Volume 12, Issue 2
مرور بر اساس
ارسال های اخیر
-
F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management
(Iranian Society of Cryptology, 2020-07-01)Distributed Denial of Service (DDoS) is a common attack in recent years that can deplete the bandwidth of victim nodes by flooding packets. Based on the type and quantity of traffic used for the attack and the exploited ...
-
Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems
(Iranian Society of Cryptology, 2020-07-01)Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. ...
-
A Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions
(Iranian Society of Cryptology, 2020-07-01)A non-interactive (t,n)-publicly veri able secret sharing scheme (non-interactive (t,n)-PVSS scheme) is a (t,n)-secret sharing scheme in which anyone, not only the participants of the scheme, can verify the correctness of ...
-
GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
(Iranian Society of Cryptology, 2020-07-01)Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the ...
-
Enhanced Flush+Reload Attack on AES
(Iranian Society of Cryptology, 2020-07-01)In cloud computing, multiple users can share the same physical machine that can potentially leak secret information, in particular when the memory de-duplication is enabled. Flush+Reload attack is a cache-based attack that ...
-
CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking
(Iranian Society of Cryptology, 2020-07-01)Authenticated encryption schemes are important cryptographic primitives that received extensive attention recently. They can provide both confidentiality and authenticity services, simultaneously. Correlation power analysis ...



