Volume 1, Issue 1
مرور بر اساس
ارسال های اخیر
-
A collusion attack on the fuzzy vault scheme
(Iranian Society of Cryptology, 2009-01-01)The Fuzzy Vault scheme is an encryption scheme, which can tolerate errors in the keys. This leads to the possibility of enhancing the security in environments where these errors can be common, such as biometrics storage ...
-
A TESLA-based mutual authentication protocol for GSM networks
(Iranian Society of Cryptology, 2009-01-01)The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol ...
-
Steganalysis of embedding in difference of image pixel pairs by neural network
(Iranian Society of Cryptology, 2009-01-01)In this paper a steganalysis method is proposed for pixel value differencing method. This steganographic method, which has been immune against conventional attacks, performs the embedding in the difference of the values ...



