12
Proceedings of The 8 th International ISC Conference on Information Security and Cryptology (ISCISC 2011) September 14-15, 2011 - Ferdowsi University of Mashhad Program Committee Chair Abbas Ghaemi Bafghi, PhD Ferdowsi University of Mashhad Conference Chair Mohsen Kahani, PhD Ferdowsi University of Mashhad Organized By Ferdowsi University of Mashhad - Iranian Society of Cryptology

on Information Security and Cryptology (ISCISC 2011)iscisc2011.um.ac.ir/uploading/iscisc2011.um.ac.ir/images/paper/ISCISC2011 Proceedings...Beside the presentation of the approved

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: on Information Security and Cryptology (ISCISC 2011)iscisc2011.um.ac.ir/uploading/iscisc2011.um.ac.ir/images/paper/ISCISC2011 Proceedings...Beside the presentation of the approved

Proceedings of

The 8th International ISC Conference on Information Security and Cryptology

(ISCISC 2011) September 14-15, 2011 - Ferdowsi University of Mashhad

Program Committee Chair

Abbas Ghaemi Bafghi, PhD Ferdowsi University of Mashhad

Conference Chair

Mohsen Kahani, PhD Ferdowsi University of Mashhad

Organized By

Ferdowsi University of Mashhad - Iranian Society of Cryptology

Page 2: on Information Security and Cryptology (ISCISC 2011)iscisc2011.um.ac.ir/uploading/iscisc2011.um.ac.ir/images/paper/ISCISC2011 Proceedings...Beside the presentation of the approved

Proceedings of The 8th International ISC Conference on Information Security and Cryptology (ISCISC 2011)

Organizers: Ferdowsi University of Mashhad - Iranian Society of Cryptology

Published: September 2011

------------------------------------------

ISCISC 2011 Secretariat

Address: ISCISC’11 Secretariat, Engineering Faculty, Ferdowsi University of Mashhad,

Azadi Square, Mashhad, Iran.

Tel : +98 511 8803205 & +98 511 8784177

Website: http://iscisc2011.um.ac.ir

E-mail: [email protected]

Page 3: on Information Security and Cryptology (ISCISC 2011)iscisc2011.um.ac.ir/uploading/iscisc2011.um.ac.ir/images/paper/ISCISC2011 Proceedings...Beside the presentation of the approved

Index Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Four

Organizing Committee . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Five

Program Committee Members . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Six

Reviewers List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Seven

Authors Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Ten

Table of Contents (English Papers) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Eleven

English Papers .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Twelve

Page 4: on Information Security and Cryptology (ISCISC 2011)iscisc2011.um.ac.ir/uploading/iscisc2011.um.ac.ir/images/paper/ISCISC2011 Proceedings...Beside the presentation of the approved

Preface

Security with all aspects that can be assumed – from the scientific and technological functions to social

and personal issues -affects human life and can be considered as an effective indicator of quality of

life. Four factors influencing science and technology (software, hardware, human capital and

management) cannot be designed, trained, developed and run without observing the requirements

that interaction be done in a safe environment.

Nowadays, very large volume and heterogeneous amount of data are produced and exchanged via

networks using applicational programs. Security in among the most non-functional requirements of

design and implementation of these applications and services, so that sometimes a small defect in the

security renders them useless. Therefore, the security of the information exchange environment has

become a great challenge.

The Annual Iran Society of Cryptology (ISC) Conference has focused on information security and

cryptography. The aim of the conference is to highlight the scientific and technical challenges in this

field and provide viable solutions to overcome the vulnerabilities in this space. The main strength of

the conference is the assembly and synergy of faculties and students of Computer Engineering,

Electrical Engineering and Mathematical Sciences and all other enthusiastic experts in this field..

This year, Computer Engineering department of Ferdowsi University of Mashhad, in collaboration with

Iranian Cryptology Society, is proud to host the Eighth International ISC Conference in Mashhad.

A total sum of 279 papers (201 in Persian, and 78 in English) were submitted to the conference, and

after the review process, 46 papers (31 Persian papers and 15 English papers) were accepted for

presentation at the conference. For the first time in ISC conferences, it has been planned to publish

the accepted English papers in IEEE Xplore, as well. Also, selected papers has been submitted to

ISeCure and Monadi Journal for possible publication after proper review process.

