Volume 6, Issue 2


ارسال های اخیر

  • A hybrid approach for database intrusion detection at transaction and inter-transaction levels 

    Doroudian, M.؛ Shahriari, H. R. (Iranian Society of Cryptology, 2014-07-01)
    Nowadays, information plays an important role in organizations. Sensitive information is often stored in databases. Traditional mechanisms such as encryption, access control, and authentication cannot provide a high level ...

  • A two-phase wormhole attack detection scheme in MANETs 

    Shamaei, Sh.؛ Movaghar, A. (Iranian Society of Cryptology, 2014-07-01)
    Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically ...

  • An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks 

    fanian, A.؛ Alamifar, F.؛ Berenjkoub, M. (Iranian Society of Cryptology, 2014-07-01)
    The wireless communication with delivering variety of services to users is growing rapidly in recent years. The third generation of cellular networks (3G), and local wireless networks (WLAN) are the two widely used ...

  • An extended feature set for blind image steganalysis in contourlet domain 

    Shakeri, E.؛ Ghaemmaghami, Sh. (Iranian Society of Cryptology, 2014-07-01)
    The aim of image steganalysis is to detect the presence of hidden messages in stego images. We propose a blind image steganalysis method in Contourlet domain and then show that the embedding process changes statistics of ...

  • Persian Abstract 

    پدیدآور نامشخص (Iranian Society of Cryptology, 2014-07-01)

  • Editorial 

    Jalili, R. (Iranian Society of Cryptology, 2014-07-01)
    From the Editor-in-Chief

  • A risk model for cloud processes 

    Damiani, E.؛ Cimato, S.؛ Gianini, G. (Iranian Society of Cryptology, 2014-07-01)
    Traditionally, risk assessment consists of evaluating the probability of "feared events", corresponding to known threats and attacks, as well as these events' severity, corresponding to their impact on one or more ...

  • Artemia: a family of provably secure authenticated encryption schemes 

    Alizadeh, J.؛ Aref, M. R.؛ Bagheri, N. (Iranian Society of Cryptology, 2014-07-01)
    Authenticated encryption schemes establish both privacy and authenticity. This paper specifies a family of the dedicated authenticated encryption schemes, Artemia. It is an online nonce-based authenticated encryption scheme ...