BibTeX records: Mohsen Toorani

download as .bib file

@article{DBLP:journals/corr/abs-2307-16239,
  author       = {Arnaf Aziz Torongo and
                  Mohsen Toorani},
  title        = {Blockchain-based Decentralized Identity Management for Healthcare
                  Systems},
  journal      = {CoRR},
  volume       = {abs/2307.16239},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2307.16239},
  doi          = {10.48550/ARXIV.2307.16239},
  eprinttype    = {arXiv},
  eprint       = {2307.16239},
  timestamp    = {Wed, 02 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2307-16239.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/OlssonT21,
  author       = {Christoffer Olsson and
                  Mohsen Toorani},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {A Permissioned Blockchain-based System for Collaborative Drug Discovery},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {121--132},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010236901210132},
  doi          = {10.5220/0010236901210132},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/OlssonT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/TooraniG21,
  author       = {Mohsen Toorani and
                  Christian Gehrmann},
  editor       = {Chih{-}Cheng Hung and
                  Jiman Hong and
                  Alessio Bechini and
                  Eunjee Song},
  title        = {A decentralized dynamic {PKI} based on blockchain},
  booktitle    = {{SAC} '21: The 36th {ACM/SIGAPP} Symposium on Applied Computing, Virtual
                  Event, Republic of Korea, March 22-26, 2021},
  pages        = {1646--1655},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3412841.3442038},
  doi          = {10.1145/3412841.3442038},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/TooraniG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-15351,
  author       = {Mohsen Toorani and
                  Christian Gehrmann},
  title        = {A Decentralized Dynamic {PKI} based on Blockchain},
  journal      = {CoRR},
  volume       = {abs/2012.15351},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.15351},
  eprinttype    = {arXiv},
  eprint       = {2012.15351},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-15351.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/BoydDGRT18,
  author       = {Colin Boyd and
                  Gareth T. Davies and
                  Kristian Gj{\o}steen and
                  H{\aa}vard Raddum and
                  Mohsen Toorani},
  editor       = {Sebastian Doerr and
                  Mathias Fischer and
                  Sebastian Schrittwieser and
                  Dominik Herrmann},
  title        = {Definitions for Plaintext-Existence Hiding in Cloud Storage},
  booktitle    = {Proceedings of the 13th International Conference on Availability,
                  Reliability and Security, {ARES} 2018, Hamburg, Germany, August 27-30,
                  2018},
  pages        = {41:1--41:7},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3230833.3234515},
  doi          = {10.1145/3230833.3234515},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/BoydDGRT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/BoydDGRT18,
  author       = {Colin Boyd and
                  Gareth T. Davies and
                  Kristian Gj{\o}steen and
                  H{\aa}vard Raddum and
                  Mohsen Toorani},
  editor       = {Joonsang Baek and
                  Willy Susilo and
                  Jongkil Kim},
  title        = {Security Notions for Cloud Storage and Deduplication},
  booktitle    = {Provable Security - 12th International Conference, ProvSec 2018, Jeju,
                  South Korea, October 25-28, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11192},
  pages        = {347--365},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01446-9\_20},
  doi          = {10.1007/978-3-030-01446-9\_20},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/BoydDGRT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoydDGRT18,
  author       = {Colin Boyd and
                  Gareth T. Davies and
                  Kristian Gj{\o}steen and
                  H{\aa}vard Raddum and
                  Mohsen Toorani},
  title        = {Definitions for Plaintext-Existence Hiding in Cloud Storage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {748},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/748},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoydDGRT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ArmknechtBDGT17,
  author       = {Frederik Armknecht and
                  Colin Boyd and
                  Gareth T. Davies and
                  Kristian Gj{\o}steen and
                  Mohsen Toorani},
  editor       = {Ramesh Karri and
                  Ozgur Sinanoglu and
                  Ahmad{-}Reza Sadeghi and
                  Xun Yi},
  title        = {Side Channels in Deduplication: Trade-offs between Leakage and Efficiency},
  booktitle    = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
                  2017},
  pages        = {266--274},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3052973.3053019},
  doi          = {10.1145/3052973.3053019},
  timestamp    = {Sun, 12 Nov 2023 02:11:41 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ArmknechtBDGT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoydDGTR17,
  author       = {Colin Boyd and
                  Gareth T. Davies and
                  Kristian Gj{\o}steen and
                  Mohsen Toorani and
                  H{\aa}vard Raddum},
  title        = {Security notions for cloud storage and deduplication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1208},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1208},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoydDGTR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/Toorani16,
  author       = {Mohsen Toorani},
  title        = {Security analysis of the {IEEE} 802.15.6 standard},
  journal      = {Int. J. Commun. Syst.},
  volume       = {29},
  number       = {17},
  pages        = {2471--2489},
  year         = {2016},
  url          = {https://doi.org/10.1002/dac.3120},
  doi          = {10.1002/DAC.3120},
  timestamp    = {Thu, 30 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/Toorani16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Toorani16,
  author       = {Mohsen Toorani},
  title        = {Cryptanalysis of a robust key agreement based on public key authentication},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {1},
  pages        = {19--26},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1373},
  doi          = {10.1002/SEC.1373},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Toorani16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Toorani16,
  author       = {Mohsen Toorani},
  title        = {Security protocols in a nutshell},
  journal      = {CoRR},
  volume       = {abs/1605.09771},
  year         = {2016},
  url          = {http://arxiv.org/abs/1605.09771},
  eprinttype    = {arXiv},
  eprint       = {1605.09771},
  timestamp    = {Tue, 17 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Toorani16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ercim/BoydDGRT16,
  author       = {Colin Boyd and
                  Gareth T. Davies and
                  Kristian Gj{\o}steen and
                  H{\aa}vard Raddum and
                  Mohsen Toorani},
  title        = {Using Cryptography to Control Your Data at a Distance},
  journal      = {{ERCIM} News},
  volume       = {2016},
  number       = {106},
  year         = {2016},
  url          = {http://ercim-news.ercim.eu/en106/special/using-cryptography-to-control-your-data-at-a-distance},
  timestamp    = {Wed, 22 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ercim/BoydDGRT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArmknechtBDGT16,
  author       = {Frederik Armknecht and
                  Colin Boyd and
                  Gareth T. Davies and
                  Kristian Gj{\o}steen and
                  Mohsen Toorani},
  title        = {Side channels in deduplication: trade-offs between leakage and efficiency},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {977},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/977},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArmknechtBDGT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/Toorani15,
  author       = {Mohsen Toorani},
  title        = {Cryptanalysis of Two {PAKE} Protocols for Body Area Networks and Smart
                  Environments},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {5},
  pages        = {629--636},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n5/ijns-2015-v17-n5-p629-636.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/Toorani15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Toorani15,
  author       = {Mohsen Toorani},
  title        = {Cryptanalysis of a new protocol of wide use for email with perfect
                  forward secrecy},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {4},
  pages        = {694--701},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1018},
  doi          = {10.1002/SEC.1018},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Toorani15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Toorani15,
  author       = {Mohsen Toorani},
  editor       = {Michael Brenner and
                  Nicolas Christin and
                  Benjamin Johnson and
                  Kurt Rohloff},
  title        = {On Vulnerabilities of the Security Association in the {IEEE} 802.15.6
                  Standard},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2015 International
                  Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January
                  30, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8976},
  pages        = {245--260},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48051-9\_18},
  doi          = {10.1007/978-3-662-48051-9\_18},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Toorani15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hipeac/Toorani15,
  author       = {Mohsen Toorani},
  editor       = {Andy D. Pimentel and
                  Stephan Wong and
                  Gerardo Pelosi and
                  Israel Koren and
                  Giovanni Agosta and
                  Alessandro Barenghi},
  title        = {On Continuous After-the-Fact Leakage-Resilient Key Exchange},
  booktitle    = {Proceedings of the Second Workshop on Cryptography and Security in