An international program committee of 30 intellectual academics and more than 100 respected

reviewers helped the conference organizers for the review process, which is hereby acknowledged.

Beside the presentation of the approved papers, two key note speeches, many workshops and a

professional exhibition have been arranged. In addition, a competition will be held during the

conference period. The participants should discover the vulnerabilities of a web application.

Hereby, I would like to acknowledge the efforts of national and international members of the program

committee, especially Dr. Abbas Ghaemi Bafghi, the program committee chair. I also extend my

gratitude to the conference organizing committee, student executive committee, faculty and staff

members of Ferdowsi University of Mashhad, and our generous sponsors and supporters. Without

their kind helps, the conference could not have been organized.

Mohsen Kahani, PhD

Chair, ISCISC 2011 Conference

Page 5: on Information Security and Cryptology (ISCISC 2011)iscisc2011.um.ac.ir/uploading/iscisc2011.um.ac.ir/images/paper/ISCISC2011 Proceedings...Beside the presentation of the approved

8th International ISC Conference

on Information Security and Cryptology (ISCISC 2011)

September 14-15, 2011 - Ferdowsi University of Mashhad

Conference Head Alireza Ashoori, PhD

Conference Chair Mohsen Kahani, PhD

Program Committee Chair Abbas Ghaemi Bafghi, PhD

Executive Committee Chair HamidReza Pourreza, PhD

International Committee Chair Abedin Vahedian, PhD

Workshops Committee Chair Ahad Harati, PhD

Publication Committee Chair Saeid Abrishami, Eng

Competition Committee Chair Mahdi Abadi, Eng

Exhibition Committee Chair Farnad Ahangari, Eng

Secretariat Manager Ehsan Tayarani Rad, Eng

Page 6: on Information Security and Cryptology (ISCISC 2011)iscisc2011.um.ac.ir/uploading/iscisc2011.um.ac.ir/images/paper/ISCISC2011 Proceedings...Beside the presentation of the approved

Program Committee Members

Affiliation Name No K. N. Toosi University of Technology, Tehran, Iran Mahmoud Ahmadian 1

Sharif University of Technology, Tehran, Iran Mohammad Reza Aref 2

University of California, Davis, US Matt Bishop 3 Isfahan University of Technology, Isfahan, Iran Mehdi Berenjkoub 4

Queensland University of Technology (QUT), Australia Ed Dawson 5

University of Guilan, Rasht, Iran Reza Ebrahimi 6

Sharif University of Technology, Tehran, Iran Taraneh Eghlidos 7 Imam Hossien University, Tehran, Iran Mahmoud Gardeshi 8

Ferdowsi University of Mashhad, Mashhad, Iran Abbas Ghaemi Bafghi 9

Telecom Italia, Turin, Italy Jovan Golic 10

Shahid Beheshri University Hossein Haji Abolhassan 11 Tehran University, Tehran, Iran Mahmoud Reza Hashemi 12

Ferdowsi University of Mashhad, Mashhad, Iran Saied Hosseini Khayat 13

Ferdowsi University of Mashhad, Mashhad, Iran Mohsen Kahani 14

Information and Communication University, Korea Kwangjo Kim 15

Yazd University, Yazd, Iran Farid Malek Ghaeeni 16

University of London, UK Keith Martin 17

Sharif University of Technology, Tehran, Iran Javad Mohajeri 18

Ferdowsi University of Mashhad, Mashhad, Iran Reza Monsefi 19 Ferdowsi University of Mashhad, Mashhad, Iran Mahmoud Naghibzadeh 20

Nanyang Technological University, Singapore Carles Padro 21

Katholieke Universiteit Leuven, Belgium Bart preneel 22

University of Warwick, Coventry, England Habib F. Rashvand 23 Katholieke Universiteit Leuven, Belgium Vincent Rijmen 24

Sharif University of Technology, Tehran, Iran Mahmoud Salmasizade 25

Iran University of Science & Technology, Tehran, Iran Hadi Shahriyar Shahhoseini 26

Intelligent Signal Processing Research Center, Tehran, Iran Javad SheykhZadegan 27 Amirkabir University of Technology, Tehran, Iran Mehran Soleyman Fallah 28

