ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
2014 11th International ISC Conference on Information Security and Cryptology
Latest Publications
TOTAL DOCUMENTS
46
(FIVE YEARS 0)
H-INDEX
5
(FIVE YEARS 0)
Published By IEEE
9781479953837, 9781479953820
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Web driven alert verification
2014 11th International ISC Conference on Information Security and Cryptology
◽
10.1109/iscisc.2014.6994044
◽
2014
◽
Author(s):
Abolfazl Najafi
◽
Ahamd Sepahi
◽
Rasool Jalili
Download Full-text
A mafia and distance fraud high-resistance RFID distance bounding protocol
2014 11th International ISC Conference on Information Security and Cryptology
◽
10.1109/iscisc.2014.6994024
◽
2014
◽
Cited By ~ 2
Author(s):
Rahim Entezari
◽
Hossein Bahramgiri
◽
Mahnaz Tajamolian
Keyword(s):
High Resistance
◽
Distance Bounding Protocol
Download Full-text
Impossible differential cryptanalysis of LBlock through breaking down the key space
2014 11th International ISC Conference on Information Security and Cryptology
◽
10.1109/iscisc.2014.6994026
◽
2014
◽
Author(s):
Akram Khalesi
◽
Hossein Bahramgiri
◽
Davod Mansuri
Keyword(s):
Differential Cryptanalysis
◽
Key Space
◽
Impossible Differential
◽
Impossible Differential Cryptanalysis
Download Full-text
Scalable, high-throughput and modular hardware-based string matching algorithm
2014 11th International ISC Conference on Information Security and Cryptology
◽
10.1109/iscisc.2014.6994046
◽
2014
◽
Cited By ~ 1
Author(s):
Mohammad Hossein Hajiabadi
◽
Hossein Saidi
◽
Mohammad Behdadfar
Keyword(s):
High Throughput
◽
String Matching
◽
Matching Algorithm
Download Full-text
Generalization of differential criteria for Sboxes
2014 11th International ISC Conference on Information Security and Cryptology
◽
10.1109/iscisc.2014.6994013
◽
2014
◽
Author(s):
S. M. Dehnavi
◽
M. R. Mirzaee Shamsabad
◽
A. Mahmoodi Rishakani
◽
Einollah Pasha
Download Full-text
A modular two-layer system for accurate and fast traffic classification
2014 11th International ISC Conference on Information Security and Cryptology
◽
10.1109/iscisc.2014.6994039
◽
2014
◽
Cited By ~ 3
Author(s):
Fateme Hajikarami
◽
Mehdi Berenjkoub
◽
Mohammad Hossein Manshaei
Keyword(s):
Traffic Classification
◽
Layer System
Download Full-text
Random data and key generation evaluation of some commercial tokens and smart cards
2014 11th International ISC Conference on Information Security and Cryptology
◽
10.1109/iscisc.2014.6994021
◽
2014
◽
Cited By ~ 1
Author(s):
Ahmad Boorghany
◽
Siavash Bayat Sarmadi
◽
Pamian Yousefi
◽
Pouneh Gorji
◽
Rasool Jalili
Keyword(s):
Smart Cards
◽
Key Generation
◽
Random Data
Download Full-text
Petri net model of insider attacks in SCADA system
2014 11th International ISC Conference on Information Security and Cryptology
◽
10.1109/iscisc.2014.6994022
◽
2014
◽
Cited By ~ 2
Author(s):
Payam Mahmoudi Nasr
◽
Ali Yazdian Varjani
Keyword(s):
Petri Net
◽
Scada System
Download Full-text
Comparison-based agent partitioning with learning automata: A trust model for service-oriented environments
2014 11th International ISC Conference on Information Security and Cryptology
◽
10.1109/iscisc.2014.6994032
◽
2014
◽
Cited By ~ 1
Author(s):
Amir Khoshkbarchi
◽
Hamid Reza Shahriari
◽
Mehdi Amjadi
Keyword(s):
Learning Automata
◽
Trust Model
◽
Service Oriented
Download Full-text
New concepts in design of lightweight MDS diffusion layers
2014 11th International ISC Conference on Information Security and Cryptology
◽
10.1109/iscisc.2014.6994017
◽
2014
◽
Author(s):
A. Mahmoodi Rishakani
◽
S. M. Dehnavi
◽
M. R. Mirzaee Shamsabad
◽
Hamidreza Maimani
◽
Einollah Pasha
Keyword(s):
Diffusion Layers
◽
New Concepts
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close