SSMS-A secure SMS messaging protocol for the m-payment systems M Toorani, A Beheshti 2008 IEEE Symposium on Computers and Communications, 700-705, 2008 | 139 | 2008 |
Solutions to the GSM security weaknesses M Toorani, A Beheshti 2008 The Second International Conference on Next Generation Mobile …, 2008 | 138 | 2008 |
An energy-efficient protocol with static clustering for wireless sensor networks AS Zahmati, B Abolhassani, AAB Shirazi, AS Bakhtiari International Journal of Electronics, Circuits and Systems 1 (2), 135-138, 2007 | 108 | 2007 |
A new approach to content-based file type detection MC Amirani, M Toorani, A Beheshti 2008 IEEE Symposium on Computers and Communications, 1103-1108, 2008 | 91 | 2008 |
LPKI-a lightweight public key infrastructure for the mobile environments M Toorani, A Beheshti 2008 11th IEEE Singapore International Conference on Communication Systems …, 2008 | 85 | 2008 |
An elliptic curve-based signcryption scheme with forward secrecy M Toorani, AA Beheshti arXiv preprint arXiv:1005.1856, 2010 | 74 | 2010 |
Driver safety development: Real-time driver drowsiness detection system based on convolutional neural network M Hashemi, A Mirrashid, A Beheshti Shirazi SN Computer Science 1 (5), 289, 2020 | 70 | 2020 |
Cryptanalysis of an elliptic curve-based signcryption scheme M Toorani, AA Beheshti arXiv preprint arXiv:1004.3521, 2010 | 54 | 2010 |
Secret key extraction in ultra wideband channels for unsynchronized radios MG Madiseh, ML McGuire, SW Neville, AAB Shirazi 6th Annual Communication Networks and Services Research Conference (cnsr …, 2008 | 47 | 2008 |
Cryptanalysis of an efficient signcryption scheme with forward secrecy based on elliptic curve M Toorani, A Beheshti 2008 International Conference on Computer and Electrical Engineering, 428-432, 2008 | 41 | 2008 |
Design of multiple modulated frequency lock-in amplifier for tapping-mode atomic force microscopy systems M Ayat, MA Karami, S Mirzakuchaki, A Beheshti-Shirazi IEEE Transactions on Instrumentation and Measurement 65 (10), 2284-2292, 2016 | 38 | 2016 |
Classification of vehicles based on audio signals using quadratic discriminant analysis and high energy feature vectors A Dalir, AA Beheshti, MH Masoom arXiv preprint arXiv:1804.01212, 2018 | 29 | 2018 |
A directly public verifiable signcryption scheme based on elliptic curves M Toorani, A Beheshti 2009 IEEE Symposium on Computers and Communications, 713-716, 2009 | 22 | 2009 |
Compressed remote sensing by using deep learning A Mirrashid, AA Beheshti 2018 9th International Symposium on Telecommunications (IST), 549-552, 2018 | 18 | 2018 |
Fingerprint image enhancement using gabor wavelet transform N Karimimehr, AAB Shirazi 2010 18th Iranian conference on electrical engineering, 316-320, 2010 | 18 | 2010 |
Rate-distortion modeling for scalable video coding MR Ardestani, AAB Shirazi, MR Hashemi 2010 17th International Conference on Telecommunications, 923-928, 2010 | 17 | 2010 |
A selective encryption for H. 264/AVC videos based on scrambling N Dolati, A Beheshti, H Azadegan Multimedia Tools and Applications 80 (2), 2319-2338, 2021 | 15 | 2021 |
Robust audio watermarking algorithm based on DWT using Fibonacci numbers AA Attari, AAB Shirazi Multimedia Tools and Applications 77, 25607-25627, 2018 | 14 | 2018 |
Performance improvement of AOA positioning using a two-step plan based on factor graphs and the gauss-newton method B Omidali, SAAB Shirazi 2009 14th International CSI Computer Conference, 305-309, 2009 | 14 | 2009 |
A Novel Algorithm to Classify Iris Image Based on Differential of Fractal Dimension by Using Neural Network AAB Shirazi, L Nasseri 2008 International Conference on Advanced Computer Theory and Engineering …, 2008 | 12 | 2008 |