Volume 4, Issue 1
مرور بر اساس
ارسال های اخیر
-
SEIMCHA: a new semantic image CAPTCHA using geometric transformations
(Iranian Society of Cryptology, 2012-01-01)As protection of web applications are getting more and more important every day, CAPTCHAs are facing booming attention both by users and designers. Nowadays, it is well accepted that using visual concepts enhance security ...
-
A chaos-based video watermarking algorithm
(Iranian Society of Cryptology, 2012-01-01)The intriguing characteristics of chaotic maps have prompted researchers to use these sequences in watermarking systems to good effect. In this paper we aim to use a tent map to encrypt the binary logo to achieve a like-noise ...
-
BotOnus: an online unsupervised method for Botnet detection
(Iranian Society of Cryptology, 2012-01-01)Botnets are recognized as one of the most dangerous threats to the Internet infrastructure. They are used for malicious activities such as launching distributed denial of service attacks, sending spam, and leaking personal ...
-
Improving the Rao-Nam secret key cryptosystem using regular EDF-QC-LDPC codes
(Iranian Society of Cryptology, 2012-01-01)This paper proposes an efficient joint secret key encryption-channel coding cryptosystem, based on regular Extended Difference Family Quasi-Cyclic Low-Density Parity-Check codes. The key length of the proposed cryptosystem ...
-
BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms
(Iranian Society of Cryptology, 2012-01-01)Mobile ad hoc networks (MANETs) are multi-hop wireless networks of mobile nodes constructed dynamically without the use of any fixed network infrastructure. Due to inherent characteristics of these networks, malicious nodes ...
-
On the multi _ chi-square tests and their data complexity
(Iranian Society of Cryptology, 2012-01-01)Chi-square tests are generally used for distinguishing purposes; however when they are combined to simultaneously test several independent variables, extra notation is required. In this study, the chi-square statistics in ...
-
Private Key based query on encrypted data
(Iranian Society of Cryptology, 2012-01-01)Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, ...



