Követés
Nasrollah Pakniat
Nasrollah Pakniat
Assistant Professor, Iranian Research Institute for Information Science and Technology
E-mail megerősítve itt: irandoc.ac.ir - Kezdőlap
Cím
Hivatkozott rá
Hivatkozott rá
Év
Certificateless aggregate signcryption: Security model and a concrete construction secure in the random oracle model
Z Eslami, N Pakniat
Journal of King Saud University-Computer and Information Sciences 26 (3 …, 2014
702014
Collocation method using sinc and Rational Legendre functions for solving Volterra’s population model
K Parand, Z Delafkar, N Pakniat, A Pirkhedri, MK Haji
Communications in Nonlinear Science and Numerical Simulation 16 (4), 1811-1819, 2011
572011
Secret image sharing scheme with hierarchical threshold access structure
N Pakniat, M Noroozi, Z Eslami
Journal of Visual Communication and Image Representation 25 (5), 1093-1101, 2014
512014
Certificateless authenticated encryption with keyword search: Enhanced security model and a concrete construction for industrial IoT
N Pakniat, D Shiraly, Z Eslami
Journal of Information Security and Applications 53, 102525, 2020
482020
Pairing-free certificateless authenticated encryption with keyword search
D Shiraly, N Pakniat, M Noroozi, Z Eslami
Journal of Systems Architecture 124, 102390, 2022
282022
Distributed key generation protocol with hierarchical threshold access structure
N Pakniat, M Noroozi, Z Eslami
IET Information Security 9 (4), 248-255, 2015
212015
Designated tester certificateless encryption with keyword search
N Pakniat
Journal of Information Security and Applications 49, 102394, 2019
182019
Cryptanalysis and improvement of a pairing-free certificateless signature scheme
N Pakniat, B Abasi Vanda
15th International ISC (Iranian Society of Cryptology) Conference on …, 2018
162018
Comments on a chaos-based public key encryption with keyword search scheme
M Noroozi, Z Eslami, N Pakniat
Nonlinear Dynamics 94, 1127-1132, 2018
152018
A certificateless proxy signature scheme secure in standard model
Z Eslami, N Pakniat
International Conference on Latest Computational Technologies-ICLCT, 81-84, 2012
132012
Ideal social secret sharing using Birkhoff interpolation method
Z Eslami, N Pakniat, M Nojoumian
Security and Communication Networks 9 (18), 4973-4982, 2016
12*2016
Hierarchical threshold multi-secret sharing scheme based on birkhoff interpolation and cellular automata
Z Eslami, N Pakniat, M Noroozi
2015 18th CSI International Symposium on Computer Architecture and Digital …, 2015
122015
Numerical solution of the Falkner-Skan equation with stretching boundary by collocation method
K Parand, N Pakniat, Z Delafkar
International Journal of Nonlinear Science 11 (3), 275-283, 2011
112011
Public key encryption with keyword search and keyword guessing attack: a survey
N Pakniat
13th International Iranian Society of Cryptology Conference on Information …, 2016
102016
Cryptanalysis of a certificateless aggregate signature scheme
N Pakniat, M Noroozi
9th Conference of Command, Control, Communications and Computer Intelligence …, 2016
82016
A generic construction to build simple oblivious transfer protocols from homomorphic encryption schemes
S Esmaeilzade, N Pakniat, Z Eslami
The Journal of Supercomputing 78 (1), 72-92, 2022
62022
Cryptanalysis and improvement of a group RFID authentication protocol
N Pakniat, Z Eslami
Wireless Networks, 1-10, 2020
62020
Reducing Multi-Secret Sharing Problem to Sharing a Single Secret Based on Cellular Automata
N Pakniat, M Noroozi, Z Eslami
Journal on Computer Science and Engineering 14 (1), 38-43, 2017
52017
Cryptanalysis of an attribute-based key agreement protocol
Z Eslami, N Pakniat, M Noroozi
International Journal of Computer & Information Technologies 2, 351-358, 2014
32014
A Proxy E-Raffle Protocol Based on Proxy Signatures.
N Pakniat, Z Eslami
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 2 (3), 74-84, 2011
32011
A rendszer jelenleg nem tudja elvégezni a műveletet. Próbálkozzon újra később.
Cikkek 1–20