Volume 4, Issue 2

 

ارسال های اخیر

  • A confidence-aware interval-based trust model 

    Shakeri, H.؛ Ghaemi Bafghi, A. (Iranian Society of Cryptology, 2012-07-01)
    It is a common and useful task in a web of trust to evaluate the trust value between two nodes using intermediate nodes. This technique is widely used when the source node has no experience of direct interaction with the ...

  • Analyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications 

    Mabuto, E.؛ Venter, H. (Iranian Society of Cryptology, 2012-07-01)
    The products of graphic design applications leave behind traces of digital information which can be used during a digital forensic investigation in cases where counterfeit documents have been created. This paper analyzes ...

  • Persian Abstract 

    پدیدآور نامشخص (Iranian Society of Cryptology, 2012-07-01)

  • Editorial 

    Jalili, R. (Iranian Society of Cryptology, 2012-07-01)
    From the Editor-in-Chief

  • Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach 

    Zali, Z.؛ Hashemi, M. R.؛ Saidi, H. (Iranian Society of Cryptology, 2012-07-01)
    Alert correlation systems attempt to discover the relations among alerts produced by one or more intrusion detection systems to determine the attack scenarios and their main motivations. In this paper a new IDS alert ...

  • Improving security of double random phase encoding with chaos theory using fractal images 

    Taheri, M.؛ Mozaffari, S. (Iranian Society of Cryptology, 2012-07-01)
    This study presents a new method based on the combination of cryptography and information hiding methods. Firstly, the image is encoded by the Double Random Phase Encoding (DRPE) technique. The real and imaginary parts of ...

  • Eigenvalues-based LSB steganalysis 

    Farhat, F.؛ Diyanat, A.؛ Ghaemmaghami, Sh.؛ Aref, M. R. (Iranian Society of Cryptology, 2012-07-01)
    So far, various components of image characteristics have been used for steganalysis, including the histogram characteristic function, adjacent colors distribution, and sample pair analysis. However, some certain steganography ...

  • Cryptanalysis of GSM encryption algorithm A5/1 

    Amin Ghafari, V.؛ Vardasbi, A.؛ Mohajeri, J. (Iranian Society of Cryptology, 2012-07-01)
    The A5/1 algorithm is one of the most famous stream cipher algorithms used for over-the-air communication privacy in GSM. The purpose of this paper is to analyze several weaknesses of A5/1, including an improvement to an ...