Shahram Etemadi Borujeni

Orcid: 0000-0002-0959-3952

According to our database1, Shahram Etemadi Borujeni authored at least 18 papers between 2000 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Blockchain-based end-to-end privacy-preserving scheme for IoT-based healthcare systems.
J. Supercomput., January, 2024

Modification in spatial, extraction from transform: Keyless side-information steganography for JPEG.
J. Vis. Commun. Image Represent., 2024

2023
A fault-tolerant and scalable column-wise reversible quantum multiplier with a reduced size.
Quantum Inf. Process., April, 2023

2022
Reversible multiplier with a column-wise structure and a reduced number of ancilla inputs and garbage outputs.
J. Supercomput., 2022

Load-aware femtocell placement in the commercial buildings.
Phys. Commun., 2022

2021
End-to-end privacy preserving scheme for IoT-based healthcare systems.
Wirel. Networks, 2021

Hardware Trojan Prevention and Detection by Filling Unused Space Using Shift registers, Gate-chain and Extra Routing.
ISC Int. J. Inf. Secur., 2021

An Obfuscation Method Based on CFGLUTs for Security of FPGAs.
ISC Int. J. Inf. Secur., 2021

A novel approach on femtocell placement in the commercial buildings using genetic algorithm.
Trans. Emerg. Telecommun. Technol., 2021

2020
On the feasibility of using evolvable hardware for hardware Trojan detection and prevention.
Appl. Soft Comput., 2020

Evolvable Hardware Architectures on FPGA for Side-Channel Security.
Proceedings of the Applied Cryptography and Network Security Workshops, 2020

2019
Automatic Test Pattern Generation Through Boolean Satisfiability for Testing Bridging Faults.
J. Circuits Syst. Comput., 2019

2018
Security analysis of a key based color image watermarking vs. a non-key based technique in telemedicine applications.
Multim. Tools Appl., 2018

A Side-Channel Analysis for Hardware Trojan Detection Based on Path Delay Measurement.
J. Circuits Syst. Comput., 2018

2016
Secure scan-based design using Blum Blum Shub algorithm.
Proceedings of the 2016 IEEE East-West Design & Test Symposium, 2016

2013
Chaotic image encryption system using phase-magnitude transformation and pixel substitution.
Telecommun. Syst., 2013

2012
Mehrab Maps: One-Dimensional Piecewise nonlinear Chaotic Maps.
Int. J. Bifurc. Chaos, 2012

2000
Speech encryption based on fast Fourier transform permutation.
Proceedings of the 2000 7th IEEE International Conference on Electronics, 2000


  Loading...