Babak Sadeghiyan
Orcid: 0000-0002-5947-7570
According to our database1,
Babak Sadeghiyan
authored at least 58 papers
between 1991 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IACR Cryptol. ePrint Arch., 2024
2022
2021
A new image encryption scheme with Feistel like structure using chaotic S-box and Rubik cube based P-box.
Multim. Tools Appl., 2021
CoRR, 2021
2020
J. Intell. Fuzzy Syst., 2020
A probability distribution function for investigating node infection and removal times.
Trans. Emerg. Telecommun. Technol., 2020
A Secure Two-Party Computation Protocol for Intersection Detection between Two Convex Hulls.
CoRR, 2020
Proceedings of the 10th International Symposium on Telecommunications, 2020
2019
IACR Cryptol. ePrint Arch., 2019
Trans. Emerg. Telecommun. Technol., 2019
Proceedings of the 7th International Symposium on Digital Forensics and Security, 2019
2018
ConsiDroid: A Concolic-based Tool for Detecting SQL Injection Vulnerability in Android Apps.
CoRR, 2018
2017
IET Commun., 2017
IACR Cryptol. ePrint Arch., 2017
Privacy issues in intrusion detection systems: A taxonomy, survey and future directions.
Comput. Sci. Rev., 2017
2016
Secur. Commun. Networks, 2016
Inf. Softw. Technol., 2016
IET Softw., 2016
Proceedings of the 8th International Symposium on Telecommunications, 2016
2015
Proceedings of the 21st IEEE Pacific Rim International Symposium on Dependable Computing, 2015
2014
ZIDS: A Privacy-Preserving Intrusion Detection System Using Secure Two-Party Computation Protocols.
Comput. J., 2014
2013
2012
Proceedings of the 6th International Symposium on Telecommunications, 2012
Proceedings of the 6th International Symposium on Telecommunications, 2012
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012
2011
J. Circuits Syst. Comput., 2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
IACR Cryptol. ePrint Arch., 2011
2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
IEICE Electron. Express, 2010
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010
2009
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009
2008
Inf. Sci., 2008
Multi-Collisions Attack in Ring Hash Structure.
Proceedings of the SECRYPT 2008, 2008
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008
2007
A Timing Attack on Blakley's Modular Multiplication Algorithm, and Applications to DSA.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007
2006
Proceedings of the Third International Conference on Information Technology: New Generations (ITNG 2006), 2006
2004
Finding suitable differential characteristics for block ciphers with Ant colony technique.
Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28, 2004
2000
Proceedings of the IEEE International Symposium on Circuits and Systems, 2000
1996
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996
1993
Lecture Notes in Computer Science 756, Springer, ISBN: 3-540-57500-6, 1993
1992
A Construction for Super Pseudorandom Permutations from A Single Pseudorandom Function.
Proceedings of the Advances in Cryptology, 1992
1991
Proceedings of the Advances in Cryptology, 1991
Proceedings of the Advances in Cryptology, 1991
On Necessary and Sufficient Conditions for the Construction of Super Pseudorandom Permutations.
Proceedings of the Advances in Cryptology, 1991