Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Mohsen
    Last name: Toorani
    Company: University of Bergen
    Personal website: http://www.researcherid.com/rid/A-9528-2009
    Researcher ID: A-9528-2009
    DBLP: 71/4184
    Rating: (7)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 10 of 31  
    Select a publication
    Show Title Venue Rating Date
    Journal article
    Mehdi Chehel Amirani, Mohsen Toorani, Asghar Beheshti.
    A new approach to content-based file type detection
    CoRR 2010, Volume 0 (1) 2010
    Conference paper
    Mohsen Toorani, Abolfazl Falahati.
    A secure variant of the Hill Cipher.
    Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), July 5-8, Sousse, Tunisia 2009 (1) 2009
    Conference paper
    Mohsen Toorani, Asghar Beheshti.
    A directly public verifiable signcryption scheme based on elliptic curves.
    Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), July 5-8, Sousse, Tunisia 2009 (1) 2009
    Conference paper
    Mehdi Chehel Amirani, Mohsen Toorani, Asghar Beheshti.
    A new approach to content-based file type detection.
    Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), July 6-9, Marrakech, Morocco 2008 (1) 2008
    Conference paper
    Mohsen Toorani, Asghar Beheshti.
    SSMS - A secure SMS messaging protocol for the m-payment systems.
    Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), July 6-9, Marrakech, Morocco 2008 (1) 2008
    Journal article
    Mohsen Toorani.
    Cryptanalysis of a robust key agreement based on public key authentication.
    Security and Communication Networks 2016, Volume 9 (0) 2016
    Journal article
    Mohsen Toorani.
    Security protocols in a nutshell.
    CoRR 2016, Volume 0 (0) 2016
    Conference paper
    Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Håvard Raddum, Mohsen Toorani.
    Using Cryptography to Control Your Data at a Distance.
    ERCIM News 2016, Volume 2016 (0) 2016
    Conference paper
    Frederik Armknecht, Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Mohsen Toorani.
    Side channels in deduplication: trade-offs between leakage and efficiency.
    IACR Cryptology ePrint Archive 2016, Volume 2016 (0) 2016
    Conference paper
    Mohsen Toorani.
    Security analysis of the IEEE 802.15.6 standard.
    Int. J. Communication Systems 2016, Volume 29 (0) 2016
    Show item 1 to 10 of 31  

    Your query returned 31 matches in the database.