Expected Coverage of Perfect Chains in the Hellman Time Memory Trade-Off
1. Expected Coverage of Perfect Chains in the Hellman Time Memory Trade-Off

Naser Hossein Gharavi; Abdorasool Mirghadri; Mohammad Abdollahi Azgomi; Sayyed Ahmad Mousavi

Volume 3, Issue 3 , Summer and Autumn 2016, Pages 155-162

Abstract
  Critical overlap situations in the classical Hellman's cryptanalytic time memory trade-off method can be avoided, provided that during the precomputation phase, we generate perfect ...  Read More
Security Analysis of an EPC Class-1 Generation-2 Compliant RFID Authentication Protocol
2. Security Analysis of an EPC Class-1 Generation-2 Compliant RFID Authentication Protocol

Fereidoun Moradi; Hamid Mala; Behrouz Tork Ladani; Fariba Moradi

Volume 3, Issue 3 , Summer and Autumn 2016, Pages 163-174

Abstract
  Design of secure authentication solutions for low-cost RFID tags is still an open and quite challenging problem, though many protocols have been published in the last decade. In 2013, ...  Read More
A New Hybrid Method for VoIP Stream Steganography
3. A New Hybrid Method for VoIP Stream Steganography

Hossein Moodi; Ahmad Reza Naghsh-Nilchi

Volume 3, Issue 3 , Summer and Autumn 2016, Pages 175-182

Abstract
  In this article, a new stream steganography method for real time digital data network environment with the focus on VoIP is presented. This method consists of a combination of Least ...  Read More
Effect of Purposeful Feature Extraction in High-dimensional Kinship Verification Problem
4. Effect of Purposeful Feature Extraction in High-dimensional Kinship Verification Problem

Pendar Alirezazadeh; Abdolhossein Fathi; Fardin Abdali-Mohammadi

Volume 3, Issue 3 , Summer and Autumn 2016, Pages 183-191

Abstract
  Recently, researchers have shown an increased interest in kinship verification via facial images in the field of computer vision. The matter of fact is that kinship verification is ...  Read More