Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Mohsen
    Last name: Toorani
    Company: University of Bergen
    Personal website: http://www.researcherid.com/rid/A-9528-2009
    Researcher ID: A-9528-2009
    DBLP: 71/4184
    Rating: (7)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 11 to 20 of 32  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Mohsen Toorani.
    Security analysis of the IEEE 802.15.6 standard.
    Int. J. Communication Systems 2016, Volume 29 (0) 2016
    Conference paper
    Mohsen Toorani.
    On Continuous After-the-Fact Leakage-Resilient Key Exchange.
    Proceedings of the Second Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2015, Amsterdam, Netherlands, January 19-21, 2015 2015 (0) 2015
    Conference paper
    Mohsen Toorani.
    Cryptanalysis of a new protocol of wide use for email with perfect forward secrecy.
    Security and Communication Networks 2015, Volume 8 (0) 2015
    Journal article
    Mohsen Toorani.
    On Vulnerabilities of the Security Association in the IEEE 802.15.6 Standard.
    CoRR 2015, Volume 0 (0) 2015
    Conference paper
    Mohsen Toorani.
    Cryptanalysis of Two PAKE Protocols for Body Area Networks and Smart Environments.
    I. J. Network Security 2015, Volume 17 (0) 2015
    Conference paper
    Mohsen Toorani.
    On Vulnerabilities of the Security Association in the IEEE 802.15.6 Standard.
    Financial Cryptography and Data Security - FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers 2015 (0) 2015
    Conference paper
    Mohsen Toorani.
    Security analysis of J-PAKE.
    IEEE Symposium on Computers and Communications, ISCC 2014, Funchal, Madeira, Portugal, June 23-26, 2014 2014 (0) 2014
    Conference paper
    Mohsen Toorani.
    On Continuous After-the-Fact Leakage-Resilient Key Exchange.
    IACR Cryptology ePrint Archive 2014, Volume 2014 (0) 2014
    Journal article
    Mehdi Chehel Amirani, Mohsen Toorani, Sara Mihandoost.
    Feature-based Type Identification of File Fragments.
    Security and Communication Networks 2013, Volume 6 (0) 2013
    Conference paper
    Mohsen Toorani.
    Security Analysis of J-PAKE.
    IACR Cryptology ePrint Archive 2012, Volume 2012 (0) 2012
    Show item 11 to 20 of 32  

    Your query returned 32 matches in the database.