Solutions to the GSM Security Weaknesses M Toorani, A Beheshti Proceedings of the 2nd International Conference on Next Generation Mobile …, 2008 | 144 | 2008 |
SSMS - A secure SMS messaging protocol for the m-payment systems M Toorani, A Beheshti Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC …, 2008 | 144 | 2008 |
A new approach to content-based file type detection MC Amirani, M Toorani, A Beheshti Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC …, 2008 | 93 | 2008 |
LPKI - a Lightweight Public Key Infrastructure for the mobile environments M Toorani, A Beheshti Proceedings of the 11th IEEE International Conference on Communication …, 2008 | 89 | 2008 |
On Vulnerabilities of the Security Association in the IEEE 802.15.6 Standard M Toorani Financial Cryptography and Data Security 8976, 245-260, 2015 | 82 | 2015 |
An elliptic curve-based signcryption scheme with forward secrecy M Toorani, A Beheshti Journal of Applied Sciences 9 (6), 1025-1035, 2009 | 74 | 2009 |
A secure variant of the Hill Cipher M Toorani, A Falahati Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC …, 2009 | 72 | 2009 |
Cryptanalysis of an elliptic curve-based signcryption scheme M Toorani, A Beheshti International Journal of Network Security 10 (1), 51-56, 2010 | 54 | 2010 |
Feature‐based Type Identification of File Fragments MC Amirani, M Toorani, S Mihandoost Security and Communication Networks 6 (1), 115-128, 2013 | 53 | 2013 |
Cryptanalysis of an efficient signcryption scheme with forward secrecy based on elliptic curve M Toorani, A Beheshti Proceedings of 2008 International Conference on Computer and Electrical …, 2008 | 42 | 2008 |
Side channels in deduplication: trade-offs between leakage and efficiency F Armknecht, C Boyd, GT Davies, K Gjøsteen, M Toorani Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2016 | 38 | 2016 |
A secure cryptosystem based on affine transformation M Toorani, A Falahati Security and Communication Networks 4 (2), 207-215, 2011 | 37 | 2011 |
A decentralized dynamic PKI based on blockchain M Toorani, C Gehrmann Proceedings of the 36th annual ACM symposium on applied computing, 1646-1655, 2021 | 32 | 2021 |
SMEmail - A New Protocol for the Secure E-mail in Mobile Environments M Toorani Proceedings of the Australian Telecommunications Networks and Applications …, 2008 | 32 | 2008 |
Security analysis of the IEEE 802.15.6 standard M Toorani International Journal of Communication Systems 29 (17), 2471-2489, 2016 | 30 | 2016 |
A directly public verifiable signcryption scheme based on elliptic curves M Toorani, A Beheshti Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC …, 2009 | 22 | 2009 |
Cryptanalysis of Two PAKE Protocols for Body Area Networks and Smart Environments M Toorani International Journal of Network Security 17 (5), 629-636, 2015 | 20 | 2015 |
On continuous after-the-fact leakage-resilient key exchange M Toorani Proceedings of the Second Workshop on Cryptography and Security in Computing …, 2015 | 18 | 2015 |
Cryptanalysis of a robust key agreement based on public key authentication M Toorani Security and Communication Networks 9 (1), 19-26, 2016 | 11 | 2016 |
Security Evaluation of the Short Message Service M Toorani, M Ahmadian Attari | 10* | 2008 |