default search action
Reza Ebrahimi Atani
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [i12]Arian Arabnouri, Reza Ebrahimi Atani, Shiva Azizzadeh:
Security Analysis of Public Key Searchable Encryption Schemes against Injection Attacks. IACR Cryptol. ePrint Arch. 2020: 1530 (2020) - [i11]Arian Arabnouri, Reza Ebrahimi Atani, Shiva Azizzadeh:
A Novel Asymmetric Searchable Encryption Scheme with Granting search capability. IACR Cryptol. ePrint Arch. 2020: 1553 (2020)
2010 – 2019
- 2019
- [j21]Reza Ebrahimi Atani, Shahabaddin Ebrahimi Atani, Amir Hassani Karbasi:
A New Ring-Based SPHF and PAKE Protocol On Ideal Lattices. ISC Int. J. Inf. Secur. 11(1): 75-86 (2019) - [i10]Seyed Pourya Miralavy, Reza Ebrahimi Atani, Navid Khoshrouz:
A Wireless Sensor Network based approach to monitor and control air Pollution in large urban areas. CoRR abs/1902.10038 (2019) - [i9]Samaneh Berenjian, Saeed Hajizadeh, Reza Ebrahimi Atani:
An Incentive Security Model to Provide Fairness for Peer-to-Peer Networks. CoRR abs/1906.09355 (2019) - 2018
- [j20]Reza Ebrahimi Atani, Shahabaddin Ebrahimi Atani, Amir Hassani Karbasi:
NETRU: A Non-commutative and Secure Variant of CTRU Cryptosystem. ISC Int. J. Inf. Secur. 10(1): 45-53 (2018) - [c10]Soraya Mobaraki, Amirata Amirkhani, Reza Ebrahimi Atani:
A Novel PUF based Logic Encryption Technique to Prevent SAT Attacks and Trojan Insertion. IST 2018: 507-513 - 2017
- [i8]Mehran Alidoost Nia, Eduard Babulak, Benjamin Fabian, Reza Ebrahimi Atani:
An Analytical Perspective to Traffic Engineering in Anonymous Communication Systems. CoRR abs/1712.07601 (2017) - 2016
- [j19]Yashar Deldjoo, Reza Ebrahimi Atani:
A low-cost infrared-optical head tracking solution for virtual 3D audio environment using the Nintendo Wii-remote. Entertain. Comput. 12: 9-27 (2016) - [j18]Alireza Naghizadeh, Samaneh Berenjian, Ehsan Meamari, Reza Ebrahimi Atani:
Structural-based tunneling: preserving mutual anonymity for circular P2P networks. Int. J. Commun. Syst. 29(3): 602-619 (2016) - [j17]Amir Hassani Karbasi, Reza Ebrahimi Atani:
Projective plane-based key pre-distribution by key copying and exchanging based on connected dominating set in distributed wireless sensor networks. Int. J. Inf. Commun. Technol. 9(4): 438-462 (2016) - [j16]Taha Yasin Rezapour, Reza Ebrahimi Atani, Meer Soheil Abolghasemi:
A novel key management scheme for heterogeneous sensor networks based on the position of nodes. ISC Int. J. Inf. Secur. 8(2): 115-130 (2016) - [j15]Alireza Naghizadeh, Behrooz Razeghi, Ehsan Meamari, Majid Hatamian, Reza Ebrahimi Atani:
C-trust: A trust management system to improve fairness on circular P2P networks. Peer-to-Peer Netw. Appl. 9(6): 1128-1144 (2016) - [j14]Mehran Alidoost Nia, Reza Ebrahimi Atani, Benjamin Fabian, Eduard Babulak:
On detecting unidentified network traffic using pattern-based random walk. Secur. Commun. Networks 9(16): 3509-3526 (2016) - [j13]Ali Ahmadian Ramaki, Reza Ebrahimi Atani:
A survey of IT early warning systems: architectures, challenges, and solutions. Secur. Commun. Networks 9(17): 4751-4776 (2016) - [i7]Samaneh Sorournejad, Zahra Zojaji, Reza Ebrahimi Atani, Amir Hassan Monadjemi:
A Survey of Credit Card Fraud Detection Techniques: Data and Technique Oriented Perspective. CoRR abs/1611.06439 (2016) - 2015
- [j12]Ali Ahmadian Ramaki, Morteza Amini, Reza Ebrahimi Atani:
RTECA: Real time episode correlation algorithm for multi-step attack scenarios detection. Comput. Secur. 49: 206-219 (2015) - [j11]Saman Tahouri, Reza Ebrahimi Atani, Amir Hassani Karbasi, Yashar Deldjoo:
Application of connected dominating sets in wildfire detection based on wireless sensor networks. Int. J. Inf. Technol. Commun. Convergence 3(2): 139-160 (2015) - [j10]Reza Ebrahimi Atani, Shahabaddin Ebrahimi Atani, Amir Hassani Karbasi:
EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations. ISC Int. J. Inf. Secur. 7(2): 115-126 (2015) - [j9]Hamid Reza Arkian, Reza Ebrahimi Atani, Atefe Pourkhalili, Saman Kamali:
A Stable Clustering Scheme Based on Adaptive Multiple Metric in Vehicular Ad-hoc Networks. J. Inf. Sci. Eng. 31(2): 361-386 (2015) - [j8]Mehran Alidoost Nia, Reza Ebrahimi Atani, Antonio Ruiz-Martínez:
