Volume 7, Issue 1


ارسال های اخیر

  • Optimizing image steganography by combining the GA and ICA 

    Sadeghi, F.؛ Zarisfi Kermani, F.؛ Kuchaki Rafsanjani, M. (Iranian Society of Cryptology, 2015-01-01)
    In this study, a novel approach which uses combination of steganography and cryptography for hiding information into digital images as host media is proposed. In the process, secret data is first encrypted using the ...

  • GGRA: a grouped gossip-based reputation aggregation algorithm 

    Ghasemi Falavarjani, S.؛ Tork Ladani, Behrouz؛ Ghasemi, S. (Iranian Society of Cryptology, 2015-01-01)
    An important issue in P2P networks is the existence of malicious nodes that decreases the performance of such networks. Reputation system in which nodes are ranked based on their behavior, is one of the proposed solutions ...

  • A combination of semantic and attribute-based access control model for virtual organizations 

    Amini, M.؛ Arasteh, M. (Iranian Society of Cryptology, 2015-01-01)
    A Virtual Organization (VO) consists of some real organizations with common interests, which aims to provide inter organizational associations to reach some common goals by sharing their resources with each other. Providing ...

  • Security-aware register placement to hinder malicious hardware updating and improve Trojan detectability 

    Vosoughi, M.؛ Jahanian, A. (Iranian Society of Cryptology, 2015-01-01)
    Nowadays, bulk of the designers prefer to outsource some parts of their design and fabrication process to the third-part companies due to the reliability problems, manufacturing cost and time-to-market limitations. In this ...

  • Persian Abstract 

    پدیدآور نامشخص (Iranian Society of Cryptology, 2015-01-01)

  • A traceable optimistic fair exchange protocol in the standard model 

    Ganjavi, R.؛ Rajabzadeh Asaar, M.؛ Salmasizadeh, M. (Iranian Society of Cryptology, 2015-01-01)
    An Optimistic Fair Exchange (OFE) protocol is a good way for two parties to exchange their digital items in a fair way such that at the end of the protocol execution, both of them receive their items or none of them receive ...

  • A novel local search method for microaggregation 

    Mortazavi, R.؛ Jalili, S. (Iranian Society of Cryptology, 2015-01-01)
    In this paper, we propose an effective microaggregation algorithm to produce a more useful protected data for publishing. Microaggregation is mapped to a clustering problem with known minimum and maximum group size ...

  • Editorial 

    Jalili, R. (Iranian Society of Cryptology, 2015-01-01)
    From the Editor-in-Chief