                  Computing Systems, CS2@HiPEAC 2015, Amsterdam, Netherlands, January
                  19-21, 2015},
  pages        = {31--34},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2694805.2694811},
  doi          = {10.1145/2694805.2694811},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hipeac/Toorani15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Toorani15,
  author       = {Mohsen Toorani},
  title        = {On Vulnerabilities of the Security Association in the {IEEE} 802.15.6
                  Standard},
  journal      = {CoRR},
  volume       = {abs/1501.02601},
  year         = {2015},
  url          = {http://arxiv.org/abs/1501.02601},
  eprinttype    = {arXiv},
  eprint       = {1501.02601},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Toorani15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/Toorani14,
  author       = {Mohsen Toorani},
  title        = {Security analysis of {J-PAKE}},
  booktitle    = {{IEEE} Symposium on Computers and Communications, {ISCC} 2014, Funchal,
                  Madeira, Portugal, June 23-26, 2014},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISCC.2014.6912576},
  doi          = {10.1109/ISCC.2014.6912576},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscc/Toorani14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Toorani14,
  author       = {Mohsen Toorani},
  title        = {On Continuous After-the-Fact Leakage-Resilient Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1010},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/1010},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Toorani14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/AmiraniTM13,
  author       = {Mehdi Chehel Amirani and
                  Mohsen Toorani and
                  Sara Mihandoost},
  title        = {Feature-based Type Identification of File Fragments},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {1},
  pages        = {115--128},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.553},
  doi          = {10.1002/SEC.553},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/AmiraniTM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/TooraniF11,
  author       = {Mohsen Toorani and
                  Abolfazl Falahati},
  title        = {A secure cryptosystem based on affine transformation},
  journal      = {Secur. Commun. Networks},
  volume       = {4},
  number       = {2},
  pages        = {207--215},
  year         = {2011},
  url          = {https://doi.org/10.1002/sec.137},
  doi          = {10.1002/SEC.137},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/TooraniF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/TooraniS10,
  author       = {Mohsen Toorani and
                  {Ali Asghar} {Beheshti Shirazi}},
  title        = {Cryptanalysis of an Elliptic Curve-based Signcryption Scheme},
  journal      = {Int. J. Netw. Secur.},
  volume       = {10},
  number       = {1},
  pages        = {51--56},
  year         = {2010},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n1/ijns-2010-v10-n1-p51-56.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/TooraniS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1002-3171,
  author       = {Mohsen Toorani and
                  {Ali Asghar} {Beheshti Shirazi}},
  title        = {{SSMS} - {A} Secure {SMS} Messaging Protocol for the M-payment Systems},
  journal      = {CoRR},
  volume       = {abs/1002.3171},
  year         = {2010},
  url          = {http://arxiv.org/abs/1002.3171},
  eprinttype    = {arXiv},
  eprint       = {1002.3171},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1002-3171.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1002-3174,
  author       = {Mehdi Chehel Amirani and
                  Mohsen Toorani and
                  Asghar Beheshti},
  title        = {A new approach to content-based file type detection},
  journal      = {CoRR},
  volume       = {abs/1002.3174},
  year         = {2010},
  url          = {http://arxiv.org/abs/1002.3174},
  eprinttype    = {arXiv},
  eprint       = {1002.3174},
  timestamp    = {Thu, 29 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1002-3174.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1002-3175,
  author       = {Mohsen Toorani and
                  {Ali Asghar} {Beheshti Shirazi}},
  title        = {Solutions to the {GSM} Security Weaknesses},
  journal      = {CoRR},
  volume       = {abs/1002.3175},
  year         = {2010},
  url          = {http://arxiv.org/abs/1002.3175},
  eprinttype    = {arXiv},
  eprint       = {1002.3175},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1002-3175.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1002-3176,
  author       = {Mohsen Toorani},
  title        = {SMEmail - {A} New Protocol for the Secure E-mail in Mobile Environments},
  journal      = {CoRR},
  volume       = {abs/1002.3176},
  year         = {2010},
  url          = {http://arxiv.org/abs/1002.3176},
  eprinttype    = {arXiv},
  eprint       = {1002.3176},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1002-3176.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1002-3299,
  author       = {Mohsen Toorani and
                  {Ali Asghar} {Beheshti Shirazi}},
  title        = {{LPKI} - {A} Lightweight Public Key Infrastructure for the Mobile
