Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Mohsen
    Last name: Toorani
    Company: University of Bergen
    Personal website: http://www.researcherid.com/rid/A-9528-2009
    Researcher ID: A-9528-2009
    DBLP: 71/4184
    Rating: (7)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 10 of 32  
    Select a publication
    Show Title Venue Rating Date
    Journal article
    Mehdi Chehel Amirani, Mohsen Toorani, Asghar Beheshti.
    A new approach to content-based file type detection
    CoRR 2010, Volume 0 (1) 2010
    Conference paper
    Mohsen Toorani, Abolfazl Falahati.
    A secure variant of the Hill Cipher.
    Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), July 5-8, Sousse, Tunisia 2009 (1) 2009
    Conference paper
    Mohsen Toorani, Asghar Beheshti.
    A directly public verifiable signcryption scheme based on elliptic curves.
    Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), July 5-8, Sousse, Tunisia 2009 (1) 2009
    Conference paper
    Mehdi Chehel Amirani, Mohsen Toorani, Asghar Beheshti.
    A new approach to content-based file type detection.
    Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), July 6-9, Marrakech, Morocco 2008 (1) 2008
    Conference paper
    Mohsen Toorani, Asghar Beheshti.
    SSMS - A secure SMS messaging protocol for the m-payment systems.
    Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), July 6-9, Marrakech, Morocco 2008 (1) 2008
    Conference paper
    Frederik Armknecht, Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Mohsen Toorani.
    Side Channels in Deduplication: Trade-offs between Leakage and Efficiency.
    Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017 2017 (0) 2017
    Journal article
    Mohsen Toorani.
    Cryptanalysis of a robust key agreement based on public key authentication.
    Security and Communication Networks 2016, Volume 9 (0) 2016
    Conference paper
    Mohsen Toorani.
    Security protocols in a nutshell.
    CoRR 2016, Volume 0 (0) 2016
    Conference paper
    Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Håvard Raddum, Mohsen Toorani.
    Using Cryptography to Control Your Data at a Distance.
    ERCIM News 2016, Volume 2016 (0) 2016
    Conference paper
    Frederik Armknecht, Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Mohsen Toorani.
    Side channels in deduplication: trade-offs between leakage and efficiency.
    IACR Cryptology ePrint Archive 2016, Volume 2016 (0) 2016
    Show item 1 to 10 of 32  

    Your query returned 32 matches in the database.