Volgen
Mohsen Toorani
Mohsen Toorani
Associate Professor, University of South-Eastern Norway (USN)
Geverifieerd e-mailadres voor usn.no - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
SSMS - A secure SMS messaging protocol for the m-payment systems
M Toorani, A Beheshti
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC …, 2008
1422008
Solutions to the GSM Security Weaknesses
M Toorani, A Beheshti
Proceedings of the 2nd International Conference on Next Generation Mobile …, 2008
1412008
A new approach to content-based file type detection
MC Amirani, M Toorani, A Beheshti
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC …, 2008
902008
LPKI - a Lightweight Public Key Infrastructure for the mobile environments
M Toorani, A Beheshti
Proceedings of the 11th IEEE International Conference on Communication …, 2008
852008
On Vulnerabilities of the Security Association in the IEEE 802.15.6 Standard
M Toorani
Financial Cryptography and Data Security 8976, 245-260, 2015
812015
An elliptic curve-based signcryption scheme with forward secrecy
M Toorani, A Beheshti
Journal of Applied Sciences 9 (6), 1025-1035, 2009
752009
A secure variant of the Hill Cipher
M Toorani, A Falahati
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC …, 2009
702009
Cryptanalysis of an elliptic curve-based signcryption scheme
M Toorani, A Beheshti
International Journal of Network Security 10 (1), 51-56, 2010
542010
Feature‐based Type Identification of File Fragments
MC Amirani, M Toorani, S Mihandoost
Security and Communication Networks 6 (1), 115-128, 2013
512013
Cryptanalysis of an efficient signcryption scheme with forward secrecy based on elliptic curve
M Toorani, A Beheshti
Proceedings of 2008 International Conference on Computer and Electrical …, 2008
412008
A secure cryptosystem based on affine transformation
M Toorani, A Falahati
Security and Communication Networks 4 (2), 207-215, 2011
372011
Side channels in deduplication: trade-offs between leakage and efficiency
F Armknecht, C Boyd, GT Davies, K Gjøsteen, M Toorani
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2016
342016
Security analysis of the IEEE 802.15.6 standard
M Toorani
International Journal of Communication Systems 29 (17), 2471-2489, 2016
302016
SMEmail - A New Protocol for the Secure E-mail in Mobile Environments
M Toorani
Proceedings of the Australian Telecommunications Networks and Applications …, 2008
292008
A decentralized dynamic pki based on blockchain
M Toorani, C Gehrmann
Proceedings of the 36th annual ACM symposium on applied computing, 1646-1655, 2021
242021
A directly public verifiable signcryption scheme based on elliptic curves
M Toorani, A Beheshti
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC …, 2009
222009
Cryptanalysis of Two PAKE Protocols for Body Area Networks and Smart Environments
M Toorani
International Journal of Network Security 17 (5), 629-636, 2015
192015
On continuous after-the-fact leakage-resilient key exchange
M Toorani
Proceedings of the Second Workshop on Cryptography and Security in Computing …, 2015
182015
Cryptanalysis of a robust key agreement based on public key authentication
M Toorani
Security and Communication Networks 9 (1), 19-26, 2016
112016
Security Evaluation of the Short Message Service
M Toorani, M Ahmadian Attari
10*2008
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20