مرور Volume 8, Issue 2 بر اساس عنوان
در حال نمایش موارد 1 - 6 از 6
-
ASIC design protection against reverse engineering during the fabrication process using automatic netlist obfuscation design flow
(Iranian Society of Cryptology, 2016-07-01)Fab-less business model in semiconductor industry has led to serious concerns about trustworthy hardware. In untrusted foundries and manufacturing companies, submitted layout may be analyzed and reverse engineered to steal ...
-
Optimum decoder for multiplicative spread spectrum image watermarking with Laplacian modeling
(Iranian Society of Cryptology, 2016-07-01)This paper investigates the multiplicative spread spectrum watermarking method for the image. The information bit is spreaded into middle-frequency Discrete Cosine Transform (DCT) coefficients of each block of an image ...
-
Quantitative evaluation of software security: an approach based on UML/SecAM and evidence theory
(Iranian Society of Cryptology, 2016-07-01)Quantitative and model-based prediction of security in the architecture design stage facilitates early detection of design faults hence reducing modification costs in subsequent stages of software life cycle. However, an ...
-
Traceability improvements of a new RFID protocol based on EPC C1 G2
(Iranian Society of Cryptology, 2016-07-01)Radio Frequency Identification (RFID) applications have spread all over the world. In order to provide their security and privacy, researchers proposed different kinds of protocols. In this paper, we analyze the privacy ...



