Mohsen Toorani
Mohsen Toorani
Verified email at uib.no - Homepage
TitleCited byYear
SSMS - A secure SMS messaging protocol for the m-payment systems
M Toorani, A Beheshti
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC …, 2008
1122008
Solutions to the GSM Security Weaknesses
M Toorani, A Beheshti
Proceedings of the 2nd International Conference on Next Generation Mobile …, 2008
932008
LPKI - a Lightweight Public Key Infrastructure for the mobile environments
M Toorani, A Beheshti
Proceedings of the 11th IEEE International Conference on Communication …, 2008
642008
An elliptic curve-based signcryption scheme with forward secrecy
M Toorani, A Beheshti
Journal of Applied Sciences 9 (6), 1025-1035, 2009
612009
A new approach to content-based file type detection
MC Amirani, M Toorani, A Beheshti
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC …, 2008
582008
Cryptanalysis of an elliptic curve-based signcryption scheme
M Toorani, A Beheshti
International Journal of Network Security 10 (1), 51-56, 2010
452010
On Vulnerabilities of the Security Association in the IEEE 802.15.6 Standard
M Toorani
Financial Cryptography and Data Security 8976, 245-260, 2015
422015
A secure variant of the Hill Cipher
M Toorani, A Falahati
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC …, 2009
372009
Feature‐based Type Identification of File Fragments
MC Amirani, M Toorani, S Mihandoost
Security and Communication Networks 6 (1), 115-128, 2013
322013
Cryptanalysis of an efficient signcryption scheme with forward secrecy based on elliptic curve
M Toorani, A Beheshti
Proceedings of 2008 International Conference on Computer and Electrical …, 2008
322008
A secure cryptosystem based on affine transformation
M Toorani, A Falahati
Security and Communication Networks 4 (2), 207-215, 2011
272011
On continuous after-the-fact leakage-resilient key exchange
M Toorani
Proceedings of the Second Workshop on Cryptography and Security in Computing …, 2015
162015
SMEmail - A New Protocol for the Secure E-mail in Mobile Environments
M Toorani
Proceedings of the Australian Telecommunications Networks and Applications …, 2008
162008
A directly public verifiable signcryption scheme based on elliptic curves
M Toorani, A Beheshti
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC …, 2009
152009
Cryptanalysis of Two PAKE Protocols for Body Area Networks and Smart Environments
M Toorani
International Journal of Network Security 17 (5), 629-636, 2015
122015
Side channels in deduplication: trade-offs between leakage and efficiency
F Armknecht, C Boyd, GT Davies, K Gjøsteen, M Toorani
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2016
92016
Security Evaluation of the Short Message Service
M Toorani, M Ahmadian Attari
9*2008
Cryptanalysis of a new protocol of wide use for email with perfect forward secrecy
M Toorani
Security and Communication Networks 8 (4), 694-701, 2015
82015
Security analysis of the IEEE 802.15.6 standard
M Toorani
International Journal of Communication Systems 29 (17), 2471-2489, 2016
72016
Security analysis of J-PAKE
M Toorani
2014 IEEE Symposium on Computers and Communications (ISCC), 1-6, 2014
62014
The system can't perform the operation now. Try again later.
Articles 1–20