Volume 2, Issue 2


ارسال های اخیر

  • Authorization models for secure information sharing: a survey and research agenda 

    Salim, F.؛ Reid, J.؛ Dawson, E. (Iranian Society of Cryptology, 2010-07-01)
    This article presents a survey of authorization models and considers their 'fitness-for-purpose' in facilitating information sharing. Network-supported information sharing is an important technical capability that underpins ...

  • An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks 

    Fanian, A.؛ Berenjkoub, M.؛ Saidi, H.؛ Gulliver, T. (Iranian Society of Cryptology, 2010-07-01)
    An essential requirement for providing secure services in wireless sensor networks is the ability to establish pairwise keys among sensors. Due to resource constraints on the sensors, the key establishment scheme should ...

  • Detection of perturbed quantization (PQ) steganography based on empirical matrix 

    Abolghasemi, M.؛ Aghaeinia, H.؛ Faez, K. (Iranian Society of Cryptology, 2010-07-01)
    Perturbed Quantization (PQ) steganography scheme is almost undetectable with the current steganalysis methods. We present a new steganalysis method for detection of this data hiding algorithm. We show that the PQ method ...

  • High capacity steganography tool for Arabic text using 'Kashida' 

    Gutub, A.؛ Al-Nazer, A. (Iranian Society of Cryptology, 2010-07-01)
    Steganography is the ability to hide secret information in a cover-media such as sound, pictures and text. A new approach is proposed to hide a secret into Arabic text cover media using "Kashida", an Arabic extension ...

  • Editorial 

    Jalili, R. (Iranian Society of Cryptology, 2010-07-01)
    From the Editor-in-Chief