Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Mazdak Zamani
@article{DBLP:journals/fi/PilaniaTZM22, author = {Urmila Pilania and Rohit Tanwar and Mazdak Zamani and Azizah Abdul Manaf}, title = {Framework for Video Steganography Using Integer Wavelet Transform and {JPEG} Compression}, journal = {Future Internet}, volume = {14}, number = {9}, pages = {254}, year = {2022}, url = {https://doi.org/10.3390/fi14090254}, doi = {10.3390/FI14090254}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fi/PilaniaTZM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccoms/ArabZKACK22, author = {Farnaz Arab and Mazdak Zamani and Sasan Karamizadeh and Mojtaba Alizadeh and Saman Shojae Chaeikar and Touraj Khodadadi}, title = {Comparison of Data Hiding Techniques for Video Watermarking Applications}, booktitle = {7th International Conference on Computer and Communication Systems, {ICCCS} 2022, Wuhan, China, April 22-25, 2022}, pages = {168--173}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICCCS55155.2022.9846251}, doi = {10.1109/ICCCS55155.2022.9846251}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccoms/ArabZKACK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcnc/TanwarSZVK19, author = {Rohit Tanwar and Kulvinder Singh and Mazdak Zamani and Amit Verma and Prashant Kumar}, title = {An Optimized Approach for Secure Data Transmission Using Spread Spectrum Audio Steganography, Chaos Theory, and Social Impact Theory Optimizer}, journal = {J. Comput. Networks Commun.}, volume = {2019}, pages = {5124364:1--5124364:10}, year = {2019}, url = {https://doi.org/10.1155/2019/5124364}, doi = {10.1155/2019/5124364}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcnc/TanwarSZVK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcnc/KavianpourSAZSB19, author = {Sanaz Kavianpour and Bharanidharan Shanmugam and Sami Azam and Mazdak Zamani and Ganthan Narayana Samy and Friso De Boer}, title = {A Systematic Literature Review of Authentication in Internet of Things for Heterogeneous Devices}, journal = {J. Comput. Networks Commun.}, volume = {2019}, pages = {5747136:1--5747136:14}, year = {2019}, url = {https://doi.org/10.1155/2019/5747136}, doi = {10.1155/2019/5747136}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcnc/KavianpourSAZSB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/ChaeikarZMZ18, author = {Saman Shojae Chaeikar and Mazdak Zamani and Azizah Bt Abdul Manaf and Akram M. Zeki}, title = {{PSW} statistical {LSB} image steganalysis}, journal = {Multim. Tools Appl.}, volume = {77}, number = {1}, pages = {805--835}, year = {2018}, url = {https://doi.org/10.1007/s11042-016-4273-6}, doi = {10.1007/S11042-016-4273-6}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/ChaeikarZMZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icin/AlizadehTSBAZZC17, author = {Mojtaba Alizadeh and Mohammad Hesam Tadayon and Kouichi Sakurai and Sabariah Baharun and Hiroaki Anada and Mazdak Zamani and Akram M. Zeki and Shehzad Ashraf Chaudhry and Muhammad Khurram Khan}, editor = {No{\"{e}}l Crespi and Antonio Manzalini and Stefano Secci}, title = {Comments and improvements of "HOTA: Handover optimized ticket-based authentication in network-based mobility management"}, booktitle = {20th Conference on Innovations in Clouds, Internet and Networks, {ICIN} 2017, Paris, France, March 7-9, 2017}, pages = {112--116}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ICIN.2017.7899399}, doi = {10.1109/ICIN.2017.7899399}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icin/AlizadehTSBAZZC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jece/ZamaniEL16, author = {Mazdak Zamani and Isao Echizen and Arash Habibi Lashkari}, title = {Innovations in Communications Security}, journal = {J. Electr. Comput. Eng.}, volume = {2016}, pages = {4743084:1}, year = {2016}, url = {https://doi.org/10.1155/2016/4743084}, doi = {10.1155/2016/4743084}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jece/ZamaniEL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/AlizadehAZBS16, author = {Mojtaba Alizadeh and Saeid Abolfazli and Mazdak Zamani and Sabariah Baharun and Kouichi Sakurai}, title = {Authentication in mobile cloud computing: {A} survey}, journal = {J. Netw. Comput. Appl.