Suivre
Mahnaz Noroozi
Mahnaz Noroozi
Assistant Professor, Alzahra University
Adresse e-mail validée de alzahra.ac.ir - Page d'accueil
Titre
Citée par
Citée par
Année
Public key authenticated encryption with keyword search: revisited
M Noroozi, Z Eslami
IET Information Security 13 (4), 336-342, 2019
612019
Secret image sharing scheme with hierarchical threshold access structure
N Pakniat, M Noroozi, Z Eslami
Journal of Visual Communication and Image Representation 25 (5), 1093-1101, 2014
512014
Public-key encryption with keyword search: a generic construction secure against online and offline keyword guessing attacks
M Noroozi, Z Eslami
Journal of Ambient Intelligence and Humanized Computing 11 (2), 879-890, 2020
312020
Pairing-free certificateless authenticated encryption with keyword search
D Shiraly, N Pakniat, M Noroozi, Z Eslami
Journal of Systems Architecture 124, 102390, 2022
282022
Distributed key generation protocol with hierarchical threshold access structure
N Pakniat, M Noroozi, Z Eslami
IET Information Security 9 (4), 248-255, 2015
212015
Comments on a chaos-based public key encryption with keyword search scheme
M Noroozi, Z Eslami, N Pakniat
Nonlinear Dynamics 94, 1127-1132, 2018
152018
Designing a secure designated server identity-based encryption with keyword search scheme: still unsolved
M Noroozi, I Karoubi, Z Eslami
Annals of Telecommunications 73 (11), 769-776, 2018
132018
Provably Secure Group Key Exchange Protocol in the Presence of Dishonest Insiders.
Z Eslami, M Noroozi, SK Rad
Int. J. Netw. Secur. 18 (1), 33-42, 2016
122016
Hierarchical threshold multi-secret sharing scheme based on birkhoff interpolation and cellular automata
Z Eslami, N Pakniat, M Noroozi
2015 18th CSI International Symposium on Computer Architecture and Digital …, 2015
122015
Cryptanalysis of a certificateless aggregate signature scheme.
N Pakniat, M Noroozi
9th Conference of Command, Control, Communications and Computer Intelligence …, 2016
82016
On the Security of a Privacy-Preserving Ranked Multi-Keyword Search Scheme
Z Eslami, M Noroozi, J Baek
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2019
52019
Reducing Multi-Secret Sharing Problem to Sharing a Single Secret Based on Cellular Automata.
N Pakniat, M Noroozi, Z Eslami
Journal on Computer Science and Engineering 14 (1), 38-43, 2017
52017
Multi-user searchable encryption scheme with general access structure
KA Zirtol, M Noroozi, Z Eslami
2015 2nd International Conference on Knowledge-Based Engineering and …, 2015
42015
Cryptanalysis of an attribute-based key agreement protocol
Z Eslami, N Pakniat, M Noroozi
International Journal of Computer & Information Technologies 2, 351-358, 2014
32014
Public key encryption with distributed keyword search
Z Eslami, M Noroozi, K Amirizirtol
Journal of Discrete Mathematical Sciences and Cryptography 25 (8), 2369-2393, 2022
22022
رمزگذاری کلید عمومی با قابلیت جستجوی کلیدواژه: ارائه یک ساخت کلی امن در برابر حملات حدس کلیدواژه برخط و غیربرخط
مهناز نوروزی، نصراله پاک نیت، زیبا اسلامی
14th International Iranian Society of Cryptology Conference on Information …, 2017
2017
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–16