Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Mohsen
    Last name: Toorani
    Company: University of Bergen
    Personal website: http://www.researcherid.com/rid/A-9528-2009
    Researcher ID: A-9528-2009
    DBLP: 71/4184
    Rating: (7)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 10 of 32  
    Select a publication
    Show Title Venue Rating Date
    Journal article
    Mohsen Toorani, Asghar Beheshti.
    A Directly Public Verifiable Signcryption Scheme based on Elliptic Curves
    CoRR 2010, Volume 0 (0) 2010
    Conference paper
    Mohsen Toorani, Asghar Beheshti.
    A directly public verifiable signcryption scheme based on elliptic curves.
    Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), July 5-8, Sousse, Tunisia 2009 (1) 2009
    Journal article
    Mehdi Chehel Amirani, Mohsen Toorani, Asghar Beheshti.
    A new approach to content-based file type detection
    CoRR 2010, Volume 0 (1) 2010
    Conference paper
    Mehdi Chehel Amirani, Mohsen Toorani, Asghar Beheshti.
    A new approach to content-based file type detection.
    Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), July 6-9, Marrakech, Morocco 2008 (1) 2008
    Conference paper
    Mohsen Toorani, Abolfazl Falahati.
    A secure cryptosystem based on affine transformation.
    Security and Communication Networks 2011, Volume 4 (0) 2011
    Journal article
    Mohsen Toorani, Abolfazl Falahati.
    A Secure Variant of the Hill Cipher
    CoRR 2010, Volume 0 (0) 2010
    Conference paper
    Mohsen Toorani, Abolfazl Falahati.
    A secure variant of the Hill Cipher.
    Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), July 5-8, Sousse, Tunisia 2009 (1) 2009
    Journal article
    Mohsen Toorani, Asghar Beheshti.
    An Elliptic Curve-based Signcryption Scheme with Forward Secrecy
    CoRR 2010, Volume 0 (0) 2010
    Conference paper
    Mohsen Toorani.
    Cryptanalysis of a new protocol of wide use for email with perfect forward secrecy.
    Security and Communication Networks 2015, Volume 8 (0) 2015
    Journal article
    Mohsen Toorani.
    Cryptanalysis of a robust key agreement based on public key authentication.
    Security and Communication Networks 2016, Volume 9 (0) 2016
    Show item 1 to 10 of 32  

    Your query returned 32 matches in the database.