Volume 10, Issue 2


ارسال های اخیر

  • Feature-based Malicious URL and attack type detection using multi-class classification 

    Patil, Dharmaraj؛ Patil, Jayantrao (Iranian Society of Cryptology, 2018-07-01)
    Nowadays, malicious URLs are the common threat to the businesses, social networks, net-banking etc. However, malicious URLs deal with various Web attacks like phishing, spamming and malware distribution. Existing approaches ...

  • Feature-based Malicious URL and Attack Type Detection Using Multi-class Classification 

    Patil, D.؛ Patil, J. (Iranian Society of Cryptology, 2018-07-01)
    Nowadays, malicious URLs are the common threat to the businesses, social networks, net-banking. Existing approaches have focused on binary detection i.e., either the URL is malicious or benign. Very few literature is found ...

  • Persian Abstract 

    پدیدآور نامشخص (Iranian Society of Cryptology, 2018-07-01)
    Persian abstracts of the issue's article

  • On the Security of O-PSI: A Delegated Private Set Intersection on Outsourced Datasets (Extended Version) 

    Mahdavi Oliaee, M.؛ Delavar, M.؛ Ameri, M.H.؛ Mohajeri, J.؛ Aref, M.R. (Iranian Society of Cryptology, 2018-07-01)
    In recent years, determining the common information privately and efficiently between two mutually mistrusting parties have become an important issue in social networks. Many Private Set Intersection (PSI) protocols have ...

  • Distributed Contingency Logic and Security 

    Ramezanian, R. (Iranian Society of Cryptology, 2018-07-01)
    In information security, ignorance is not bliss. It is always stated that hiding the protocols (let the other be ignorant about it) does not increase the security of organizations. However, there are cases that ignorance ...

  • Editorial 

    Aref, M.R. (Iranian Society of Cryptology, 2018-07-01)
    From the Editor-in-Chief

  • Impossible Differential Cryptanalysis on Deoxys-BC-256 

    Moazami, F.؛ Mehrdad, A.R.؛ Soleimany, H. (Iranian Society of Cryptology, 2018-07-01)
    Deoxys is a final-round candidate of the CAESAR competition. Deoxys is built upon an internal tweakable block cipher Deoxys-BC, where in addition to the plaintext and key, it takes an extra non-secret input called a tweak. ...

  • Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version) 

    Soltani, N.؛ Bohlooli, R.؛ Jalili, R. (Iranian Society of Cryptology, 2018-07-01)
    One of the security issues in data outsourcing is the enforcement of the data owner's access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of ...

  • A Survey of Anomaly Detection Approaches in Internet of Things 

    Behniafar, M.؛ Nowroozi, A.R.؛ Shahriari, H.R. (Iranian Society of Cryptology, 2018-07-01)
    Internet of Things is an ever-growing network of heterogeneous and constraint nodes which are connected to each other and the Internet. Security plays an important role in such networks. Experience has proved that encryption ...