Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Mohsen Toorani
@article{DBLP:journals/corr/abs-2307-16239, author = {Arnaf Aziz Torongo and Mohsen Toorani}, title = {Blockchain-based Decentralized Identity Management for Healthcare Systems}, journal = {CoRR}, volume = {abs/2307.16239}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2307.16239}, doi = {10.48550/ARXIV.2307.16239}, eprinttype = {arXiv}, eprint = {2307.16239}, timestamp = {Wed, 02 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2307-16239.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/OlssonT21, author = {Christoffer Olsson and Mohsen Toorani}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {A Permissioned Blockchain-based System for Collaborative Drug Discovery}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {121--132}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010236901210132}, doi = {10.5220/0010236901210132}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/OlssonT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/TooraniG21, author = {Mohsen Toorani and Christian Gehrmann}, editor = {Chih{-}Cheng Hung and Jiman Hong and Alessio Bechini and Eunjee Song}, title = {A decentralized dynamic {PKI} based on blockchain}, booktitle = {{SAC} '21: The 36th {ACM/SIGAPP} Symposium on Applied Computing, Virtual Event, Republic of Korea, March 22-26, 2021}, pages = {1646--1655}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3412841.3442038}, doi = {10.1145/3412841.3442038}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/TooraniG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-15351, author = {Mohsen Toorani and Christian Gehrmann}, title = {A Decentralized Dynamic {PKI} based on Blockchain}, journal = {CoRR}, volume = {abs/2012.15351}, year = {2020}, url = {https://arxiv.org/abs/2012.15351}, eprinttype = {arXiv}, eprint = {2012.15351}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-15351.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/BoydDGRT18, author = {Colin Boyd and Gareth T. Davies and Kristian Gj{\o}steen and H{\aa}vard Raddum and Mohsen Toorani}, editor = {Sebastian Doerr and Mathias Fischer and Sebastian Schrittwieser and Dominik Herrmann}, title = {Definitions for Plaintext-Existence Hiding in Cloud Storage}, booktitle = {Proceedings of the 13th International Conference on Availability, Reliability and Security, {ARES} 2018, Hamburg, Germany, August 27-30, 2018}, pages = {41:1--41:7}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3230833.3234515}, doi = {10.1145/3230833.3234515}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/BoydDGRT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/BoydDGRT18, author = {Colin Boyd and Gareth T. Davies and Kristian Gj{\o}steen and H{\aa}vard Raddum and Mohsen Toorani}, editor = {Joonsang Baek and Willy Susilo and Jongkil Kim}, title = {Security Notions for Cloud Storage and Deduplication}, booktitle = {Provable Security - 12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11192}, pages = {347--365}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01446-9\_20}, doi = {10.1007/978-3-030-01446-9\_20}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/BoydDGRT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoydDGRT18, author = {Colin Boyd and Gareth T. Davies and Kristian Gj{\o}steen and H{\aa}vard Raddum and Mohsen Toorani}, title = {Definitions for Plaintext-Existence Hiding in Cloud Storage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {748}, year = {2018}, url = {https://eprint.iacr.org/2018/748}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoydDGRT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ArmknechtBDGT17, author = {Frederik Armknecht and Colin Boyd and Gareth T. Davies and Kristian Gj{\o}steen and Mohsen Toorani}, editor = {Ramesh Karri and Ozgur Sinanoglu and Ahmad{-}Reza Sadeghi and Xun Yi}, title = {Side Channels in Deduplication: Trade-offs between Leakage and Efficiency}, booktitle = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017}, pages = {266--274}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3052973.3053019}, doi = {10.1145/3052973.3053019}, timestamp = {Sun, 12 Nov 2023 02:11:41 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ArmknechtBDGT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoydDGTR17, author = {Colin Boyd and Gareth T. Davies and Kristian Gj{\o}steen and Mohsen Toorani and H{\aa}vard Raddum}, title = {Security notions for cloud storage and deduplication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1208}, year = {2017}, url = {http://eprint.iacr.org/2017/1208}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoydDGTR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/Toorani16, author = {Mohsen Toorani}, title = {Security analysis of the {IEEE} 802.15.6 standard}, journal = {Int. J. Commun. Syst.