}, volume = {61}, pages = {59--80}, year = {2016}, url = {https://doi.org/10.1016/j.jnca.2015.10.005}, doi = {10.1016/J.JNCA.2015.10.005}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/AlizadehAZBS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/ArabAHMZ16, author = {Farnaz Arab and Shahidan M. Abdullah and Siti Zaiton Mohd Hashim and Azizah Abdul Manaf and Mazdak Zamani}, title = {A robust video watermarking technique for the tamper detection of surveillance systems}, journal = {Multim. Tools Appl.}, volume = {75}, number = {18}, pages = {10855--10885}, year = {2016}, url = {https://doi.org/10.1007/s11042-015-2800-5}, doi = {10.1007/S11042-015-2800-5}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/ArabAHMZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/KianiAZKM15, author = {Farzad Kiani and Ehsan Amiri and Mazdak Zamani and Touraj Khodadadi and Azizah Abdul Manaf}, title = {Efficient Intelligent Energy Routing Protocol in Wireless Sensor Networks}, journal = {Int. J. Distributed Sens. Networks}, volume = {11}, pages = {618072:1--618072:13}, year = {2015}, url = {https://doi.org/10.1155/2015/618072}, doi = {10.1155/2015/618072}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/KianiAZKM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/ZamaniM15, author = {Mazdak Zamani and Azizah Bt Abdul Manaf}, title = {Genetic algorithm for fragile audio watermarking}, journal = {Telecommun. Syst.}, volume = {59}, number = {3}, pages = {291--304}, year = {2015}, url = {https://doi.org/10.1007/s11235-014-9936-x}, doi = {10.1007/S11235-014-9936-X}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/telsys/ZamaniM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/AmiriKAZK14, author = {Ehsan Amiri and Hassan Keshavarz and Mojtaba Alizadeh and Mazdak Zamani and Touraj Khodadadi}, title = {Energy Efficient Routing in Wireless Sensor Networks Based on Fuzzy Ant Colony Optimization}, journal = {Int. J. Distributed Sens. Networks}, volume = {10}, year = {2014}, url = {https://doi.org/10.1155/2014/768936}, doi = {10.1155/2014/768936}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/AmiriKAZK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/grmse/JabbarSZ13, author = {Alaa A. Jabbar and Shahrin bin Sahib and Mazdak Zamani}, editor = {Fuling Bian and Yichun Xie and Xiaohui Cui and Yixin Zeng}, title = {Correlation Analysis of the Four Photo Themes in Five Layers}, booktitle = {Geo-Informatics in Resource Management and Sustainable Ecosystem - International Symposium, {GRMSE} 2013, Wuhan, China, November 8-10, 2013, Proceedings, Part {I}}, series = {Communications in Computer and Information Science}, volume = {398}, pages = {211--222}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-45025-9\_23}, doi = {10.1007/978-3-642-45025-9\_23}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/grmse/JabbarSZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/grmse/JabbarSZ13a, author = {Alaa A. Jabbar and Shahrin bin Sahib and Mazdak Zamani}, editor = {Fuling Bian and Yichun Xie and Xiaohui Cui and Yixin Zeng}, title = {Pixel Correlation Behavior in Different Themes}, booktitle = {Geo-Informatics in Resource Management and Sustainable Ecosystem - International Symposium, {GRMSE} 2013, Wuhan, China, November 8-10, 2013, Proceedings, Part {I}}, series = {Communications in Computer and Information Science}, volume = {398}, pages = {223--234}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-45025-9\_24}, doi = {10.1007/978-3-642-45025-9\_24}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/grmse/JabbarSZ13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/NikbakhshMZJ12, author = {Somayeh Nikbakhsh and Azizah Bt Abdul Manaf and Mazdak Zamani and Maziar Janbeglou}, editor = {Leonard Barolli and Tomoya Enokido and Fatos Xhafa and Makoto Takizawa}, title = {A Novel Approach for Rogue Access Point Detection on the Client-Side}, booktitle = {26th International Conference on Advanced Information Networking and Applications Workshops, {WAINA} 2012, Fukuoka, Japan, March 26-29, 2012}, pages = {684--687}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/WAINA.2012.108}, doi = {10.1109/WAINA.2012.108}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/NikbakhshMZJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudcom/GhazizadehZMP12, author = {Eghbal Ghazizadeh and Mazdak Zamani and Jamalul{-}lail Ab Manan and Abolghasem Pashang}, title = {A survey on security issues of federated identity in the cloud computing}, booktitle = {4th {IEEE} International Conference on Cloud Computing Technology and Science Proceedings, CloudCom 2012, Taipei, Taiwan, December 3-6, 2012}, pages = {532--565}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CloudCom.2012.6427513}, doi = {10.1109/CLOUDCOM.2012.6427513}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cloudcom/GhazizadehZMP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/GhazizadehZMKT12, author = {Eghbal Ghazizadeh and Mazdak Zamani and Jamalul{-}lail Ab Manan and Reza Khaleghparast and Ali Taherian}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {A trust based model for federated identity architecture to mitigate identity theft}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {376--381}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470834/}, timestamp = {Thu, 10 Mar 2022 09:31:39 +0100}, biburl = {https://dblp.org/rec/conf/icitst/GhazizadehZMKT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/baip/ZamaniMAJCZ10, author = {Mazdak Zamani and Azizah Bt Abdul Manaf and Rabiah Bt Ahmad and Farhang Jaryani and Saman Shojae Chaeikar and Hossein Rouhani Zeidanloo}, editor = {Vinu V. Das and R. Vijayakumar and Narayan C. Debnath and Janahanlal Stephen and Natarajan Meghanathan and Suresh Sankaranarayanan and P. M. Thankachan and Ford Lumban Gaol and Nessy Thankachan}, title = {Genetic Audio Watermarking}, booktitle = {Information Processing and Management - International Conference on Recent Trends in Business Administration and Information Processing, {BAIP} 2010, Trivandrum, Kerala, India, March 26-27, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {70}, pages = {514--517}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12214-9\_90}, doi = {10.1007/978-3-642-12214-9\_90}, timestamp = {Thu, 01 Jun 2017 18:59:02 +0200}, biburl = {https://dblp.org/rec/conf/baip/ZamaniMAJCZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ncm/AbdullahMZ10, author = {Shahidan M. Abdullah and Azizah A. Manaf and Mazdak Zamani}, title = {Capacity and quality improvement in reversible image watermarking approach}, booktitle = {International Conference on Networked Computing and Advanced Information Management, {NCM} 2010, Sixth International Joint Conference on INC, {IMS} and {IDC:} {INC} 2010: International Conference on Networked Computing, {IMS} 2010: International Conference on Advanced Information Management and Service, {IDC} 2010: International Conference on Digital Content, Multimedia Technology and its Applications, Seoul, Korea, August 16-18, 2010}, pages = {81--85}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5572351/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ncm/AbdullahMZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/ZamaniMAZM09, author = {Mazdak Zamani and Azizah Bt Abdul Manaf and Rabiah Bt Ahmad and Akram M. Zeki and Pritheega Magalingam}, title = {A Novel Approach for Audio Watermarking}, booktitle = {Proceedings of the Fifth International Conference on Information Assurance and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009}, pages = {83--86}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/IAS.2009.22}, doi = {10.1109/IAS.2009.22}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/ZamaniMAZM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gem/ZamaniMAZA09, author = {Mazdak Zamani and Azizah Bt Abdul Manaf and Rabiah Bt Ahmad and Akram M. Zeki and Shahidan M. Abdullah}, editor = {Hamid R. Arabnia and Ashu M. G. Solo}, title = {Genetic Algorithm as an Approach to Resolve the Problems of Substitution Techniques of Audio Steganography}, booktitle = {Proceedings of the 2009 International Conference on Genetic and Evolutionary Methods, {GEM} 2009, July 13-16, 2009, Las Vegas Nevada, {USA}}, pages = {170--175}, publisher = {{CSREA} Press}, year = {2009}, timestamp = {Mon, 20 Sep 2010 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gem/ZamaniMAZA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ZamaniMAJTZ09, author = {Mazdak Zamani and Azizah Bt Abdul Manaf and Rabiah Bt Ahmad and Farhang Jaryani and Hamed Taherdoost and Akram M. Zeki}, title = {A secure audio steganography approach}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402644}, doi = {10.1109/ICITST.2009.5402644}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ZamaniMAJTZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.