Follow
Ziba Eslami
Ziba Eslami
Associate professor of Computer Science, Shahid Beheshti University
Verified email at sbu.ac.ir - Homepage
Title
Cited by
Cited by
Year
An authenticated image encryption scheme based on chaotic maps and memory cellular automata
A Bakhshandeh, Z Eslami
Optics and Lasers in Engineering 51 (6), 665-673, 2013
1672013
Secret image sharing based on cellular automata and steganography
Z Eslami, SH Razzaghi, JZ Ahmadabadi
Pattern Recognition 43 (1), 397-404, 2010
1242010
A verifiable multi-secret sharing scheme based on cellular automata
Z Eslami, JZ Ahmadabadi
Information Sciences 180 (15), 2889-2894, 2010
962010
A new untraceable off-line electronic cash system
Z Eslami, M Talebi
Electronic Commerce Research and Applications 10 (1), 59-66, 2011
862011
An improvement over an image encryption method based on total shuffling
Z Eslami, A Bakhshandeh
Optics Communications 286, 51-55, 2013
752013
Certificateless aggregate signcryption: Security model and a concrete construction secure in the random oracle model
Z Eslami, N Pakniat
Journal of King Saud University-Computer and Information Sciences 26 (3 …, 2014
692014
Secret image sharing with authentication-chaining and dynamic embedding
Z Eslami, JZ Ahmadabadi
Journal of Systems and Software 84 (5), 803-809, 2011
672011
Public key authenticated encryption with keyword search: revisited
M Noroozi, Z Eslami
IET Information Security 13 (4), 336-342, 2019
612019
Secret image sharing scheme with hierarchical threshold access structure
N Pakniat, M Noroozi, Z Eslami
Journal of Visual Communication and Image Representation 25 (5), 1093-1101, 2014
512014
Certificateless authenticated encryption with keyword search: Enhanced security model and a concrete construction for industrial IoT
N Pakniat, D Shiraly, Z Eslami
Journal of Information Security and Applications 53, 102525, 2020
482020
Improvement of (n, n)-multi-secret image sharing schemes based on Boolean operations
S Kabirirad, Z Eslami
Journal of Information Security and Applications 47, 16-27, 2019
392019
A new verifiable multi-secret sharing scheme based on bilinear maps
Z Eslami, S Kabiri Rad
Wireless Personal Communications 63 (2), 459-467, 2012
392012
Public-key encryption with keyword search: a generic construction secure against online and offline keyword guessing attacks
M Noroozi, Z Eslami
Journal of Ambient Intelligence and Humanized Computing 11 (2), 879-890, 2020
312020
A verifiable threshold secret sharing scheme based on lattices
B Rajabi, Z Eslami
Information Sciences 501, 655-661, 2019
302019
Pairing-free certificateless authenticated encryption with keyword search
D Shiraly, N Pakniat, M Noroozi, Z Eslami
Journal of Systems Architecture 124, 102390, 2022
282022
A (t, n)-multi secret image sharing scheme based on Boolean operations
S Kabirirad, Z Eslami
Journal of Visual Communication and Image Representation 57, 39-47, 2018
282018
Distributed key generation protocol with hierarchical threshold access structure
N Pakniat, M Noroozi, Z Eslami
IET Information Security 9 (4), 248-255, 2015
212015
Cryptanalysis of a multiparty quantum key agreement protocol based on commutative encryption
R Mohajer, Z Eslami
Quantum Information Processing 16, 1-9, 2017
172017
Comments on a chaos-based public key encryption with keyword search scheme
M Noroozi, Z Eslami, N Pakniat
Nonlinear Dynamics 94, 1127-1132, 2018
152018
Designing a secure designated server identity-based encryption with keyword search scheme: still unsolved
M Noroozi, I Karoubi, Z Eslami
Annals of Telecommunications 73 (11), 769-776, 2018
132018
The system can't perform the operation now. Try again later.
Articles 1–20