Current Research Information SysTem In Norway
 
 

 Norsk versjon


 
Mainpage
Research results/NVI
Researchers
Projects
Research units
Log in
About Cristin
 
 
   
Back to search     Short format     Full format    
Export to


Showing results 1-28 of 28

2018
1 Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen.
Definitions for Plaintext-Existence Hiding in Cloud Storage. I: ARES'18. Proceedings of The 13th International Conference on Availability, Reliability and Security - Hamburg, Germany — August 27 - 30, 2018. Association for Computing Machinery (ACM) 2018 ISBN 978-1-4503-6448-5.
NTNU UiB Untitled
 
2 Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen.
Security notions for cloud storage and deduplication. Lecture Notes in Computer Science 2018 ;Volume 11192 LNCS. p. 347-365
NTNU UiB Untitled
 
2017
3 Armknecht, Frederik; Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Toorani, Mohsen.
Side channels in deduplication: trade-offs between leakage and efficiency. ACM Asia Conference on Computer and Communications Security (ASIACCS'17); 2017-04-02 - 2017-04-06
NTNU UiB Untitled
 
4 Armknecht, Frederik; Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Toorani, Mohsen.
Side channels in deduplication: trade-offs between leakage and efficiency. I: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security. Association for Computing Machinery (ACM) 2017 ISBN 978-1-4503-4944-4. p. 266-274
NTNU UiB Untitled
 
5 Boyd, Colin Alexander; Armknecht, Frederik; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen.
Secure Deduplication - Models and Optimization. Distinguished Lectures Series in Cybersecurity; 2017-11-16
NTNU UiB Untitled
 
6 Toorani, Mohsen.
Cryptography for Cloud Security. Finse Winter School; 2017-05-07 - 2017-05-12
UiB Untitled
 
7 Toorani, Mohsen.
How to stay safe online. The UiB Magazine 2017/2018, pp. 42-43 [Journal] 2017-06-22
UiB Untitled
 
2016
8 Boyd, Colin Alexander; Davies, Gareth T.; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen.
Using Cryptography to Control Your Data at a Distance. ERCIM News 2016 ;Volume 106. p. 17-18
NTNU UiB Untitled
 
9 Toorani, Mohsen.
Cryptanalysis of a robust key agreement based on public key authentication. Security and Communication Networks 2016 ;Volume 9.(1) p. 19-26
UiB Untitled
 
10 Toorani, Mohsen.
Fully Homomorphic Encryption. Norwegian-Slovakian Workshop in Crypto; 2016-02-08 - 2016-02-10
UiB Untitled
 
11 Toorani, Mohsen.
Hvor mye kan internett ødelegge for oss?. Bergen Student-TV [TV] 2016-10-10
UiB Untitled
 
12 Toorani, Mohsen.
Security analysis of the IEEE 802.15.6 standard. International Journal of Communication Systems 2016 ;Volume 29.(17) p. 2471-2489
UiB Untitled
 
13 Ådnanes, Jens Helleland; Toorani, Mohsen.
Kva må vi passe oss for på nett?. Forskning.no [Internet] 2016-09-25
UiB Untitled
 
2015
14 Toorani, Mohsen.
Cryptanalysis of a new protocol of wide use for e-mail with perfect forward secrecy. Security and Communication Networks 2015 ;Volume 8.(4) p. 694-701
UiB Untitled
 
15 Toorani, Mohsen.
Cryptanalysis of a Protocol from FC'10. Lecture Notes in Computer Science 2015 ;Volume 8975.
UiB Untitled
 
16 Toorani, Mohsen.
Cryptanalysis of two PAKE protocols for body area networks and smart environments. International Journal of Network Security 2015 ;Volume 17.(5) p. 629-636
UiB Untitled
 
17 Toorani, Mohsen.
Interactive Information Theory. Trial lecture; 2015-11-16
UiB Untitled
 
18 Toorani, Mohsen.
On Continuous After-the-Fact Leakage-Resilient Key Exchange. Proceedings of the Second Workshop on Cryptography and Security in Computing Systems; 2015-01-19 - 2015-01-21
UiB Untitled
 
19 Toorani, Mohsen.
On Vulnerabilities of the Security Association in the IEEE 802.15.6 Standard. 1st Workshop on Wearable Security and Privacy (Wearable'15); 2015-01-31 - 2015-01-31
UiB Untitled
 
20 Toorani, Mohsen.
On vulnerabilities of the security association in the IEEE 802.15.6 standard. Lecture Notes in Computer Science 2015 ;Volume 8976. p. 245-260
UiB Untitled
 
21 Toorani, Mohsen.
Security Protocols and Provable Security. BratislavaCrypt; 2015-11-09 - 2015-11-13
UiB Untitled
 
22 Toorani, Mohsen.
Security protocols and related topics. : University of Bergen 2015 (ISBN 978-82-308-3418-3)
UiB Untitled
 
2014
23 Toorani, Mohsen.
Security analysis of J-PAKE. Proceedings of the IEEE Symposium on Computers and Communications 2014 p. -
UiB Untitled
 
2013
24 Chehel Amirani, Mehdi; Toorani, Mohsen; Mihandoost, Sara.
Feature-based type identification of file fragments. Security and Communication Networks 2013 ;Volume 6.(1) p. 115-128
UiB Untitled
 
2012
25 Toorani, Mohsen.
Certificateless Public‐Key Cryptography. Research School in Information and Communication Technology; 2012-05-03 - 2012-05-03
UiB Untitled
 
26 Toorani, Mohsen.
Feature-based Type Identification of Computer Data. FRISC Winter School; 2012-05-06 - 2012-05-11
UiB Untitled
 
27 Toorani, Mohsen.
Signature Schemes for Network Coding. PhD Students Seminar; 2012-11-09
UiB Untitled
 
2011
28 Toorani, Mohsen.
Sequences in Mobile Communication Systems. Sequences and Boolean Functions; 2011-05-20
UiB Untitled