Follow
Mohsen Toorani
Mohsen Toorani
Associate Professor, University of South-Eastern Norway (USN)
Verified email at usn.no - Homepage
Title
Cited by
Cited by
Year
Solutions to the GSM Security Weaknesses
M Toorani, A Beheshti
Proceedings of the 2nd International Conference on Next Generation Mobile …, 2008
1442008
SSMS - A secure SMS messaging protocol for the m-payment systems
M Toorani, A Beheshti
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC …, 2008
1442008
A new approach to content-based file type detection
MC Amirani, M Toorani, A Beheshti
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC …, 2008
932008
LPKI - a Lightweight Public Key Infrastructure for the mobile environments
M Toorani, A Beheshti
Proceedings of the 11th IEEE International Conference on Communication …, 2008
892008
On Vulnerabilities of the Security Association in the IEEE 802.15.6 Standard
M Toorani
Financial Cryptography and Data Security 8976, 245-260, 2015
822015
An elliptic curve-based signcryption scheme with forward secrecy
M Toorani, A Beheshti
Journal of Applied Sciences 9 (6), 1025-1035, 2009
742009
A secure variant of the Hill Cipher
M Toorani, A Falahati
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC …, 2009
722009
Cryptanalysis of an elliptic curve-based signcryption scheme
M Toorani, A Beheshti
International Journal of Network Security 10 (1), 51-56, 2010
542010
Feature‐based Type Identification of File Fragments
MC Amirani, M Toorani, S Mihandoost
Security and Communication Networks 6 (1), 115-128, 2013
532013
Cryptanalysis of an efficient signcryption scheme with forward secrecy based on elliptic curve
M Toorani, A Beheshti
Proceedings of 2008 International Conference on Computer and Electrical …, 2008
422008
Side channels in deduplication: trade-offs between leakage and efficiency
F Armknecht, C Boyd, GT Davies, K Gjøsteen, M Toorani
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2016
382016
A secure cryptosystem based on affine transformation
M Toorani, A Falahati
Security and Communication Networks 4 (2), 207-215, 2011
372011
A decentralized dynamic PKI based on blockchain
M Toorani, C Gehrmann
Proceedings of the 36th annual ACM symposium on applied computing, 1646-1655, 2021
322021
SMEmail - A New Protocol for the Secure E-mail in Mobile Environments
M Toorani
Proceedings of the Australian Telecommunications Networks and Applications …, 2008
322008
Security analysis of the IEEE 802.15.6 standard
M Toorani
International Journal of Communication Systems 29 (17), 2471-2489, 2016
302016
A directly public verifiable signcryption scheme based on elliptic curves
M Toorani, A Beheshti
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC …, 2009
222009
Cryptanalysis of Two PAKE Protocols for Body Area Networks and Smart Environments
M Toorani
International Journal of Network Security 17 (5), 629-636, 2015
202015
On continuous after-the-fact leakage-resilient key exchange
M Toorani
Proceedings of the Second Workshop on Cryptography and Security in Computing …, 2015
182015
Cryptanalysis of a robust key agreement based on public key authentication
M Toorani
Security and Communication Networks 9 (1), 19-26, 2016
112016
Security Evaluation of the Short Message Service
M Toorani, M Ahmadian Attari
10*2008
The system can't perform the operation now. Try again later.
Articles 1–20