Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Mohsen
    Last name: Toorani
    Company: University of Bergen
    Personal website: http://www.researcherid.com/rid/A-9528-2009
    Researcher ID: A-9528-2009
    DBLP: 71/4184
    Rating: (7)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 10 of 32  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Frederik Armknecht, Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Mohsen Toorani.
    Side Channels in Deduplication: Trade-offs between Leakage and Efficiency.
    Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017 2017 (0) 2017
    Conference paper
    Mohsen Toorani.
    Security analysis of the IEEE 802.15.6 standard.
    Int. J. Communication Systems 2016, Volume 29 (0) 2016
    Conference paper
    Frederik Armknecht, Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Mohsen Toorani.
    Side channels in deduplication: trade-offs between leakage and efficiency.
    IACR Cryptology ePrint Archive 2016, Volume 2016 (0) 2016
    Conference paper
    Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Håvard Raddum, Mohsen Toorani.
    Using Cryptography to Control Your Data at a Distance.
    ERCIM News 2016, Volume 2016 (0) 2016
    Conference paper
    Mohsen Toorani.
    Security protocols in a nutshell.
    CoRR 2016, Volume 0 (0) 2016
    Journal article
    Mohsen Toorani.
    Cryptanalysis of a robust key agreement based on public key authentication.
    Security and Communication Networks 2016, Volume 9 (0) 2016
    Conference paper
    Mohsen Toorani.
    On Vulnerabilities of the Security Association in the IEEE 802.15.6 Standard.
    Financial Cryptography and Data Security - FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers 2015 (0) 2015
    Conference paper
    Mohsen Toorani.
    Cryptanalysis of Two PAKE Protocols for Body Area Networks and Smart Environments.
    I. J. Network Security 2015, Volume 17 (0) 2015
    Conference paper
    Mohsen Toorani.
    On Vulnerabilities of the Security Association in the IEEE 802.15.6 Standard.
    CoRR 2015, Volume 0 (0) 2015
    Conference paper
    Mohsen Toorani.
    Cryptanalysis of a new protocol of wide use for email with perfect forward secrecy.
    Security and Communication Networks 2015, Volume 8 (0) 2015
    Show item 1 to 10 of 32  

    Your query returned 32 matches in the database.