Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Mohsen
    Last name: Toorani
    Company: University of Bergen
    Personal website: http://www.researcherid.com/rid/A-9528-2009
    Researcher ID: A-9528-2009
    DBLP: 71/4184
    Rating: (7)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 32 of 32  
    Select a publication
    Show Title Venue Rating Date
    Journal article
    Mehdi Chehel Amirani, Mohsen Toorani, Asghar Beheshti.
    A new approach to content-based file type detection
    CoRR 2010, Volume 0 (1) 2010
    Journal article
    Mohsen Toorani, Asghar Beheshti.
    SSMS - A Secure SMS Messaging Protocol for the M-payment Systems
    CoRR 2010, Volume 0 (0) 2010
    Journal article
    Mohsen Toorani, Asghar Beheshti.
    Solutions to the GSM Security Weaknesses
    CoRR 2010, Volume 0 (0) 2010
    Journal article
    Mohsen Toorani.
    SMEmail - A New Protocol for the Secure E-mail in Mobile Environments
    CoRR 2010, Volume 0 (0) 2010
    Journal article
    Mohsen Toorani, Asghar Beheshti.
    LPKI - A Lightweight Public Key Infrastructure for the Mobile Environments
    CoRR 2010, Volume 0 (0) 2010
    Journal article
    Mohsen Toorani, Asghar Beheshti.
    Cryptanalysis of an Efficient Signcryption Scheme with Forward Secrecy Based on Elliptic Curve
    CoRR 2010, Volume 0 (0) 2010
    Journal article
    Mohsen Toorani, Asghar Beheshti.
    A Directly Public Verifiable Signcryption Scheme based on Elliptic Curves
    CoRR 2010, Volume 0 (0) 2010
    Journal article
    Mohsen Toorani, Abolfazl Falahati.
    A Secure Variant of the Hill Cipher
    CoRR 2010, Volume 0 (0) 2010
    Journal article
    Mohsen Toorani, Asghar Beheshti.
    Cryptanalysis of an Elliptic Curve-based Signcryption Scheme
    CoRR 2010, Volume 0 (0) 2010
    Journal article
    Mohsen Toorani, Asghar Beheshti.
    An Elliptic Curve-based Signcryption Scheme with Forward Secrecy
    CoRR 2010, Volume 0 (0) 2010
    Conference paper
    Mohsen Toorani.
    On Vulnerabilities of the Security Association in the IEEE 802.15.6 Standard.
    CoRR 2015, Volume 0 (0) 2015
    Conference paper
    Mohsen Toorani.
    Security protocols in a nutshell.
    CoRR 2016, Volume 0 (0) 2016
    Conference paper
    Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Håvard Raddum, Mohsen Toorani.
    Using Cryptography to Control Your Data at a Distance.
    ERCIM News 2016, Volume 2016 (0) 2016
    Conference paper
    Mohsen Toorani.
    On Vulnerabilities of the Security Association in the IEEE 802.15.6 Standard.
    Financial Cryptography and Data Security - FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers 2015 (0) 2015
    Journal article
    Mohsen Toorani, Asghar Beheshti.
    Cryptanalysis of an Elliptic Curve-based Signcryption Scheme.
    I. J. Network Security 2010, Volume 10 (0) 2010
    Conference paper
    Mohsen Toorani.
    Cryptanalysis of Two PAKE Protocols for Body Area Networks and Smart Environments.
    I. J. Network Security 2015, Volume 17 (0) 2015
    Journal article
    Mohsen Toorani, Maryam Saeed.
    Security Weaknesses of password-only authenticated key establishment protocol without public key cryptography.
    IACR Cryptology ePrint Archive 2011, Volume 2011 (0) 2011
    Conference paper
    Mohsen Toorani.
    Security Analysis of J-PAKE.
    IACR Cryptology ePrint Archive 2012, Volume 2012 (0) 2012
    Conference paper
    Mohsen Toorani.
    On Continuous After-the-Fact Leakage-Resilient Key Exchange.
    IACR Cryptology ePrint Archive 2014, Volume 2014 (0) 2014
    Conference paper
    Frederik Armknecht, Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Mohsen Toorani.
    Side channels in deduplication: trade-offs between leakage and efficiency.
    IACR Cryptology ePrint Archive 2016, Volume 2016 (0) 2016
    Conference paper
    Mohsen Toorani.
    Security analysis of J-PAKE.
    IEEE Symposium on Computers and Communications, ISCC 2014, Funchal, Madeira, Portugal, June 23-26, 2014 2014 (0) 2014
    Conference paper
    Mohsen Toorani.
    Security analysis of the IEEE 802.15.6 standard.
    Int. J. Communication Systems 2016, Volume 29 (0) 2016
    Conference paper
    Mehdi Chehel Amirani, Mohsen Toorani, Asghar Beheshti.
    A new approach to content-based file type detection.
    Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), July 6-9, Marrakech, Morocco 2008 (1) 2008
    Conference paper
    Mohsen Toorani, Asghar Beheshti.
    SSMS - A secure SMS messaging protocol for the m-payment systems.
    Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), July 6-9, Marrakech, Morocco 2008 (1) 2008
    Conference paper
    Mohsen Toorani, Abolfazl Falahati.
    A secure variant of the Hill Cipher.
    Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), July 5-8, Sousse, Tunisia 2009 (1) 2009
    Conference paper
    Mohsen Toorani, Asghar Beheshti.
    A directly public verifiable signcryption scheme based on elliptic curves.
    Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), July 5-8, Sousse, Tunisia 2009 (1) 2009
    Conference paper
    Frederik Armknecht, Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Mohsen Toorani.
    Side Channels in Deduplication: Trade-offs between Leakage and Efficiency.
    Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017 2017 (0) 2017
    Conference paper
    Mohsen Toorani.
    On Continuous After-the-Fact Leakage-Resilient Key Exchange.
    Proceedings of the Second Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2015, Amsterdam, Netherlands, January 19-21, 2015 2015 (0) 2015
    Conference paper
    Mohsen Toorani, Abolfazl Falahati.
    A secure cryptosystem based on affine transformation.
    Security and Communication Networks 2011, Volume 4 (0) 2011
    Journal article
    Mehdi Chehel Amirani, Mohsen Toorani, Sara Mihandoost.
    Feature-based Type Identification of File Fragments.
    Security and Communication Networks 2013, Volume 6 (0) 2013
    Conference paper
    Mohsen Toorani.
    Cryptanalysis of a new protocol of wide use for email with perfect forward secrecy.
    Security and Communication Networks 2015, Volume 8 (0) 2015
    Journal article
    Mohsen Toorani.
    Cryptanalysis of a robust key agreement based on public key authentication.
    Security and Communication Networks 2016, Volume 9 (0) 2016
    Show item 1 to 32 of 32  

    Your query returned 32 matches in the database.