Society of Cryptology, 2021-11-01)
Digital forensics is a process of uncovering and exploring evidence from digital content. A growth in digital data in recent years has made it challenging for forensic investigators to uncover useful information. Moreover, ...
Hand Gestures Classification with Multi-Core DTW
(Iranian Society of Cryptology, 2019-08-01)
Classifications of several gesture types are very helpful in several applications. This paper tries to address fast classifications of hand gestures using DTW over multi-core simple processors. We presented a methodology ...
A Trusted Design Platform for Trojan Detection in FPGA Bitstreams Using Partial Reconfiguration
(Iranian Society of Cryptology, 2021-01-01)
Hardware Trojans have emerged as a major concern for integrated circuits in recent years. As a result, detecting Trojans has become an important issue in critical applications, such as finance and health. The ...