Privacy enhancement in anonymous network channels using multimodality injection. Secur. Commun. Networks 8(16): 2917-2932 (2015) - [j7]Hamid Reza Arkian, Reza Ebrahimi Atani, Abolfazl Diyanat, Atefe Pourkhalili:
A cluster-based vehicular cloud architecture with learning-based resource management. J. Supercomput. 71(4): 1401-1426 (2015) - [c9]Alireza Naghizadeh, Behrooz Razeghi, Iman Radmanesh, Majid Hatamian, Reza Ebrahimi Atani, Zoleikha Nadem Norudi:
Counter attack to free-riders: Filling a security hole in BitTorrent protocol. ICNSC 2015: 128-133 - [i6]Amir Hassani Karbasi, Reza Ebrahimi Atani:
ILTRU: An NTRU-Like Public Key Cryptosystem Over Ideal Lattices. IACR Cryptol. ePrint Arch. 2015: 549 (2015) - 2014
- [j6]Asghar Tavakoly, Reza Ebrahimi Atani:
Improving Tor security against timing and traffic analysis attacks with fair randomization. ISC Int. J. Inf. Secur. 6(1): 67-76 (2014) - [j5]Hamid Reza Arkian, Reza Ebrahimi Atani, Atefe Pourkhalili, Saman Kamali:
Cluster-based traffic information generalization in Vehicular Ad-hoc Networks. Veh. Commun. 1(4): 197-207 (2014) - [c8]Hamid Reza Arkian, Reza Ebrahimi Atani, Atefe Pourkhalili:
A Cluster-Based Vehicular Cloud Architecture with Learning-Based Resource Management. CloudCom 2014: 162-167 - [c7]Taha Yasin Rezapour, Reza Ebrahimi Atani, Meer Soheil Abolghasemi:
Secure positioning for shipping containers in ports and terminals using WSN. ISCISC 2014: 10-14 - [i5]Mehran Alidoost Nia, Reza Ebrahimi Atani:
A novel datatype architecture support for programming languages. CoRR abs/1402.0087 (2014) - [i4]Mehran Alidoost Nia, Aida Ghorbani, Reza Ebrahimi Atani:
A Novel Anonymous Cloud Architecture Design; Providing Secure Online Services and Electronic Payments. CoRR abs/1404.2261 (2014) - [i3]Mona Pourghasem, Elham Ghare Sheikhloo, Reza Ebrahimi Atani:
Light Weight Implementation of Stream Ciphers for M-Commerce Applications. CoRR abs/1404.4791 (2014) - 2013
- [j4]Abdolrahman Attar, Reza Moradi Rad, Reza Ebrahimi Atani:
A survey of image spamming and filtering techniques. Artif. Intell. Rev. 40(1): 71-105 (2013) - [j3]Mohammad Sabzinejad Farash, Mahmoud Ahmadian-Attari, Reza Ebrahimi Atani, Mohamadreza Jami:
A new efficient authenticated multiple-key exchange protocol from bilinear pairings. Comput. Electr. Eng. 39(2): 530-541 (2013) - [c6]Meer Soheil Abolghasemi, Mahdi Mokarrami Sefidab, Reza Ebrahimi Atani:
Using location based encryption to improve the security of data access in cloud computing. ICACCI 2013: 261-265 - [c5]Taha Yasin Rezapour, Meer Soheil Abolghasemi, Reza Ebrahimi Atani:
A position-based key management scheme for heterogeneous sensor networks. ISCISC 2013: 1-6 - [i2]Asghar Tavakkoli, Reza Ebrahimi Atani:
A Secure Paper-Based Electronic Voting With No Encryption. IACR Cryptol. ePrint Arch. 2013: 284 (2013) - 2012
- [c4]Zahra Ghane Fashtali, Mahrokh Maghsoodi, Reza Ebrahimi Atani, Mehrgan Mahdavi:
A 1-V, 1.3-mW mixer for MB-OFDM UWB receivers by 0.18-μm CMOS technology. IST 2012: 338-342 - 2011
- [j2]Shahriar Mohammadi, Reza Ebrahimi Atani, Hossein Jadidoleslamy:
A Comparison of Link Layer Attacks on Wireless Sensor Networks. J. Information Security 2(2): 69-84 (2011)
2000 – 2009
- 2008
- [j1]Reza Ebrahimi Atani, Sattar Mirzakuchaki, Shahabaddin Ebrahimi Atani, Willi Meier:
On DPA-Resistive Implementation of FSR-based Stream Ciphers using SABL Logic Styles. Int. J. Comput. Commun. Control 3(4): 324-335 (2008) - [c3]Reza Ebrahimi Atani, Sattar Mirzakuchaki, Shahabaddin Ebrahimi Atani:
Design and Implementation of an Image CoProcessor. ICISP 2008: 498-507 - 2007
- [c2]Mohammad Amin Amiri, Reza Ebrahimi Atani, Sattar Mirzakuchaki, Mojdeh Mahdavi:
Design and Implementation of a 50MHZ DXT CoProcessor. DSD 2007: 43-50 - [c1]Babak Zamanlooy, Vahid Hamiati Vaghef, Sattar Mirzakuchaki, Ali Shojaee Bakhtiari, Reza Ebrahimi Atani:
A Real Time Infrared Imaging System Based on DSP & FPGA. PSIVT 2007: 16-23 - [i1]Reza Ebrahimi Atani, Shahabaddin Ebrahimi Atani, Sattar Mirzakuchaki:
A novel public key crypto system based on semi-modules over quotient semi-rings. IACR Cryptol. ePrint Arch. 2007: 391 (2007)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:51 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint