مرور Volume 11, Issue 2 بر اساس عنوان
در حال نمایش موارد 1 - 8 از 8
-
Anomaly Detection Using SVM as Classifier and Decision Tree for Optimizing Feature Vectors
(Iranian Society of Cryptology, 2019-07-01)Abstract- With the advancement and development of computer network technologies, the way for intruders has become smoother; therefore, to detect threats and attacks, the importance of intrusion detection systems (IDS) as ...
-
Detection of Fake Accounts in Social Networks Based on One Class Classification
(Iranian Society of Cryptology, 2019-07-01)Detection of fake accounts on social networks is a challenging process. The previous methods in identification of fake accounts have not considered the strength of the users' communications, hence reducing their efficiency. ...
-
Interdependent Security Game Design over Constrained Linear Influence Networks
(Iranian Society of Cryptology, 2019-07-01)In today's highly interconnected networks, security of the entities are often interdependent. This means security decisions of the agents are not only influenced by their own costs and constraints, but also are affected ...
-
A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications
(Iranian Society of Cryptology, 2019-07-01)Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, ...
-
New Fixed Point Attacks on GOST2 Block Cipher
(Iranian Society of Cryptology, 2019-07-01)GOST block cipher designed in the 1970s and published in 1989 as the Soviet and Russian standard GOST 28147-89. In order to enhance the security of GOST block cipher after proposing various attacks on it, designers published ...
-
Persian Abstract
(Iranian Society of Cryptology, 2019-07-01)Persian abstracts of the issue''s article
-
Relaxed Differential Fault Analysis of SHA-3
(Iranian Society of Cryptology, 2019-07-01)In this paper, we propose a new method of differential fault analysis of SHA-3 which is based on the differential relations of the algorithm. Employing those differential relations in the fault analysis of SHA-3 gives new ...



