Volume 5, Issue 2

 

ارسال های اخیر

  • STLR: a novel danger theory based structural TLR algorithm 

    Azmi, R.؛ Pishgoo, B. (Iranian Society of Cryptology, 2013-07-01)
    Artificial Immune Systems (AIS) have long been used in the field of computer security and especially in Intrusion Detection systems. Intrusion detection based on AISs falls into two main categories. The first generation ...

  • Persian Abstract 

    پدیدآور نامشخص (Iranian Society of Cryptology, 2013-07-01)

  • A semantic-aware role-based access control model for pervasive computing environments 

    Javadi, A.؛ Amini, M. (Iranian Society of Cryptology, 2013-07-01)
    Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access ...

  • GTrust: a group based trust model 

    Ezhei, M.؛ Tork Ladani, B. (Iranian Society of Cryptology, 2013-07-01)
    Nowadays, the growth of virtual environments such as virtual organizations, social networks, and ubiquitous computing, has led to the adoption of trust concept. One of the methods of making trust in such environments is ...

  • A computational model and convergence theorem for rumor dissemination in social networks 

    Amoozgar, M.؛ Ramezanian, R. (Iranian Society of Cryptology, 2013-07-01)
    The spread of rumors, which are known as unverified statements of uncertain origin, may threaten the society and it's controlling, is important for national security councils of countries. If it would be possible to identify ...

  • Prediction of user's trustworthiness in web-based social networks via text mining 

    Mohammadhassanzadeh, H.؛ Shahriari, H. R. (Iranian Society of Cryptology, 2013-07-01)
    In Social networks, users need a proper estimation of trust in others to be able to initialize reliable relationships. Some trust evaluation mechanisms have been offered, which use direct ratings to calculate or propagate ...

  • Convertible limited (multi-) verifier signature: new constructions and applications 

    Avizheh, S.؛ Rajabzadeh Asaar, M.؛ Salmasizadeh, M. (Iranian Society of Cryptology, 2013-07-01)
    A convertible limited (multi-) verifier signature (CL(M)VS) provides controlled verifiability and preserves the privacy of the signer. Furthermore, limited verifier(s) can designate the signature to a third party or convert ...

  • Editorial 

    Jalili, R. (Iranian Society of Cryptology, 2013-07-01)
    From the Editor-in-Chief