Mohsen Toorani

Orcid: 0000-0002-3769-5307

According to our database1, Mohsen Toorani authored at least 27 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Blockchain-based Decentralized Identity Management for Healthcare Systems.
CoRR, 2023

2021
A decentralized dynamic PKI based on blockchain.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

A Permissioned Blockchain-based System for Collaborative Drug Discovery.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

2018
Definitions for Plaintext-Existence Hiding in Cloud Storage.
IACR Cryptol. ePrint Arch., 2018

2017
Security notions for cloud storage and deduplication.
IACR Cryptol. ePrint Arch., 2017

2016
Cryptanalysis of a robust key agreement based on public key authentication.
Secur. Commun. Networks, 2016

Security analysis of the IEEE 802.15.6 standard.
Int. J. Commun. Syst., 2016

Side channels in deduplication: trade-offs between leakage and efficiency.
IACR Cryptol. ePrint Arch., 2016

Using Cryptography to Control Your Data at a Distance.
ERCIM News, 2016

Security protocols in a nutshell.
CoRR, 2016

2015
Cryptanalysis of a new protocol of wide use for email with perfect forward secrecy.
Secur. Commun. Networks, 2015

Cryptanalysis of Two PAKE Protocols for Body Area Networks and Smart Environments.
Int. J. Netw. Secur., 2015

On Vulnerabilities of the Security Association in the IEEE 802.15.6 Standard.
Proceedings of the Financial Cryptography and Data Security, 2015

2014
On Continuous After-the-Fact Leakage-Resilient Key Exchange.
IACR Cryptol. ePrint Arch., 2014

Security analysis of J-PAKE.
Proceedings of the IEEE Symposium on Computers and Communications, 2014

2013
Feature-based Type Identification of File Fragments.
Secur. Commun. Networks, 2013

2011
A secure cryptosystem based on affine transformation.
Secur. Commun. Networks, 2011

2010
Cryptanalysis of an Elliptic Curve-based Signcryption Scheme.
Int. J. Netw. Secur., 2010

An Elliptic Curve-based Signcryption Scheme with Forward Secrecy
CoRR, 2010

Cryptanalysis of an Efficient Signcryption Scheme with Forward Secrecy Based on Elliptic Curve
CoRR, 2010

LPKI - A Lightweight Public Key Infrastructure for the Mobile Environments
CoRR, 2010

SMEmail - A New Protocol for the Secure E-mail in Mobile Environments
CoRR, 2010

Solutions to the GSM Security Weaknesses
CoRR, 2010

2009
A directly public verifiable signcryption scheme based on elliptic curves.
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009

A secure variant of the Hill Cipher.
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009

2008
SSMS - A secure SMS messaging protocol for the m-payment systems.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008

A new approach to content-based file type detection.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008


  Loading...