Reza Ebrahimi Atani
Orcid: 0000-0001-9180-8707
According to our database1,
Reza Ebrahimi Atani
authored at least 43 papers
between 2007 and 2020.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2020
IACR Cryptol. ePrint Arch., 2020
Security Analysis of Public Key Searchable Encryption Schemes against Injection Attacks.
IACR Cryptol. ePrint Arch., 2020
2019
ISC Int. J. Inf. Secur., 2019
CoRR, 2019
A Wireless Sensor Network based approach to monitor and control air Pollution in large urban areas.
CoRR, 2019
2018
ISC Int. J. Inf. Secur., 2018
A Novel PUF based Logic Encryption Technique to Prevent SAT Attacks and Trojan Insertion.
Proceedings of the 9th International Symposium on Telecommunications, 2018
2017
CoRR, 2017
2016
Secur. Commun. Networks, 2016
Secur. Commun. Networks, 2016
Peer-to-Peer Netw. Appl., 2016
A novel key management scheme for heterogeneous sensor networks based on the position of nodes.
ISC Int. J. Inf. Secur., 2016
Projective plane-based key pre-distribution by key copying and exchanging based on connected dominating set in distributed wireless sensor networks.
Int. J. Inf. Commun. Technol., 2016
Int. J. Commun. Syst., 2016
A low-cost infrared-optical head tracking solution for virtual 3D audio environment using the Nintendo Wii-remote.
Entertain. Comput., 2016
A Survey of Credit Card Fraud Detection Techniques: Data and Technique Oriented Perspective.
CoRR, 2016
2015
A cluster-based vehicular cloud architecture with learning-based resource management.
J. Supercomput., 2015
Secur. Commun. Networks, 2015
A Stable Clustering Scheme Based on Adaptive Multiple Metric in Vehicular Ad-hoc Networks.
J. Inf. Sci. Eng., 2015
EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations.
ISC Int. J. Inf. Secur., 2015
Application of connected dominating sets in wildfire detection based on wireless sensor networks.
Int. J. Inf. Technol. Commun. Convergence, 2015
IACR Cryptol. ePrint Arch., 2015
RTECA: Real time episode correlation algorithm for multi-step attack scenarios detection.
Comput. Secur., 2015
Proceedings of the 12th IEEE International Conference on Networking, Sensing and Control, 2015
2014
Veh. Commun., 2014
Improving Tor security against timing and traffic analysis attacks with fair randomization.
ISC Int. J. Inf. Secur., 2014
CoRR, 2014
A Novel Anonymous Cloud Architecture Design; Providing Secure Online Services and Electronic Payments.
CoRR, 2014
Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014
A Cluster-Based Vehicular Cloud Architecture with Learning-Based Resource Management.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014
2013
IACR Cryptol. ePrint Arch., 2013
Comput. Electr. Eng., 2013
Proceedings of the 10th International ISC Conference on Information Security and Cryptology, 2013
Using location based encryption to improve the security of data access in cloud computing.
Proceedings of the International Conference on Advances in Computing, 2013
2012
Proceedings of the 6th International Symposium on Telecommunications, 2012
2011
J. Information Security, 2011
2008
Int. J. Comput. Commun. Control, 2008
Proceedings of the Image and Signal Processing - 3rd International Conference, 2008
2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the Advances in Image and Video Technology, Second Pacific Rim Symposium, 2007
Proceedings of the Tenth Euromicro Conference on Digital System Design: Architectures, 2007