Volume 1, Issue 2

 

ارسال های اخیر

  • Security testing of session initiation protocol implementations 

    Harris, I.؛ Alrahem, T.؛ Chen, A.؛ DiGiuseppe, N.؛ Gee, J.؛ Hsiao, Sh.؛ Mattox, S.؛ Park, T.؛ Selvaraj, S.؛ Tam, A.؛ Carlsson, M. (Iranian Society of Cryptology, 2009-07-01)
    The mechanisms which enable the vast majority of computer attacks are based on design and programming errors in networked applications. The growing use of voice over IP (VOIP) phone technology makes these phone applications ...

  • Image flip CAPTCHA 

    Tariq Banday, M.؛ A. Shah, N. (Iranian Society of Cryptology, 2009-07-01)
    The massive and automated access to Web resources through robots has made it essential for Web service providers to make some conclusion about whether the "user" is a human or a robot. A Human Interaction Proof (HIP) like ...

  • An efficient blind signature scheme based on the elliptic curve discrete logarithm problem 

    Nikooghadam, M.؛ Zakerolhosseini, A. (Iranian Society of Cryptology, 2009-07-01)
    Elliptic Curve Cryptosystems (ECC) have recently received significant attention by researchers due to their high performance such as low computational cost and small key size. In this paper a novel untraceable blind signature ...

  • Editorial 

    Jalili, R. (Iranian Society of Cryptology, 2009-07-01)
    From the Editor-in-Chief

  • Moving dispersion method for statistical anomaly detection in intrusion detection systems 

    Golic', J. (Iranian Society of Cryptology, 2009-07-01)
    A unified method for statistical anomaly detection in intrusion detection systems is theoretically introduced. It is based on estimating a dispersion measure of numerical or symbolic data on successive moving windows in ...