Isfahan University, Isfahan, Iran Behrouz Tork Ladani 29

Page 7: on Information Security and Cryptology (ISCISC 2011)iscisc2011.um.ac.ir/uploading/iscisc2011.um.ac.ir/images/paper/ISCISC2011 Proceedings...Beside the presentation of the approved

Reviewers List

Name Affiliation Abadi, Mahdi Tarbiat Modares University, Iran Abdollahi Azgomi, Mohammad Iran University of Science and Technology, Iran Adibnia, Fazlollah Yazd University, Iran Ahmadian, Zahra Sharif University of Technology, Iran

Ahmadian, Mahmoud K. N. Toosi University of Technology, Iran Akbarzadeh Toutounchi, Mohammad Reza Ferdowsi University of Mashhad, Iran Akhaee, Mohammad Ali Sharif University of Technology, Iran

Amini, Morteza Sharif University of Technology, Iran Analoui, Morteza Iran University of Science and Technology, Iran Ansari, Meysam Intelligent Signal Processing Research Center, Iran

Aref, Mohammad Reza Sharif University of Technology, Iran Asadpour, Masoud University of Tehran, Iran Azmi, Reza Azzahra University, Iran Bagheri, Nasour Shahid Rajaee Teacher training University, Iran Baraani Dastjerdi, Ahmad University of Isfahan, Iran Beheshti Shirazi, Seyyed Ali Asghar Iran University of Science and Technology, Iran Berenjkoub, Mahdi Isfahan University of Technology, Iran

Bishop, Matt University of California, Davis, US Cheraghi, Abbas University of Isfahan, Iran Dakhil Alian, Mohammad Isfahan University of Technology, Iran

Daneshgar, Amir Sharif University of Technology, Iran Darmani, Mohammad K. N. Toosi University of Technology, Iran Dehghan, Mahdi Amirkabir University of Technology, Iran

Doustari, Mohammad Ali Shahed University, Iran Ebrahimi Atani, Reza University of Guilan, Iran Eghlidos, Taraneh Sharif University of Technology, Iran Eslami, Ziba Shahid Beheshti University, Iran Etemadi Boroujeni, Shahram University of Isfahan, Iran Falahati, Abolfazl Iran University of Science and Technology, Iran Fanian, Ali Isfahan University of Technology, Iran Faraji Moez, Zahra Intelligent Signal Processing Research Center, Iran Fatemi, Omid University of Tehran, Iran Gardeshi, Mahmoud Imam Hossein University, Iran

Ghaem Maghami, Shahrokh Sharif University of Technology, Ghaemi Bafghi, Abbas Ferdowsi University of Mashhad, Iran Ghanbari, Mohammad Essex University, UK

Gholampour, Iman Sharif University of Technology, Iran

Page 8: on Information Security and Cryptology (ISCISC 2011)iscisc2011.um.ac.ir/uploading/iscisc2011.um.ac.ir/images/paper/ISCISC2011 Proceedings...Beside the presentation of the approved

Reviewers List-continued

Name Affiliation Golic , Jovan Telecom Italia, Turin, Italy Haji Abolhasan, Hossein Shahid Beheshti University, Iran

Hashemi, Seyyed Masoud Isfahan University of Technology, Iran Hashemi, Seyyed Hadi Isfahan University of Technology, Iran Hashemi, Mahmoud Reza University of Tehran, Iran

Hosseini Khayyat, Saeid Ferdowsi University of Mashhad, Iran Houshmand, Monireh Ferdowsi University of Mashhad, Iran Jahangir, Amir Hossein Sharif University of Technology, Iran Jami, Mohammad Reza Amirkabir University of Technology, Iran Jamzad, Mansour Sharif University of Technology, Iran Kabir, Ehsanollah Tarbiat Modares University, Iran Kahani, Mohsen Ferdowsi University of Mashhad, Iran

Kardan, Ahmad Amirkabir University of Technology, Iran Khadem, Behrouz Shahid Rajaee Teacher training University, Iran Khalouzadeh, Hamid K. N. Toosi University of Technology, Iran

Kharrazi, Mahdi Sharif University of Technology, Iran Khayyambashi, Mohammad Reza University of Isfahan, Iran Khazaei, Shahram KTH Royal Institute of Technology, Sweden

Khosravi, Ramtin University of Tehran, Iran Latif, Ali Mohammad Yazd University, Iran Mala, Hamid Isfahan University of Technology, Iran Malek Ghaeeni, Farid Mohammad Yazd University, Iran Martin, Keith University of London, UK

Meimani, Hamid Reza Institute for Studies in Theoretical Physics and Mathematics, Iran

Mirghadri, Abdorrasoul Imam Hossein University, Iran

Mirza Kouchaki, Sattar Iran University of Science and Technology, Iran Modarres Hashemi, Mahmoud Isfahan University of Technology, Iran Moein, Mohammad Shahram Research Institute for ICT, Iran Mohajeri, Javad Sharif University of Technology, Iran Mohammadi, Shahriar K. N. Toosi University of Technology, Iran Monsefi, Reza Ferdowsi University of Mashhad, Iran Moradi, Amir Bochum University, Deutschland

Mousazadeh, Mousa University of Isfahan, Iran Nader Ahmadian, Yashar Ferdowsi University of Mashhad, Iran Naghibzadeh, Mahmoud Ferdowsi University of Mashhad, Iran

Naghsh Nilchi, Ahmad Reza University of Isfahan, Iran Nemat Bakhsh, Mohammad Ali University of Isfahan, Iran

Page 9: on Information Security and Cryptology (ISCISC 2011)iscisc2011.um.ac.ir/uploading/iscisc2011.um.ac.ir/images/paper/ISCISC2011 Proceedings...Beside the presentation of the approved

Reviewers List-continued

Name Affiliation Omoumi, Masoud Isfahan University of Technology, Iran Padro, Carles Nanyang Technological University, Singapore Pakravan, Mohammad Reza Sharif University of Technology, Iran Payandeh, Ali Malek ashtar University of Technology, Iran

Pourazin, Shahriar Amirkabir University of Technology, Iran Pournaghdi, Behzad Islamic Azad University of Hamedan, Preneel, Bart Katholieke Universiteit Leuven, Belgium,

Rahmati, Mohammad Amirkabir University of Technology, Iran Rajabi Mashhadi, Habib Ferdowsi University of Mashhad, Iran Rajabzadeh Assar, Maryam Sharif University of Technology, Iran

Ramezan Yarandi, Mohsen Intelligent Signal Processing Research Center, Iran Ramezanian, Rasoul Sharif University of Technology, Iran Reyhani Tabar, Mohammad Reza Sharif University of Technology, Iran Rezvan, Mohammad Reza Sharif University of Technology, Iran Rostami, Saeid Zaeim Electronic Industries, Iran Sabaei, Masoud Amirkabir University of Technology, Iran Sabzinezhad, Mohammad Intelligent Signal Processing Research Center, Iran

Sadr, Ali Iran University of Science and Technology, Iran Saeidi, Hossein Isfahan University of Technology, Iran Saleh Esfehani, Mahmoud Imam Hossein University, Iran

Salmasizadeh, Mahmoud Sharif University of Technology, Iran Samadani, Mohammad Hasan Isfahan University of Technology, Iran Sameti, Hossein Sharif University of Technology, Iran

Shahgholi Ghahfarokhi , Behrouz University of Isfahan, Iran Shahriar Shahhosseini, Hadi Iran University of Science and Technology, Iran Shahriari, Hamid Reza Amirkabir University of Technology, Iran Shahsavaran, Akbar SAFAVA, Iran Shakeri, Hasan Ferdowsi University of Mashhad, Iran Sharifi, Mohsen Iran University of Science and Technology, Iran Sheykhzadegan, Javad Intelligent Signal Processing Research Center, Iran Shir Ali, Mohammad Hasan Amirkabir University of Technology, Iran Soleyman Fallah, Mehran Amirkabir University of Technology, Iran Tadayyon, Mohammad Hesam Research Institude for ICT, Iran

Taheri, Hasan Amirkabir University of Technology, Iran Tork Ladani, Behrouz University of Isfahan, Iran Yazdian, Ali Tarbiat Modares University, Iran

Zamani, Bahman University of Isfahan, Iran

Page 10: on Information Security and Cryptology (ISCISC 2011)iscisc2011.um.ac.ir/uploading/iscisc2011.um.ac.ir/images/paper/ISCISC2011 Proceedings...Beside the presentation of the approved

Authors Index

Asghar, Mamoona . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83

Amin Ghaffari, Vahid . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37,41

Daraee, Fatemeh . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67

Dastghaibyfard, Gholamhossein . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79

Eslami, Ziba . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73

Gardeshi, Mahmud . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49

Ghaemi Bafghi, Abbas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . 9, 15, 29

Ghanbari, Mohammed . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83

Habibi, Mohammad Hassan . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49

Hakimi, Ahmad . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61

Hosseini-khayat, Saied . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45

Houshmand, Monireh . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45

Jalali Bidgoli, Amir . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

Mehrnejad, Maryam . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29

Moghimi, Mohammad Mahdi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . 21

Mohajeri, Javad . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .41, 55

Mohammadi, Somayyeh . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61

Mozaffari, Saeed . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67

KazemNasab Haji , Mohammad . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . 73

Rahmani, Ehsan . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79

Rahmani, Peyman .. . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79

Sadoghi Yazdi, Hadi . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15

Salmasizadeh, Mahmoud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . .. . . . . . 55

Saraee, Mohammad . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21

Shakeri, Hassan . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9, 15

Talebi, Siamak . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61

Toreini, Ehsan . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29

Tork Ladani, Behrouz . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

Vardasbi, Ali . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37, 55

Page 11: on Information Security and Cryptology (ISCISC 2011)iscisc2011.um.ac.ir/uploading/iscisc2011.um.ac.ir/images/paper/ISCISC2011 Proceedings...Beside the presentation of the approved

Table of Contents (English Papers)

Trust Modeling and Verification Using Colored Petri Nets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

Amir Jalali Bidgoli, Behrouz Tork Ladani RTBIMS: Accuracy Enhancement in Iterative Multiplication Strategy for Computing Propagated

Trust . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

Hassan Shakeri, Abbas Ghaemi Bafghi Computing Trust Resultant using Intervals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15

Hassan Shakeri, Abbas Ghaemi Bafghi, Hadi Sadoghi Yazdi Hybrid Rule Threshold Adjustment System for Intrusion Detection . . . . . . . . . . . . . . . . . . . . . . . . 21

Mohammad Mahdi Moghimi, Mohammad Saraee Security Analyzing and Designing GUI with the Resources Model . . . . . . . . . . . . . . . . . . . . . . . . . 29

Maryam Mehrnejad, Ehsan Toreini, Abbas Ghaemi Bafghi On the Period of GSM’s A5/1 Stream Cipher and Its Internal State Transition Structure . . . . . . 37

Vahid Amin Ghaffari, Ali Vardasbi An Improved Attack on A5/1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41

Vahid Amin Ghafari, Javad Mohajeri An Entanglement-based Quantum Key Distribution Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45

Monireh Houshmand, Saied Hosseini-khayat Cryptanalysis and Improvement on a New RFID Mutual Authentication Protocol Compatible with

EPC Standard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49

Mohammad Hassan Habibi, Mahmud Gardeshi Multiple-Chi-square Tests and Their Application on Distinguishing Attacks . . . . . . . . . . . . . . . . . 55

Ali Vardasbi, Mahmoud Salmasizadeh, Javad Mohajeri A Secure and Robust Video Watermarking Based on Chaotic Maps . . . . . . . . . . . . . . . . . . . . . . . 61

Somayyeh Mohammadi, Siamak Talebi, Ahmad Hakimi Watermarking in Farsi/Arabic binary document images using fractal coding . . . . . . . . . . . . . . . . 67

Fatemeh Daraee, Saeed Mozaffari An efficient buyer-seller watermarking protocol based on proxy signatures . . . . . . . . . . . . . . . 73

Mohammad KazemNasab Haji, Ziba Eslami A Reversible Data Embedding Scheme Based on Search Order Coding for VQ Index Tables . . . 79

Peyman Rahmani, Gholamhossein Dastghaibyfard, Ehsan Rahmani Cryptographic Keys Management for H.264 Scalable Coded Video Security . . . . . . . . . . . . . . . . . 83

Mamoona Asghar, Mohammed Ghanbari

Page 12: on Information Security and Cryptology (ISCISC 2011)iscisc2011.um.ac.ir/uploading/iscisc2011.um.ac.ir/images/paper/ISCISC2011 Proceedings...Beside the presentation of the approved

ISCISC 2011

English Papers