}, volume = {29}, number = {17}, pages = {2471--2489}, year = {2016}, url = {https://doi.org/10.1002/dac.3120}, doi = {10.1002/DAC.3120}, timestamp = {Thu, 30 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/Toorani16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Toorani16, author = {Mohsen Toorani}, title = {Cryptanalysis of a robust key agreement based on public key authentication}, journal = {Secur. Commun. Networks}, volume = {9}, number = {1}, pages = {19--26}, year = {2016}, url = {https://doi.org/10.1002/sec.1373}, doi = {10.1002/SEC.1373}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Toorani16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Toorani16, author = {Mohsen Toorani}, title = {Security protocols in a nutshell}, journal = {CoRR}, volume = {abs/1605.09771}, year = {2016}, url = {http://arxiv.org/abs/1605.09771}, eprinttype = {arXiv}, eprint = {1605.09771}, timestamp = {Tue, 17 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Toorani16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ercim/BoydDGRT16, author = {Colin Boyd and Gareth T. Davies and Kristian Gj{\o}steen and H{\aa}vard Raddum and Mohsen Toorani}, title = {Using Cryptography to Control Your Data at a Distance}, journal = {{ERCIM} News}, volume = {2016}, number = {106}, year = {2016}, url = {http://ercim-news.ercim.eu/en106/special/using-cryptography-to-control-your-data-at-a-distance}, timestamp = {Wed, 22 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ercim/BoydDGRT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArmknechtBDGT16, author = {Frederik Armknecht and Colin Boyd and Gareth T. Davies and Kristian Gj{\o}steen and Mohsen Toorani}, title = {Side channels in deduplication: trade-offs between leakage and efficiency}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {977}, year = {2016}, url = {http://eprint.iacr.org/2016/977}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArmknechtBDGT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/Toorani15, author = {Mohsen Toorani}, title = {Cryptanalysis of Two {PAKE} Protocols for Body Area Networks and Smart Environments}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {5}, pages = {629--636}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n5/ijns-2015-v17-n5-p629-636.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/Toorani15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Toorani15, author = {Mohsen Toorani}, title = {Cryptanalysis of a new protocol of wide use for email with perfect forward secrecy}, journal = {Secur. Commun. Networks}, volume = {8}, number = {4}, pages = {694--701}, year = {2015}, url = {https://doi.org/10.1002/sec.1018}, doi = {10.1002/SEC.1018}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Toorani15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Toorani15, author = {Mohsen Toorani}, editor = {Michael Brenner and Nicolas Christin and Benjamin Johnson and Kurt Rohloff}, title = {On Vulnerabilities of the Security Association in the {IEEE} 802.15.6 Standard}, booktitle = {Financial Cryptography and Data Security - {FC} 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8976}, pages = {245--260}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48051-9\_18}, doi = {10.1007/978-3-662-48051-9\_18}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Toorani15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hipeac/Toorani15, author = {Mohsen Toorani}, editor = {Andy D. Pimentel and Stephan Wong and Gerardo Pelosi and Israel Koren and Giovanni Agosta and Alessandro Barenghi}, title = {On Continuous After-the-Fact Leakage-Resilient Key Exchange}, booktitle = {Proceedings of the Second Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2015, Amsterdam, Netherlands, January 19-21, 2015}, pages = {31--34}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2694805.2694811}, doi = {10.1145/2694805.2694811}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hipeac/Toorani15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Toorani15, author = {Mohsen Toorani}, title = {On Vulnerabilities of the Security Association in the {IEEE} 802.15.6 Standard}, journal = {CoRR}, volume = {abs/1501.02601}, year = {2015}, url = {http://arxiv.org/abs/1501.02601}, eprinttype = {arXiv}, eprint = {1501.02601}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Toorani15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/Toorani14, author = {Mohsen Toorani}, title = {Security analysis of {J-PAKE}}, booktitle = {{IEEE} Symposium on Computers and Communications, {ISCC} 2014, Funchal, Madeira, Portugal, June 23-26, 2014}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ISCC.2014.6912576}, doi = {10.1109/ISCC.2014.6912576}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscc/Toorani14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Toorani14, author = {Mohsen Toorani}, title = {On Continuous After-the-Fact Leakage-Resilient Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1010}, year = {2014}, url = {http://eprint.iacr.org/2014/1010}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Toorani14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/AmiraniTM13, author = {Mehdi Chehel Amirani and Mohsen Toorani and Sara Mihandoost}, title = {Feature-based Type Identification of File Fragments}, journal = {Secur. Commun. Networks}, volume = {6}, number = {1}, pages = {115--128}, year = {2013}, url = {https://doi.org/10.1002/sec.553}, doi = {10.1002/SEC.553}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/AmiraniTM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/TooraniF11, author = {Mohsen Toorani and Abolfazl Falahati}, title = {A secure cryptosystem based on affine transformation}, journal = {Secur. Commun. Networks}, volume = {4}, number = {2}, pages = {207--215}, year = {2011}, url = {https://doi.org/10.1002/sec.137}, doi = {10.1002/SEC.137}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/TooraniF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/TooraniS10, author = {Mohsen Toorani and {Ali Asghar} {Beheshti Shirazi}}, title = {Cryptanalysis of an Elliptic Curve-based Signcryption Scheme}, journal = {Int. J. Netw. Secur.}, volume = {10}, number = {1}, pages = {51--56}, year = {2010}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n1/ijns-2010-v10-n1-p51-56.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/TooraniS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1002-3171, author = {Mohsen Toorani and {Ali Asghar} {Beheshti Shirazi}}, title = {{SSMS} - {A} Secure {SMS} Messaging Protocol for the M-payment Systems}, journal = {CoRR}, volume = {abs/1002.3171}, year = {2010}, url = {http://arxiv.org/abs/1002.3171}, eprinttype = {arXiv}, eprint = {1002.3171}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1002-3171.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1002-3174, author = {Mehdi Chehel Amirani and Mohsen Toorani and Asghar Beheshti}, title = {A new approach to content-based file type detection}, journal = {CoRR}, volume = {abs/1002.3174}, year = {2010}, url = {http://arxiv.org/abs/1002.3174}, eprinttype = {arXiv}, eprint = {1002.3174}, timestamp = {Thu, 29 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1002-3174.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1002-3175, author = {Mohsen Toorani and {Ali Asghar} {Beheshti Shirazi}}, title = {Solutions to the {GSM} Security Weaknesses}, journal = {CoRR}, volume = {abs/1002.3175}, year = {2010}, url = {http://arxiv.org/abs/1002.3175}, eprinttype = {arXiv}, eprint = {1002.3175}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1002-3175.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1002-3176, author = {Mohsen Toorani}, title = {SMEmail - {A} New Protocol for the Secure E-mail in Mobile Environments}, journal = {CoRR}, volume = {abs/1002.3176}, year = {2010}, url = {http://arxiv.org/abs/1002.3176}, eprinttype = {arXiv}, eprint = {1002.3176}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1002-3176.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1002-3299, author = {Mohsen Toorani and {Ali Asghar} {Beheshti Shirazi}}, title = {{LPKI} - {A} Lightweight Public Key Infrastructure for the Mobile Environments}, journal = {CoRR}, volume = {abs/1002.3299}, year = {2010}, url = {http://arxiv.org/abs/1002.3299}, eprinttype = {arXiv}, eprint = {1002.3299}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1002-3299.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1002-3303, author = {Mohsen Toorani and {Ali Asghar} {Beheshti Shirazi}}, title = {Cryptanalysis of an Efficient Signcryption Scheme with Forward Secrecy Based on Elliptic Curve}, journal = {CoRR}, volume = {abs/1002.3303}, year = {2010}, url = {http://arxiv.org/abs/1002.3303}, eprinttype = {arXiv}, eprint = {1002.3303}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1002-3303.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1002-3316, author = {Mohsen Toorani and Asghar Beheshti}, title = {A Directly Public Verifiable Signcryption Scheme based on Elliptic Curves}, journal = {CoRR}, volume = {abs/1002.3316}, year = {2010}, url = {http://arxiv.org/abs/1002.3316}, eprinttype = {arXiv}, eprint = {1002.3316}, timestamp = {Thu, 29 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1002-3316.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1002-3567, author = {Mohsen Toorani and Abolfazl Falahati}, title = {A Secure Variant of the Hill Cipher}, journal = {CoRR}, volume = {abs/1002.3567}, year = {2010}, url = {http://arxiv.org/abs/1002.3567}, eprinttype = {arXiv}, eprint = {1002.3567}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1002-3567.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1004-3521, author = {Mohsen Toorani and {Ali Asghar} {Beheshti Shirazi}}, title = {Cryptanalysis of an Elliptic Curve-based Signcryption Scheme}, journal = {CoRR}, volume = {abs/1004.3521}, year = {2010}, url = {http://arxiv.org/abs/1004.3521}, eprinttype = {arXiv}, eprint = {1004.3521}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1004-3521.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1005-1856, author = {Mohsen Toorani and {Ali Asghar} {Beheshti Shirazi}}, title = {An Elliptic Curve-based Signcryption Scheme with Forward Secrecy}, journal = {CoRR}, volume = {abs/1005.1856}, year = {2010}, url = {http://arxiv.org/abs/1005.1856}, eprinttype = {arXiv}, eprint = {1005.1856}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1005-1856.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/TooraniF09, author = {Mohsen Toorani and Abolfazl Falahati}, title = {A secure variant of the Hill Cipher}, booktitle = {Proceedings of the 14th {IEEE} Symposium on Computers and Communications {(ISCC} 2009), July 5-8, Sousse, Tunisia}, pages = {313--316}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ISCC.2009.5202241}, doi = {10.1109/ISCC.2009.5202241}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscc/TooraniF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/TooraniS09, author = {Mohsen Toorani and {Ali Asghar} {Beheshti Shirazi}}, title = {A directly public verifiable signcryption scheme based on elliptic curves}, booktitle = {Proceedings of the 14th {IEEE} Symposium on Computers and Communications {(ISCC} 2009), July 5-8, Sousse, Tunisia}, pages = {713--716}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ISCC.2009.5202242}, doi = {10.1109/ISCC.2009.5202242}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscc/TooraniS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/TooraniS08, author = {Mohsen Toorani and {Ali Asghar} {Beheshti Shirazi}}, title = {{SSMS} - {A} secure {SMS} messaging protocol for the m-payment systems}, booktitle = {Proceedings of the 13th {IEEE} Symposium on Computers and Communications {(ISCC} 2008), July 6-9, Marrakech, Morocco}, pages = {700--705}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ISCC.2008.4625610}, doi = {10.1109/ISCC.2008.4625610}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscc/TooraniS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/AmiraniTS08, author = {Mehdi Chehel Amirani and Mohsen Toorani and {Ali Asghar} {Beheshti Shirazi}}, title = {A new approach to content-based file type detection}, booktitle = {Proceedings of the 13th {IEEE} Symposium on Computers and Communications {(ISCC} 2008), July 6-9, Marrakech, Morocco}, pages = {1103--1108}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ISCC.2008.4625611}, doi = {10.1109/ISCC.2008.4625611}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscc/AmiraniTS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.