default search action
Mohsen Toorani
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [i19]Arnaf Aziz Torongo, Mohsen Toorani:
Blockchain-based Decentralized Identity Management for Healthcare Systems. CoRR abs/2307.16239 (2023) - 2021
- [c12]Christoffer Olsson, Mohsen Toorani:
A Permissioned Blockchain-based System for Collaborative Drug Discovery. ICISSP 2021: 121-132 - [c11]Mohsen Toorani, Christian Gehrmann:
A decentralized dynamic PKI based on blockchain. SAC 2021: 1646-1655 - 2020
- [i18]Mohsen Toorani, Christian Gehrmann:
A Decentralized Dynamic PKI based on Blockchain. CoRR abs/2012.15351 (2020)
2010 – 2019
- 2018
- [c10]Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Håvard Raddum, Mohsen Toorani:
Definitions for Plaintext-Existence Hiding in Cloud Storage. ARES 2018: 41:1-41:7 - [c9]Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Håvard Raddum, Mohsen Toorani:
Security Notions for Cloud Storage and Deduplication. ProvSec 2018: 347-365 - [i17]Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Håvard Raddum, Mohsen Toorani:
Definitions for Plaintext-Existence Hiding in Cloud Storage. IACR Cryptol. ePrint Arch. 2018: 748 (2018) - 2017
- [c8]Frederik Armknecht, Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Mohsen Toorani:
Side Channels in Deduplication: Trade-offs between Leakage and Efficiency. AsiaCCS 2017: 266-274 - [i16]Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Mohsen Toorani, Håvard Raddum:
Security notions for cloud storage and deduplication. IACR Cryptol. ePrint Arch. 2017: 1208 (2017) - 2016
- [j7]Mohsen Toorani:
Security analysis of the IEEE 802.15.6 standard. Int. J. Commun. Syst. 29(17): 2471-2489 (2016) - [j6]Mohsen Toorani:
Cryptanalysis of a robust key agreement based on public key authentication. Secur. Commun. Networks 9(1): 19-26 (2016) - [i15]Mohsen Toorani:
Security protocols in a nutshell. CoRR abs/1605.09771 (2016) - [i14]Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Håvard Raddum, Mohsen Toorani:
Using Cryptography to Control Your Data at a Distance. ERCIM News 2016(106) (2016) - [i13]Frederik Armknecht, Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Mohsen Toorani:
Side channels in deduplication: trade-offs between leakage and efficiency. IACR Cryptol. ePrint Arch. 2016: 977 (2016) - 2015
- [j5]Mohsen Toorani:
Cryptanalysis of Two PAKE Protocols for Body Area Networks and Smart Environments. Int. J. Netw. Secur. 17(5): 629-636 (2015) - [j4]Mohsen Toorani:
Cryptanalysis of a new protocol of wide use for email with perfect forward secrecy. Secur. Commun. Networks 8(4): 694-701 (2015) - [c7]Mohsen Toorani:
On Vulnerabilities of the Security Association in the IEEE 802.15.6 Standard. Financial Cryptography Workshops 2015: 245-260 - [c6]Mohsen Toorani:
On Continuous After-the-Fact Leakage-Resilient Key Exchange. CS2@HiPEAC 2015: 31-34 - [i12]Mohsen Toorani:
On Vulnerabilities of the Security Association in the IEEE 802.15.6 Standard. CoRR abs/1501.02601 (2015) - 2014
- [c5]Mohsen Toorani:
Security analysis of J-PAKE. ISCC 2014: 1-6 - [i11]Mohsen Toorani:
On Continuous After-the-Fact Leakage-Resilient Key Exchange. IACR Cryptol. ePrint Arch. 2014: 1010 (2014) - 2013
- [j3]Mehdi Chehel Amirani, Mohsen Toorani, Sara Mihandoost:
Feature-based Type Identification of File Fragments. Secur. Commun. Networks 6(1): 115-128 (2013) - 2011
- [j2]Mohsen Toorani, Abolfazl Falahati:
A secure cryptosystem based on affine transformation. Secur. Commun. Networks 4(2): 207-215 (2011) - 2010
- [j1]Mohsen Toorani, Ali Asghar Beheshti Shirazi:
Cryptanalysis of an Elliptic Curve-based Signcryption Scheme. Int. J. Netw. Secur. 10(1): 51-56 (2010) - [i10]Mohsen Toorani, Ali Asghar Beheshti Shirazi:
SSMS - A Secure SMS Messaging Protocol for the M-payment Systems. CoRR abs/1002.3171 (2010) - [i9]Mehdi Chehel Amirani, Mohsen Toorani, Asghar Beheshti:
A new approach to content-based file type detection. CoRR abs/1002.3174 (2010) - [i8]Mohsen Toorani, Ali Asghar Beheshti Shirazi:
Solutions to the GSM Security Weaknesses. CoRR abs/1002.3175 (2010) - [i7]Mohsen Toorani:
SMEmail - A New Protocol for the Secure E-mail in Mobile Environments. CoRR abs/1002.3176 (2010) - [i6]Mohsen Toorani, Ali Asghar Beheshti Shirazi:
LPKI - A Lightweight Public Key Infrastructure for the Mobile Environments. CoRR abs/1002.3299 (2010) - [i5]Mohsen Toorani, Ali Asghar Beheshti Shirazi:
Cryptanalysis of an Efficient Signcryption Scheme with Forward Secrecy Based on Elliptic Curve. CoRR abs/1002.3303 (2010) - [i4]Mohsen Toorani, Asghar Beheshti:
A Directly Public Verifiable Signcryption Scheme based on Elliptic Curves. CoRR abs/1002.3316 (2010) - [i3]Mohsen Toorani, Abolfazl Falahati:
A Secure Variant of the Hill Cipher. CoRR abs/1002.3567 (2010) - [i2]Mohsen Toorani, Ali Asghar Beheshti Shirazi:
Cryptanalysis of an Elliptic Curve-based Signcryption Scheme. CoRR abs/1004.3521 (2010) - [i1]Mohsen Toorani, Ali Asghar Beheshti Shirazi:
An Elliptic Curve-based Signcryption Scheme with Forward Secrecy. CoRR abs/1005.1856 (2010)
2000 – 2009
- 2009
- [c4]Mohsen Toorani, Abolfazl Falahati:
A secure variant of the Hill Cipher. ISCC 2009: 313-316 - [c3]Mohsen Toorani, Ali Asghar Beheshti Shirazi:
A directly public verifiable signcryption scheme based on elliptic curves. ISCC 2009: 713-716 - 2008
- [c2]Mohsen Toorani, Ali Asghar Beheshti Shirazi:
SSMS - A secure SMS messaging protocol for the m-payment systems. ISCC 2008: 700-705 - [c1]Mehdi Chehel Amirani, Mohsen Toorani, Ali Asghar Beheshti Shirazi:
A new approach to content-based file type detection. ISCC 2008: 1103-1108
Coauthor Index
aka: Ali Asghar Beheshti Shirazi
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint