Search Results - "2012 9th International ISC Conference on Information Security and Cryptology"

Refine Results
  1. 1

    KerNeeS: A protocol for mutual authentication between NFC phones and POS terminals for secure payment transactions by Ceipidor, U. B., Medaglia, C. M., Marino, A., Sposato, S., Moroni, A.

    “…The aim of this paper is to propose a solution for a potential vulnerability in mobile proximity payment. The mobile proximity payment is the evolution of the…”
    Get full text
    Conference Proceeding
  2. 2

    Dynamic malware detection using registers values set analysis by Ghiasi, M., Sami, A., Salehi, Z.

    “…The number of Malicious files increase every day because of existing open source malware and obfuscation techniques. It means that traditional signature-based…”
    Get full text
    Conference Proceeding
  3. 3

    Real-time attack scenario detection via intrusion detection alert correlation by Zali, Z., Hashemi, M. R., Saidi, H.

    “…Alert correlation systems attempt to discover the relations among alerts produced by one or more intrusion detection systems to determine the attack scenarios…”
    Get full text
    Conference Proceeding
  4. 4

    Mutual implementation of predefined and random challenges over RFID distance bounding protocol by Jannati, H., Falahati, A.

    “…Distance bounding protocols are launched based upon the round trip time measurements of the carried out messages to defend RFID systems against the relay…”
    Get full text
    Conference Proceeding
  5. 5

    Authentication based on signature verification using position, velocity, acceleration and Jerk signals by Rashidi, S., Fallah, A., Towhidkhah, F.

    “…Signature verification techniques utilize many different characteristics of an individual. The selection of signature features is critical in determining the…”
    Get full text
    Conference Proceeding
  6. 6

    An ID-based key agreement protocol based on ECC among users of separate networks by Farash, M. S., Attari, M. A.

    “…This paper proposes an identity based key agreement protocol based on elliptic curve cryptography (ECC) between users of different networks with independent…”
    Get full text
    Conference Proceeding
  7. 7

    On the security of an ECC based RFID authentication protocol by Babaheidarian, P., Delavar, M., Mohajeri, J.

    “…Following the fact that there are some efficient implementations of ECC-based RFID authentication protocols on RFID tags, a new family of RFID authentication…”
    Get full text
    Conference Proceeding
  8. 8

    A new image steganography based on denoising methods in wavelet domain by Motamedi, Hoda, Jafari, A.

    “…This paper introduces a novel wavelet-based method to perform image steganography utilizing image denoising algorithms by wavelet thresholding. Steganographic…”
    Get full text
    Conference Proceeding
  9. 9

    Modeling Sybil attacker behavior in VANETs by Kafil, P., Fathy, M., Lighvan, M. Z.

    “…Vehicular Ad-Hoc Networks (VANET) is mainly designed to provide human safety, traffic management, and infotainment services. The decision how to react on…”
    Get full text
    Conference Proceeding
  10. 10

    A trust and reputation-based access control model for virtual organizations by Arasteh, Majid, Amini, M., Jalili, R.

    “…Virtual organization (VO) is aimed to provide inter-organizational collaborations. Constructing a VO necessitates provision of security and access control…”
    Get full text
    Conference Proceeding
  11. 11

    A modified dual watermarking scheme for digital images with tamper localization/detection and recovery capabilities by Tashk, A., Danyali, H., Alavianmehr, Mohammad Ali

    “…The privacy and integrity protection of digital documents specially the case of biomedical images is a vital subject in the current world of telecommunication…”
    Get full text
    Conference Proceeding
  12. 12

    Using user similarity to infer trust values in social networks regardless of direct ratings by Mohammadhassanzadeh, H., Shahriari, H. R.

    “…Social networks recently get more attention on the Internet. Although they were introduced to facilitate relationships, now users may utilize them to get…”
    Get full text
    Conference Proceeding
  13. 13

    An improvement of image secret sharing and hiding with authentication by Aghaziarati, S., Saryazdi, S., Nezamabadipour, H.

    “…In recent years, researchers has proposed (t, n)-threshold image secret sharing and hiding schemes with authentication. The secret image is shared and hided…”
    Get full text
    Conference Proceeding
  14. 14

    Policy specification and enforcement in online social networks using MKNF by Alizadeh, M., Javadi, S. A., Amini, M., Jalili, R.

    “…Emerging tools that ease sharing information in online social networks (OSNs) can cause various privacy issues for users. Access control is the main security…”
    Get full text
    Conference Proceeding
  15. 15

    An efficient end to end key establishment protocol for wireless sensor networks by Fanian, A., Berenjkoub, M.

    “…Sensor networks are suitable candidates for military and scientific applications such as border security and environmental monitoring. They are usually…”
    Get full text
    Conference Proceeding
  16. 16

    An image watermarking algorithm based on chaotic maps and wavelet transform by Mohammadi, S., Talebi, S.

    “…Chaotic maps and their applications in watermarking algorithms aimed at achieving secure communications have attracted a growing interest recently. This is…”
    Get full text
    Conference Proceeding
  17. 17

    Non-monotonocity in OrBAC through default and exception policy rules by Javadi, S. A., Amini, M., Jalili, R.

    “…Context-awareness is an essential requirement of modern access control models. Organization-Based Access Control (OrBAC) model is a powerful context-aware…”
    Get full text
    Conference Proceeding
  18. 18

    A dynamic, zero-message broadcast encryption scheme based on secure multiparty computation by Mohammadi, M. S., Bafghi, A. G.

    “…In this paper we present a new broadcast encryption scheme based on threshold secret-sharing and secure multiparty computation which has three main features:…”
    Get full text
    Conference Proceeding
  19. 19

    FOO e-voting protocol: Inductive analysis of the eligibility property by Miramirkhani, N. S., Jalili, R., Yarmohamadi, M.

    “…There are two main approaches in verifying security protocols: model checking and theorem proving. Inductive Method is one of the notable works based on pure…”
    Get full text
    Conference Proceeding
  20. 20

    Structural TLR algorithm for anomaly detection based on Danger Theory by Nejad, F. S., Salkhi, R., Azmi, R., Pishgoo, B.

    “…Artificial Immune Systems have long been used in the field of computer security and especially in Intrusion Detection systems. The first generation of AISs…”
    Get full text
    Conference Proceeding