                  Environments},
  journal      = {CoRR},
  volume       = {abs/1002.3299},
  year         = {2010},
  url          = {http://arxiv.org/abs/1002.3299},
  eprinttype    = {arXiv},
  eprint       = {1002.3299},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1002-3299.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1002-3303,
  author       = {Mohsen Toorani and
                  {Ali Asghar} {Beheshti Shirazi}},
  title        = {Cryptanalysis of an Efficient Signcryption Scheme with Forward Secrecy
                  Based on Elliptic Curve},
  journal      = {CoRR},
  volume       = {abs/1002.3303},
  year         = {2010},
  url          = {http://arxiv.org/abs/1002.3303},
  eprinttype    = {arXiv},
  eprint       = {1002.3303},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1002-3303.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1002-3316,
  author       = {Mohsen Toorani and
                  Asghar Beheshti},
  title        = {A Directly Public Verifiable Signcryption Scheme based on Elliptic
                  Curves},
  journal      = {CoRR},
  volume       = {abs/1002.3316},
  year         = {2010},
  url          = {http://arxiv.org/abs/1002.3316},
  eprinttype    = {arXiv},
  eprint       = {1002.3316},
  timestamp    = {Thu, 29 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1002-3316.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1002-3567,
  author       = {Mohsen Toorani and
                  Abolfazl Falahati},
  title        = {A Secure Variant of the Hill Cipher},
  journal      = {CoRR},
  volume       = {abs/1002.3567},
  year         = {2010},
  url          = {http://arxiv.org/abs/1002.3567},
  eprinttype    = {arXiv},
  eprint       = {1002.3567},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1002-3567.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1004-3521,
  author       = {Mohsen Toorani and
                  {Ali Asghar} {Beheshti Shirazi}},
  title        = {Cryptanalysis of an Elliptic Curve-based Signcryption Scheme},
  journal      = {CoRR},
  volume       = {abs/1004.3521},
  year         = {2010},
  url          = {http://arxiv.org/abs/1004.3521},
  eprinttype    = {arXiv},
  eprint       = {1004.3521},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1004-3521.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1005-1856,
  author       = {Mohsen Toorani and
                  {Ali Asghar} {Beheshti Shirazi}},
  title        = {An Elliptic Curve-based Signcryption Scheme with Forward Secrecy},
  journal      = {CoRR},
  volume       = {abs/1005.1856},
  year         = {2010},
  url          = {http://arxiv.org/abs/1005.1856},
  eprinttype    = {arXiv},
  eprint       = {1005.1856},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1005-1856.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/TooraniF09,
  author       = {Mohsen Toorani and
                  Abolfazl Falahati},
  title        = {A secure variant of the Hill Cipher},
  booktitle    = {Proceedings of the 14th {IEEE} Symposium on Computers and Communications
                  {(ISCC} 2009), July 5-8, Sousse, Tunisia},
  pages        = {313--316},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ISCC.2009.5202241},
  doi          = {10.1109/ISCC.2009.5202241},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscc/TooraniF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/TooraniS09,
  author       = {Mohsen Toorani and
                  {Ali Asghar} {Beheshti Shirazi}},
  title        = {A directly public verifiable signcryption scheme based on elliptic
                  curves},
  booktitle    = {Proceedings of the 14th {IEEE} Symposium on Computers and Communications
                  {(ISCC} 2009), July 5-8, Sousse, Tunisia},
  pages        = {713--716},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ISCC.2009.5202242},
  doi          = {10.1109/ISCC.2009.5202242},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscc/TooraniS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/TooraniS08,
  author       = {Mohsen Toorani and
                  {Ali Asghar} {Beheshti Shirazi}},
  title        = {{SSMS} - {A} secure {SMS} messaging protocol for the m-payment systems},
  booktitle    = {Proceedings of the 13th {IEEE} Symposium on Computers and Communications
                  {(ISCC} 2008), July 6-9, Marrakech, Morocco},
  pages        = {700--705},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISCC.2008.4625610},
  doi          = {10.1109/ISCC.2008.4625610},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscc/TooraniS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/AmiraniTS08,
  author       = {Mehdi Chehel Amirani and
                  Mohsen Toorani and
                  {Ali Asghar} {Beheshti Shirazi}},
  title        = {A new approach to content-based file type detection},
  booktitle    = {Proceedings of the 13th {IEEE} Symposium on Computers and Communications
                  {(ISCC} 2008), July 6-9, Marrakech, Morocco},
  pages        = {1103--1108},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISCC.2008.4625611},
  doi          = {10.1109/ISCC.2008.4625611},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscc/AmiraniTS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics