TDG
Scholar
Committed to research!
Version 1.7
Home
|
Bibliography
|
Writers
|
Journals
|
Conferences
|
Publishers
Help
|
News
Bibliography
Refine on click
|
Report
|
Share
A total of 32 records were found in 0.109 seconds
Fetch
|
Report
|
Google
Side Channels in Deduplication: Trade-offs between Leakage and Efficiency
Frederik Armknecht
,
Colin Boyd
,
Gareth T. Davies
,
Kristian Gjøsteen
,
Mohsen Toorani
AsiaCCS
,
266-274
,
2017
Fetch
|
Report
|
Google
Using Cryptography to Control Your Data at a Distance
Colin Boyd
,
Gareth T. Davies
,
Kristian Gjøsteen
,
Håvard Raddum
,
Mohsen Toorani
ERCIM News
,
2016(106)
,
2016
Fetch
|
Report
|
Google
Security protocols in a nutshell
Mohsen Toorani
CoRR
,
abs/1605.09771
,
2016
Fetch
|
Report
|
Google
Side channels in deduplication: trade-offs between leakage and efficiency
Frederik Armknecht
,
Colin Boyd
,
Gareth T. Davies
,
Kristian Gjøsteen
,
Mohsen Toorani
IACR Cryptology ePrint Archive
,
2016977
,
2016
Fetch
|
Report
|
Google
Security analysis of the IEEE 802.15.6 standard
Mohsen Toorani
Int. J. Communication Systems
,
29(17):2471-2489
,
2016
Fetch
|
Report
|
Google
Cryptanalysis of a robust key agreement based on public key authentication
Mohsen Toorani
Security and Communication Networks
,
9(1):19-26
,
2016
Fetch
|
Report
|
Google
On Vulnerabilities of the Security Association in the IEEE 802.15.6 Standard
Mohsen Toorani
Financial Cryptography Workshops
,
245-260
,
2015
Fetch
|
Report
|
Google
On Continuous After-the-Fact Leakage-Resilient Key Exchange
Mohsen Toorani
CS2@HiPEAC
,
31-34
,
2015
Fetch
|
Report
|
Google
Cryptanalysis of Two PAKE Protocols for Body Area Networks and Smart Environments
Mohsen Toorani
I. J. Network Security
,
17(5):629-636
,
2015
Fetch
|
Report
|
Google
On Vulnerabilities of the Security Association in the IEEE 802.15.6 Standard
Mohsen Toorani
CoRR
,
abs/1501.02601
,
2015
Fetch
|
Report
|
Google
Cryptanalysis of a new protocol of wide use for email with perfect forward secrecy
Mohsen Toorani
Security and Communication Networks
,
8(4):694-701
,
2015
Fetch
|
Report
|
Google
Security analysis of J-PAKE
Mohsen Toorani
ISCC
,
1-6
,
2014
Fetch
|
Report
|
Google
On Continuous After-the-Fact Leakage-Resilient Key Exchange
Mohsen Toorani
IACR Cryptology ePrint Archive
,
20141010
,
2014
Fetch
|
Report
|
Google
Feature-based Type Identification of File Fragments
Mehdi Chehel Amirani
,
Mohsen Toorani
,
Sara Mihandoost
Security and Communication Networks
,
6(1):115-128
,
2013
Fetch
|
Report
|
Google
Security Analysis of J-PAKE
Mohsen Toorani
IACR Cryptology ePrint Archive
,
201221
,
2012
Fetch
|
Report
|
Google
A secure cryptosystem based on affine transformation
Mohsen Toorani
,
Abolfazl Falahati
Security and Communication Networks
,
4(2):207-215
,
2011
Fetch
|
Report
|
Google
Security Weaknesses of password-only authenticated key establishment protocol without public key cryptography
Mohsen Toorani
,
Maryam Saeed
IACR Cryptology ePrint Archive
,
2011527
,
2011
Fetch
|
Report
|
Google
Cryptanalysis of an Elliptic Curve-based Signcryption Scheme
Mohsen Toorani
,
Ali Asghar Beheshti Shirazi
CoRR
,
abs/1004.3521
,
2010
Fetch
|
Report
|
Google
An Elliptic Curve-based Signcryption Scheme with Forward Secrecy
Mohsen Toorani
,
Ali Asghar Beheshti Shirazi
CoRR
,
abs/1005.1856
,
2010
Fetch
|
Report
|
Google
Cryptanalysis of an Elliptic Curve-based Signcryption Scheme
Mohsen Toorani
,
Ali Asghar Beheshti Shirazi
I. J. Network Security
,
10(1):51-56
,
2010
Fetch
|
Report
|
Google
SSMS - A Secure SMS Messaging Protocol for the M-payment Systems
Mohsen Toorani
,
Ali Asghar Beheshti Shirazi
CoRR
,
abs/1002.3171
,
2010
Fetch
|
Report
|
Google
A new approach to content-based file type detection
Mehdi Chehel Amirani
,
Mohsen Toorani
,
Asghar Beheshti
CoRR
,
abs/1002.3174
,
2010
Fetch
|
Report
|
Google
Solutions to the GSM Security Weaknesses
Mohsen Toorani
,
Ali Asghar Beheshti Shirazi
CoRR
,
abs/1002.3175
,
2010
Fetch
|
Report
|
Google
SMEmail - A New Protocol for the Secure E-mail in Mobile Environments
Mohsen Toorani
CoRR
,
abs/1002.3176
,
2010
Fetch
|
Report
|
Google
LPKI - A Lightweight Public Key Infrastructure for the Mobile Environments
Mohsen Toorani
,
Ali Asghar Beheshti Shirazi
CoRR
,
abs/1002.3299
,
2010
Fetch
|
Report
|
Google
Cryptanalysis of an Efficient Signcryption Scheme with Forward Secrecy Based on Elliptic Curve
Mohsen Toorani
,
Ali Asghar Beheshti Shirazi
CoRR
,
abs/1002.3303
,
2010
Fetch
|
Report
|
Google
A Directly Public Verifiable Signcryption Scheme based on Elliptic Curves
Mohsen Toorani
,
Asghar Beheshti
CoRR
,
abs/1002.3316
,
2010
Fetch
|
Report
|
Google
A Secure Variant of the Hill Cipher
Mohsen Toorani
,
Abolfazl Falahati
CoRR
,
abs/1002.3567
,
2010
Fetch
|
Report
|
Google
A secure variant of the Hill Cipher
Mohsen Toorani
,
Abolfazl Falahati
ISCC
,
313-316
,
2009
Fetch
|
Report
|
Google
A directly public verifiable signcryption scheme based on elliptic curves
Mohsen Toorani
,
Ali Asghar Beheshti Shirazi
ISCC
,
713-716
,
2009
Fetch
|
Report
|
Google
A new approach to content-based file type detection
Mehdi Chehel Amirani
,
Mohsen Toorani
,
Ali Asghar Beheshti Shirazi
ISCC
,
1103-1108
,
2008
Fetch
|
Report
|
Google
SSMS - A secure SMS messaging protocol for the m-payment systems
Mohsen Toorani
,
Ali Asghar Beheshti Shirazi
ISCC
,
700-705
,
2008