Menu
Cohorets
Computer Engineering
College Name:
Faculty of Engineering
Educational Group Name:
Computer Engineering
Status:
Active
Room Number:
Email:
Phone:
Journal Articles
- A Hybrid Approach to Multimodal Biometric Recognition Based on Feature?level Fusion of Face, Two Irises, and Both Thumbprints
- Journal of Medical Signals and Sensors
- LAPTAS: lightweight anonymous privacy-preserving three-factor authentication scheme for WSN-based IIoT
- Wireless Networks
- A New Side-Channel Attack on Reduction of RSA CRT Montgomery Method Based
- Journal of Circuits, Systems and Computers
- A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT
- Computer Networks:The International Journal of Computer and Telecommunications
- A New Side-Channel Attack on Reduction of RSA-CRT Montgomery Method Based
- Journal of circuit, system and computer
- A Lightweight and Efficient Data Sharing Scheme for Cloud Computing
- International Journal of Electronics and Information Engineering
- A DPA Attack on IOA Data-Dependent Delay Countermeasure Based on an Inherent Tempo-Spatial Data Dependency
- IEEE Transactions on Circuits and Systems II: Express Briefs
- Low-complexity and differential power analysis (DPA)-resistant two-folded power-aware Rivest-Shamir-Adleman (RSA) security schema implementation for IoT-connected devices
- IET Computers & Digital Techniques
- NEMR: A Nonequidistant DPA Attack-Proof of Modular Reduction in a CRT Implementation of RSA
- Journal of Circuits, Systems and Computers
- Determining the Number of Accusations for Decision Making in Key Revocation Protocol for MANET
- Journal of Computing and Security
- A review on feature based access control in cloud environment
- منادي امنيت فضاي توليد و تبادل اطلاعات
- A review on privacy and security enhancement in identification management systems
- منادي امنيت فضاي توليد و تبادل اطلاعات
- Fully distributed ECC-based key management for mobile ad hoc networks
- Computer Networks:The International Journal of Computer and Telecommunications
- Studying privacy in electronic voting protocols and comparing its methods of provision
- Journal of Fundamental and Applied Sciences
- Classification of Hardware Trojans and a new method for their detection
- فناوري اطلاعات و ارتباطات ايران
- A Probabilistic Approach on the Composition of Cryptographic Systems
- Research Journal of Fisheries and HydroBiology
- شاهد: راي گيري اينترنتي امن با بهره گيري از زيرساخت هاي بانكي
- رايانش نرم و فن اوري اطلاعات=Journal of Soft Computing and Information Technology
- Toward PMI-Based access control and management framework for infrastructure as a service (IaaS) providers
- Research-Technology Management
- On the performance of SIFT algorithem on hidden finger print in electronic commerce transactions
- صنايع الکترونيک
- Design and implementation of a novel secure internet voting protocol using Java Card 3 technology
- International Journal of Business Information Systems
- Determining Threshold Value and Sharing Secret Updating Period in MANET
- Advances in Computer Science: an International Journal
- A New M-Payment Protocol Using Sign-Cryption & Elliptic Curve Cryptography
- پدافند الکترونيکي و سايبري
- A new secure Internet voting protocol using Java Card 3 technology and Java information flow concept
- Security and Communication Networks
- A New Method to Persian Text Watermarking Using Curvaceous Letters
- Journal of Basic and Applied Scientific Research
- Detection of Espionage Activities in Social Networks using Fuzzy Logic
