حاميان کنفرانس
     

جستجو
     


ورود به سیستم
     




 ارسال مجدد ایمیل تایید؟
 فراموشی رمز ورود
 کاربر جدید ؟ ثبت نام

   

 ISCISC 2011 Proceedings and Conference Book




Conference Book (Abstracts, Technical Program, . . .)

Download

(Farsi Section)

Download

(English Section)

No.

Title

Authors

Paper File

Present File

1

Preface, Organization Committee, . . .


Download


2

Trust Modeling and Verification Using Colored Petri Nets

Amir Jalali Bidgoli

Behrouz Tork Ladani

Download

Download

3

RTBIMS: Accuracy Enhancement in Iterative Multiplication Strategy for Computing Propagated Trust

Hassan Shakeri

Abbas Ghaemi Bafghi

Download

Download

4

Computing Trust Resultant using Intervals

Hassan Shakeri

Abbas Ghaemi Bafghi

Hadi Sadoghi Yazdi

Download

Download

5

Hybrid Rule Threshold Adjustment System for Intrusion Detection

Mohammad Mahdi Moghimi

Mohammad Saraee

Download

Download

6

Security Analyzing and Designing GUI with the Resources Model

Maryam Mehrnejad

Ehsan Toreini

Abbas Ghaemi Bafghi

Download

Download

7

On the Period of GSM’s A5/1 Stream Cipher and Its Internal State Transition Structure

Vahid Amin Ghaffari

Ali Vardasbi

Download

Download

8

An Improved Attack on A5/1

Vahid Amin Ghafari

Javad Mohajeri

Download

Download

9

An Entanglement-based Quantum Key Distribution Protocol

Monireh Houshmand

Saied Hosseini-khayat

Download

Download

10

Cryptanalysis and Improvement on a New RFID Mutual Authentication Protocol Compatible with EPC Standard

Mohammad Hassan Habibi

Mahmud Gardeshi

Download

Download

11

Multiple-Chi-square Tests and Their Application on Distinguishing Attacks

Ali Vardasbi

Mahmoud Salmasizadeh

Javad Mohajeri

Download

Download

12

A Secure and Robust Video Watermarking Based on Chaotic Maps

Somayyeh Mohammadi

Siamak Talebi

Ahmad Hakimi

Download

Download

13

Watermarking in Farsi/Arabic binary document images using fractal coding

Fatemeh Daraee

Saeed Mozaffari

Download

Download

14

An efficient buyer-seller watermarking protocol based on proxy signatures

Mohammad KazemNasab Haji

Ziba Eslami

Download

Download

15

A Reversible Data Embedding Scheme Based on Search Order Coding for VQ Index Tables

Peyman Rahmani

Gholamhossein Dastghaibyfard

Ehsan Rahmani

Download

Download

16

Cryptographic Keys Management for H.264 Scalable Coded Video Security

Mamoona Asghar

Mohammed Ghanbari

Download

Download


فهرست اصلي
     

Select Language
     

پیوندها
     

Home Page | About us | Contact us | Site Map 

  تعداد بازدید کنندگان : 879880
©2011 Ferdowsi University Of Mashhad.