مرور Volume 9, Issue 1 بر اساس تاریخ انتشار
در حال نمایش موارد 1 - 6 از 6
-
An efficient certificateless signcryption scheme in the standard model
(Iranian Society of Cryptology, 2017-01-01)Certificateless public key cryptography (CL-PKC) is a useful method in order to solve the problems of traditional public key infrastructure (i.e., large amount of computation, storage and communication costs for managing ...
-
Persian Abstract
(Iranian Society of Cryptology, 2017-01-01)Persian abstracts of the issue's article
-
A new security proof for FMNV continuous non-malleable encoding scheme
(Iranian Society of Cryptology, 2017-01-01)A non-malleable code is a variant of an encoding scheme which is resilient to tampering attacks. The main idea behind non-malleable coding is that the adversary should not be able to obtain any valuable information about ...
-
Side channel parameter characteristics of code injection attacks
(Iranian Society of Cryptology, 2017-01-01)Embedded systems are suggestive targets for code injection attacks in the recent years. Software protection mechanisms, and in general computers, are not usually applicable in embedded systems since they have limited ...
-
An automatic test case generator for evaluating implementation of access control policies
(Iranian Society of Cryptology, 2017-01-01)One of the main requirements for providing software security is the enforcement of access control policies which aim to protect resources of the system against unauthorized accesses. Any error in the implementation of such ...
-
LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring
(Iranian Society of Cryptology, 2017-01-01)Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although ...