- رايانش نرم و فن اوري اطلاعات=Journal of Soft Computing and Information Technology
- Anomaly detection in cliques of online social networks using fuzzy node _ fuzzy graph
- Journal of Basic and Applied Scientific Research
- Diverse Comparision of Linear and Nonlinear Approaches & Efficency of Wavelet Nural Network Aaproche in Appearance-Based Identification
- International Research Journal of Engineering and Technologies
- Subband-Based Single-Channel Source Separation of Instantaneous Audio Mixtures
- World Applied Science Journal
Conferences Articles
- Deep Hybrid Multimodal Biometric Recognition System Based on Features-Level Deep Fusion of Five Biometric Traits
- HINDAWI LTD
- A Face-Iris Multimodal Biometric System Using Feature-Level Fusion and Kernel
- 3rd International Conference on Science, Engineering, Technology and Tech Business
- Blockchain based Authentication and Access Verification Scheme in Smart Home Journal of Ambient Intelligence and Humanized Computing
- SPRINGER HEIDELBERG
- A Hybrid Multimodal Biometric System based on Feature-Level Fusion of Face, both Irises and two Fingerprints
- نهمين کنگره مشترک سيستمهاي فازي و هوشمند ايران
- A Multimodal Biometric System Based on Face, Iris and Fingerprint Features Fusion
- سيزدهمين كنفرانس بين المللي فناوري اطلاعات،كامپيوتر و مخابرات
- Hardware Trojan detection based on power analysis using PCA and artificial network MLP
- شانزدهمين كنفرانس بين الملل انجمن رمز ايران
- Hardware Trojan detection based on power analysis using PCA and artificial network MLP
- شانزدهمين کنفرانس بين الملل انجمن رمز ايران
- A comparison of methods of sole control over digital signature using AHP technique
- چهارمين کنفرانس ملي علوم و مهندسي کامپيوتر و فناوري اطلاعات
- A comparison of methods of sole control over digital signature using AHP technique
- چهارمين كنفرانس ملي علوم و مهندسي كامپيوتر و فناوري اطلاعات
- A criterion for hardware trojan detection using leakage of cryptographic key
- پانزدهمين کنفرانس بين المللي انجمن رمز ايران
- A survay on Multibiometric systems based on fusion on feature level
- کنفرانس ملي مهندسي کامپيوتر، فناوري اطلاعاتو کاربردهاي هوش مصنوعي
- A survay on Multibiometric systems based on fusion on feature level
- كنفرانس ملي مهندسي كامپيوتر، فناوري اطلاعاتو كاربردهاي هوش مصنوعي
- A privacy and anonymity protocol for eHealth using PKI
- 4TH International Conference on Applied Research in Computer Engineering and Signal Processing
- A privacy and anonymity protocol for eHealth using PKI
- 4TH International Conference on Applied Research in Computer Engineering and Signal Processing
- A review of trusted computing new technologies and providing solutions for using these technologies in electronic health
- 3rd International conference on Electrical, Electronic and Computer Engineering
- A review of trusted computing new technologies and providing solutions for using these technologies in electronic health
- 3rd International conference on Electrical, Electronic and Computer Engineering
- A New Secure e-Health Structure Based On Mobile Trusted Computing
- 1st international conference new perspective in Electrical and computer Engineering
- A New Secure e-Health Structure Based On Mobile Trusted Computing
- 1st international conference new perspective in Electrical and computer Engineering
- A comprehensive system of E_health for secure access to personal health records(PHR) using Mobile technology
- کنفرانس بين المللي يافته هاي نوين پژوهشي در مهندسي برق و علوم کامپيوتر
