حاميان کنفرانس
     

جستجو
     


ورود به سیستم
     






 ارسال مجدد ایمیل تایید؟

 آيا کلمه عبور خود را فراموش کرده ايد؟

 کاربر جدید هستید؟ ثبت نام کنید.

   

Accepted Papers

The review process for the 8th International ISC Conference on Information Security and Cryptology (ISCISC 2011) has been completed.
The conference received 279 submissions from different countries, which were reviewed by international experts. Only about 17% (47 papers- 31 Farsi papers & 16 English paper) of the submitted papers were selected for presentation and publication in the conference proceedings.
ISCISC 2011 is sponsored by Iran Society of Cryptology, Ferdowsi University of Mashhad and IEEE Iran Section.


In order to have your paper included in the proceedings successfully, you must finish the following steps:

1- Revise your paper according to the Reviewer's Comments in the attachment carefully.
2- Format your paper according to the Guidelines for the Preparation of a Manuscript.
3- Submission of a regular paper implies that at least one of the authors will have a  normal (Non Student) registration to the Conference and present the paper upon acceptance.


Paper Title

Paper ID

No

RTBIMS: Accuracy Enhancement in Iterative Multiplication Strategy for Computing Propagated Trust

149

1

Cryptographic Keys Management for H.264 Scalable Coded Video Security

160

2

Computing Trust Resultant using Intervals

171

3

A Secure and Robust Video Watermarking Based on Chaotic Maps

202

4

An Entanglement-based quantum key distribution protocol

210

5

Multiple-Chi-square Tests and Their Application on Distinguishing Attacks

224

6

On the Period of GSM’s A5/1 Stream Cipher and Its Internal State Transition Structure

225

7

Security Analyzing and Designing GUI with the Resources Model

247

8

hybrid rule threshold adjustment system for intrusion detection

265

9

An Improved Attack on A5/1

299

10

Watermarking in Farsi binary document images using fractal coding

302

11

A Reversible Data Embedding Scheme Based on Search Order Coding for VQ Index Tables

310

12

Attacks and Improvement to an RFID Authentication Protocol Conforming to EPC C-1 G-2 Standard

313

13

Trust Modeling and Verification Using Colored Petri Nets

316

14

An efficient buyer-seller watermarking protocol based on proxy signatures

333

15

New Color Image Encryption Based on Hyper Chaos

354

16


فهرست اصلي
     

Select Language
     

پیوندها
     

Home Page | About us | Contact us | Site Map 

  تعداد بازدید کنندگان : 723928
©2011 Ferdowsi University Of Mashhad.