Public key authenticated encryption with keyword search: revisited M Noroozi, Z Eslami IET Information Security 13 (4), 336-342, 2019 | 61 | 2019 |
Secret image sharing scheme with hierarchical threshold access structure N Pakniat, M Noroozi, Z Eslami Journal of Visual Communication and Image Representation 25 (5), 1093-1101, 2014 | 51 | 2014 |
Public-key encryption with keyword search: a generic construction secure against online and offline keyword guessing attacks M Noroozi, Z Eslami Journal of Ambient Intelligence and Humanized Computing 11 (2), 879-890, 2020 | 31 | 2020 |
Pairing-free certificateless authenticated encryption with keyword search D Shiraly, N Pakniat, M Noroozi, Z Eslami Journal of Systems Architecture 124, 102390, 2022 | 28 | 2022 |
Distributed key generation protocol with hierarchical threshold access structure N Pakniat, M Noroozi, Z Eslami IET Information Security 9 (4), 248-255, 2015 | 21 | 2015 |
Comments on a chaos-based public key encryption with keyword search scheme M Noroozi, Z Eslami, N Pakniat Nonlinear Dynamics 94, 1127-1132, 2018 | 15 | 2018 |
Designing a secure designated server identity-based encryption with keyword search scheme: still unsolved M Noroozi, I Karoubi, Z Eslami Annals of Telecommunications 73 (11), 769-776, 2018 | 13 | 2018 |
Provably Secure Group Key Exchange Protocol in the Presence of Dishonest Insiders. Z Eslami, M Noroozi, SK Rad Int. J. Netw. Secur. 18 (1), 33-42, 2016 | 12 | 2016 |
Hierarchical threshold multi-secret sharing scheme based on birkhoff interpolation and cellular automata Z Eslami, N Pakniat, M Noroozi 2015 18th CSI International Symposium on Computer Architecture and Digital …, 2015 | 12 | 2015 |
Cryptanalysis of a certificateless aggregate signature scheme. N Pakniat, M Noroozi 9th Conference of Command, Control, Communications and Computer Intelligence …, 2016 | 8 | 2016 |
On the Security of a Privacy-Preserving Ranked Multi-Keyword Search Scheme Z Eslami, M Noroozi, J Baek Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2019 | 5 | 2019 |
Reducing Multi-Secret Sharing Problem to Sharing a Single Secret Based on Cellular Automata. N Pakniat, M Noroozi, Z Eslami Journal on Computer Science and Engineering 14 (1), 38-43, 2017 | 5 | 2017 |
Multi-user searchable encryption scheme with general access structure KA Zirtol, M Noroozi, Z Eslami 2015 2nd International Conference on Knowledge-Based Engineering and …, 2015 | 4 | 2015 |
Cryptanalysis of an attribute-based key agreement protocol Z Eslami, N Pakniat, M Noroozi International Journal of Computer & Information Technologies 2, 351-358, 2014 | 3 | 2014 |
Public key encryption with distributed keyword search Z Eslami, M Noroozi, K Amirizirtol Journal of Discrete Mathematical Sciences and Cryptography 25 (8), 2369-2393, 2022 | 2 | 2022 |
رمزگذاری کلید عمومی با قابلیت جستجوی کلیدواژه: ارائه یک ساخت کلی امن در برابر حملات حدس کلیدواژه برخط و غیربرخط مهناز نوروزی، نصراله پاک نیت، زیبا اسلامی 14th International Iranian Society of Cryptology Conference on Information …, 2017 | | 2017 |