- A comprehensive system of E_health for secure access to personal health records(PHR) using Mobile technology
- كنفرانس بين المللي يافته هاي نوين پژوهشي در مهندسي برق و علوم كامپيوتر
- Fully Distributed Self Certified Key Management for Large-Scale MANETs
- Ubiquitous Intelligence and Computing, 2012 IEEE 10th International Conference on and 10th International Conferencece on Automatic and trusted Computi
- Security Improvement of the FOO Protocol using Java Card 3 and JIF concept ُ
- نهمين کنفرانس بين المللي انجمن رمز ايران
- Security Improvement of the FOO Protocol using Java Card 3 and JIF concept
- نهمين كنفرانس بين المللي انجمن رمز ايران
- Security Improvement of FOO Protocol using Java Card 3 Technology and JIF concept
- نهمين كنفرانس بين المللي انجمن رمز ايران
- A new method for watermarking persian words using characteristics of the alphabets
- دومين همايش ملي مهندسي کامپيوتر، برق و فناوري اطلاعات
- Hardware Trojans, Review, Categorization, Implimentation, and Defends Methods
- چهارمين کنفرانس فناوري اطلاعات و دانش
- Improvement of capacity of watermarking in Persian texts
- کنفرانس منطقه اي تجارت الکترونيکي و امنيت شبکه هاي کامپيوتري
- A new method of watermarking persian wordsha and mi
- کنفرانس منطقه اي تجارت الکترونيکي و امنيت شبکه هاي کامپيوتري
- Improvement of capacity of watermarking in Persian texts
- كنفرانس منطقه اي تجارت الكترونيكي و امنيت شبكه هاي كامپيوتري
- A new method of watermarking persian wordsha and mi
- كنفرانس منطقه اي تجارت الكترونيكي و امنيت شبكه هاي كامپيوتري
- Public Key Infrastructure in E-health
- چهارمين کنفرانس سلامت الکترونيکي و کاربردهاي ICT در پزشکي ايران
- An E-health architecture based on Smart Card, PKI, and sure name
- چهارمين کنفرانس سلامت الکترونيکي و کاربردهاي ICT در پزشکي ايران
- Public Key Infrastructure in E-health
- چهارمين كنفرانس سلامت الكترونيكي و كاربردهاي ICT در پزشكي ايران
- An E-health architecture based on Smart Card, PKI, and sure name
- چهارمين كنفرانس سلامت الكترونيكي و كاربردهاي ICT در پزشكي ايران
- A Strategy Planning on Iran National ID Smart Card Program
- Cartes 2010: Mobility-Payment - Smart & Secure tecnogies Congress
- طراحي و پياده سازي مينيمم سيستم سخت افزاري امنيتي ضد مداخله
- اولين کنفرانس دانشجويي فناوري اطلاعات ايران (1389)
- Power Analysis On Rfid Smartcard Algorithms Using Simulation
- 4th International Information Security & cryptology Conference
- Improving the Client Security using the Smart Card and Trusted Server
- International Conference on Security and Management
- Differential Power Analysis in the Smart Card by Data Simulation
- 2008 International Conference on multimedia and information Technology
- Automatic face feature extraction for rotation invariant human identification in 3D face images
- 5th Iranian Conference on Machine Vision and Image Processing
- Automatic face feature extraction for rotation invariant human identification in 3D face images
- 5th Iranian Conference on Machine Vision and Image Processing
- Face Segmentation Using Image Oriention Field and Poincare Index
- 5th Iranian Conference on Machine Vision and Image Processing
- A New Approach for Secure and Portable OS
- the second International Conference on Emerging Security Information,Systems and Technologies
- An Image Watermarking Method Based on Bidimensional Empirical Decomposition
- 2008 Congress on Image and Signal Procesing
- استخراج يك ويژگي جديد مبتني بر تبديل موجك براي بهبود عملكرد سيستم هاي تشخيص هويت به وسيله عنبيه
- شانزدهمين كنفرانس مهندسي برق ايران
