Volume 4, Issue 1


ارسال های اخیر

  • SEIMCHA: a new semantic image CAPTCHA using geometric transformations 

    Mehrnejad, M.؛ Ghaemi Bafghi, A.؛ Harati, A.؛ Toreini, E. (Iranian Society of Cryptology, 2012-01-01)
    As protection of web applications are getting more and more important every day, CAPTCHAs are facing booming attention both by users and designers. Nowadays, it is well accepted that using visual concepts enhance security ...

  • Persian Abstract 

    پدیدآور نامشخص (Iranian Society of Cryptology, 2012-01-01)

  • A chaos-based video watermarking algorithm 

    Mohammadi, S.؛ Hakimi, A. (Iranian Society of Cryptology, 2012-01-01)
    The intriguing characteristics of chaotic maps have prompted researchers to use these sequences in watermarking systems to good effect. In this paper we aim to use a tent map to encrypt the binary logo to achieve a like-noise ...

  • BotOnus: an online unsupervised method for Botnet detection 

    Yahyazadeh, M.؛ Abadi, M. (Iranian Society of Cryptology, 2012-01-01)
    Botnets are recognized as one of the most dangerous threats to the Internet infrastructure. They are used for malicious activities such as launching distributed denial of service attacks, sending spam, and leaking personal ...

  • On the multi _ chi-square tests and their data complexity 

    Vardasbi, A.؛ Salmasizadeh, M.؛ Mohajeri, J. (Iranian Society of Cryptology, 2012-01-01)
    Chi-square tests are generally used for distinguishing purposes; however when they are combined to simultaneously test several independent variables, extra notation is required. In this study, the chi-square statistics in ...

  • Improving the Rao-Nam secret key cryptosystem using regular EDF-QC-LDPC codes 

    Hooshmand, R.؛ Eghlidos, T.؛ Aref, M. R. (Iranian Society of Cryptology, 2012-01-01)
    This paper proposes an efficient joint secret key encryption-channel coding cryptosystem, based on regular Extended Difference Family Quasi-Cyclic Low-Density Parity-Check codes. The key length of the proposed cryptosystem ...

  • Private Key based query on encrypted data 

    Afzali, H.؛ Nemati, H.؛ Azmi, R. (Iranian Society of Cryptology, 2012-01-01)
    Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, ...

  • Editorial 

    Jalili, R. (Iranian Society of Cryptology, 2012-01-01)
    From the Editor-in-Chief

  • BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms 

    Barani, F.؛ Abadi, M. (Iranian Society of Cryptology, 2012-01-01)
    Mobile ad hoc networks (MANETs) are multi-hop wireless networks of mobile nodes constructed dynamically without the use of any fixed network infrastructure. Due to inherent characteristics of these networks, malicious nodes ...