- تركيب ويژگي هاي موجك سيملت 2 و گابور براي استخراج ويژگي از تصاوير عنبيه در سيستم هاي تشخيص هويت به وسيله عنبيه
- چهاردهمين كنفرانس مهندسي پزشكي ايران
- طراحي يك سيستم كارآمد تشخيص هويت براساس آناليز تصاوير عنبيه چشم با استفاده از تبديل موجك سيملت 2
- سومين کنفرانس فناوري اطلاعات و دانش، دانشگاه مشهد
- A new method for watermarking persian words using characteristics of the alphabets
- دومين همايش ملي مهندسي كامپيوتر، برق و فناوري اطلاعات
Thesis
- A framework to improve mobile security using SIM-based trusted computing and mobile cloud computing infrastructure
- 1400/09/22 Mohammadali Doostari (استاد راهنما 1)
- يک طرح احراز هويت در فناوري خانه هوشمند بر پايه فناوري بلاک چين
- 1398/11/07 Mohammadali Doostari (استاد راهنما اول)
- Design and Implementation of a countermeasure method against DPA on McEliece Post Quantum Cryptosystem
- 1398/10/30 Mohammadali Doostari (استاد راهنما 1)
- ارائه يک پروتکل احراز هويت سبک وزن مبتني بر شبکه هاي حسگر بي سيم در اينترنت اشيا
- 1398/10/25 Mohammadali Doostari (استاد راهنما دوم)
- ارايه يک پروتکل احراز هويت سبک وزن مبتني بر توابع درهمساز در شبکه هاي سنسور بي سيم در حوزه سلامت الکترونيک
- 1398/10/25 Mohammadali Doostari (استاد راهنما دوم)
- ارايه يک پروتکل توافق کليد سبک وزن در سلامت الکترونيکي مبتني بر نگاشت اشوبي
- 1398/08/22 Mohammadali Doostari (استاد راهنما دوم)
- 1398/06/20 Mohammadali Doostari (استاد راهنما 1)
- A differential power analysis attack on the mask RSM implemented on the AES encryption algorithm
- 1398/04/17 Mohammadali Doostari (استاد راهنما 1)
- Improvement in Mobile Payment Security Using Trusted Computing Infrastructures
- 1397/11/17 Mohammadali Doostari (استاد راهنما 1)
- Power Analysis Side Channel Attack Countermeasure on RSA Cryptography Algorithm with Logical and Physical Wrapper
- 1397/11/03 Mohammadali Doostari (استاد راهنما 1)
- Using Smart Phone Secure Elements for Important Applications and Data Exchanges
- 1397/07/26 Mohammadali Doostari (استاد راهنما 1)
- Hardware Trojan Detection with power analysis and pattern recognition technique
- 1396/11/18 Mohammadali Doostari (استاد راهنما 1)
- Automatic Security Verification of Java-based Android Applications
- 1396/11/18 Mohammadali Doostari (استاد راهنما دوم)
- Assessment and improvement of digital signing requirements
- 1396/11/16 Mohammadali Doostari (استاد راهنما 1)
- A Multibiometric System Using Information Fusion of Fingerprint and Iris
- 1396/11/14 Mohammadali Doostari (استاد راهنما 1)
- A Solution for Utilizing Digital Signature and PKI in E-Health
- 1395/11/18 Mohammadali Doostari (استاد راهنما 1)
- A Solution for Utilizing Digital Signature and PKI in E-Health
- 1395/11/18 Mohammadali Doostari (استاد راهنما 1)
- A Solution for Utilizing Digital Signature and PKI in E-Health
- 1395/11/18 Mohammadali Doostari (استاد راهنما 1)
- Improvement of privacy and security in Identity Management System
- 1395/11/16 Mohammadali Doostari (استاد راهنما 1)
- Attribute Based Access Control for Cloud Computing
- 1395/11/11 Mohammadali Doostari (استاد راهنما 1)
- 1395/11/11 Mohammadali Doostari (استاد راهنما اول)
- Analysis and Countermeasure for Lightweight Cryptograpic Algorithms against Side Channel Attacks
- 1395/11/11 Mohammadali Doostari (استاد راهنما 1)
- ارايه حمله به الگوريتم AES ماسک شده با روش کانال جانبي
- 1394/11/07 Mohammadali Doostari (استاد راهنما 1)
- A solution to increase the security on smart phones against relay attacks
- 1394/11/05 Mohammadali Doostari (استاد راهنما 1)
- Secure Architecture and Platform for Electronic Health Card System
- 1394/11/05 Mohammadali Doostari (استاد راهنما 1)
- طراحي يک زيرساخت PMI مناسب براي کنترل دسترسي در ساختار محاسبات گريد
- 1393/11/08 Mohammadali Doostari (استاد راهنما 1)
- Improving Support Mechanisms on Sole Control over Signature Creation Data in Digital Signature Scheme
- 1393/11/04 Mohammadali Doostari (استاد راهنما 1)
- A New Method for Finding Lower Bounds on the Complexity of Secret Sharing Schemes
- 1393/11/04 Mohammadali Doostari (استاد راهنما 1)
- A Method for Reliability Check of Electronic Evidence in Windows OS during the Process of Digital Forensic
- 1393/10/29 Mohammadali Doostari (استاد راهنما 1)
- PKI in e-health and offering a new protocol for privacy improvement in e-health system
- 1393/10/20 Mohammadali Doostari (استاد راهنما 1)
- Least significant bit image steganography using edges
- 1392/11/05 Mohammadali Doostari (استاد راهنما اول)
- تحليل قابليت بازبيني در پروتکل هاي راي گيري الکترونيکي و افزايش امنيت انها
- 1392/10/28 Mohammadali Doostari (استاد راهنما 1)
- بهکارگيري روشهاي بيومتريکي و پنهان نگاري در رايگيري الکترونيکي
- 1392/10/28 Mohammadali Doostari (استاد راهنما 1)
- استفاده از کارت هوشمند ملي جهت افزايش امنيت در پرداخت سيار
- 1392/10/23 Mohammadali Doostari (استاد راهنما 1)
- ارايه مدل بهبود يافته در تشخيص تقلب در سيستم هاي پرداخت الکترونيک
- 1392/10/23 Mohammadali Doostari (استاد راهنما 1)
- مديريت کليد در شبکههاي اقتضايي سيار
- 1392/10/07 Mohammadali Doostari (استاد راهنما 1)
- Improving electronic voting using JAVA card technology
- 1392/09/20 Mohammadali Doostari (استاد راهنما 1)
- ارايه راهکار مديريت کليد مبتني بر شناسه در شبکههاي اقتضايي سيار
- 1392/09/20 Mohammadali Doostari (استاد راهنما 1)
- -
- 1391/11/04 Mohammadali Doostari (استاد راهنما 1)
- Role Based Access Control for Electronic Health Record Systems
- 1391/11/04 Mohammadali Doostari (استاد راهنما 1)
- -
- 1391/11/02 Mohammadali Doostari (استاد راهنما 1)
- -
- 1391/11/02 Mohammadali Doostari (استاد راهنما 1)
- -
- 1391/11/02 Mohammadali Doostari (استاد راهنما 1)
- -
- 1391/11/02 Mohammadali Doostari (استاد راهنما 1)
- Evaluation of Hardware Trojan Design and Identification
- 1391/11/02 Mohammadali Doostari (استاد راهنما اول)
- امكان سنجي راي گيري الكترونيكي از راه دور و مسايل امنيتي آن
- 1390/11/09 Mohammadali Doostari (استاد راهنما 1)
- بررسي و امكان سنجي بهبود سيستمهاي جستجوي اطلاعات فارسي - انگليسي
- 1390/11/09 Mohammadali Doostari (استاد راهنما 1)
- A feasibility study on using Java Smart Card in E-voting and its security aspects
- 1390/10/28 Mohammadali Doostari (استاد راهنما 1)
- بررسي انواع روشهاي انتخابات الكترونيكي و آناليز امنيتي آنها
- 1390/10/28 Mohammadali Doostari (استاد راهنما 1)
- Analysis of remote attestation using TPM
- 1390/06/16 Mohammadali Doostari (استاد راهنما 1)
- A study on privacy in E-voting systems
- 1390/06/16 Mohammadali Doostari (استاد راهنما 1)
- A Study on Privacy and Anonymity in Social Networks and its improvement
- 1390/06/15 Mohammadali Doostari (استاد راهنما 1)
- Personal identification using footprint
- 1389/12/18 Mohammadali Doostari (استاد راهنما 1)
- 1389/10/15 Mohammadali Doostari (استاد راهنما 1)
- 1388/12/24 Mohammadali Doostari (استاد راهنما 1)
- شناسايي چهره با کمک تصاوير سه بعدي
- 1388/06/31 Mohammadali Doostari (استاد راهنما 1)
- جداسازي منابع صوتي تک کاناله با استفاده از روش هاي مبتني بر جداسازي کور منابع
- 1387/11/30 Mohammadali Doostari (استاد راهنما 1)
- Mohammadali Doostari (استاد راهنما 1)
- Mohammadali Doostari (استاد راهنما 1)
- Mohammadali Doostari (استاد راهنما 1)