Reza Ebrahimi Atani
AuthID: R-00K-PDW
131
TITLE: Using Location Based Encryption to Improve the Security of Data Access in Cloud Computing
AUTHORS: Abolghasemi, MS; Sefidab, MM; Atani, RE;
PUBLISHED: 2013, SOURCE: 2013 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI)
AUTHORS: Abolghasemi, MS; Sefidab, MM; Atani, RE;
PUBLISHED: 2013, SOURCE: 2013 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI)
INDEXED IN:
WOS
IN MY:
ORCID
132
TITLE: On Semiprime Multiplication Modules over Pullback Rings
AUTHORS: Reza Ebrahimi Atani; Shahabaddin Ebrahimi Atani;
PUBLISHED: 2013, SOURCE: Communications in Algebra, VOLUME: 41, ISSUE: 2
AUTHORS: Reza Ebrahimi Atani; Shahabaddin Ebrahimi Atani;
PUBLISHED: 2013, SOURCE: Communications in Algebra, VOLUME: 41, ISSUE: 2
133
TITLE: A novel protocol for the security of SMS-based mobile banking: Using GSM positioning techniques and parameters
AUTHORS: Meer Soheil Abolghasemi; Taha Yasin Rezapour; Reza Ebrahimi Atani;
PUBLISHED: 2013, SOURCE: The 5th Conference on Information and Knowledge Technology
AUTHORS: Meer Soheil Abolghasemi; Taha Yasin Rezapour; Reza Ebrahimi Atani;
PUBLISHED: 2013, SOURCE: The 5th Conference on Information and Knowledge Technology
134
TITLE: Using location based encryption to improve the security of data access in cloud computing
AUTHORS: Meer Soheil Abolghasemi; Mahdi Mokarrami Sefidab; Reza Ebrahimi Atani;
PUBLISHED: 2013, SOURCE: 2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI)
AUTHORS: Meer Soheil Abolghasemi; Mahdi Mokarrami Sefidab; Reza Ebrahimi Atani;
PUBLISHED: 2013, SOURCE: 2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI)
135
TITLE: A new efficient authenticated multiple-key exchange protocol from bilinear pairings
AUTHORS: Mohammad Sabzinejad Farash; Mahmoud Ahmadian Attari; Reza Ebrahimi Atani; Mohamadreza Jami;
PUBLISHED: 2013, SOURCE: Computers & Electrical Engineering, VOLUME: 39, ISSUE: 2
AUTHORS: Mohammad Sabzinejad Farash; Mahmoud Ahmadian Attari; Reza Ebrahimi Atani; Mohamadreza Jami;
PUBLISHED: 2013, SOURCE: Computers & Electrical Engineering, VOLUME: 39, ISSUE: 2
136
TITLE: A novel image encryption method based on chaotic maps
AUTHORS: Esmaeil Besharatei Fard; Reza Ebrahimi Atani;
PUBLISHED: 2013, SOURCE: ICCKE 2013
AUTHORS: Esmaeil Besharatei Fard; Reza Ebrahimi Atani;
PUBLISHED: 2013, SOURCE: ICCKE 2013
137
TITLE: Secure File Management System for Java Cards
AUTHORS: Reza Asgari; Reza Ebrahimi Atani;
PUBLISHED: 2013, SOURCE: International Journal in Foundations of Computer Science & Technology, VOLUME: 3, ISSUE: 5
AUTHORS: Reza Asgari; Reza Ebrahimi Atani;
PUBLISHED: 2013, SOURCE: International Journal in Foundations of Computer Science & Technology, VOLUME: 3, ISSUE: 5
138
TITLE: A Framework to Defense against Insider Attacks on Information Sources
AUTHORS: Reza Asgari; Reza Ebrahimi Atani;
PUBLISHED: 2013, SOURCE: International Journal of Managing Public Sector Information and Communication Technologies, VOLUME: 4, ISSUE: 2
AUTHORS: Reza Asgari; Reza Ebrahimi Atani;
PUBLISHED: 2013, SOURCE: International Journal of Managing Public Sector Information and Communication Technologies, VOLUME: 4, ISSUE: 2
139
TITLE: A New Fast and Simple Image Encryption Algorithm Using Scan Patterns and XOR
AUTHORS: Reza Moradi Rad; Abdolrahman Attar; Reza Ebrahimi Atani;
PUBLISHED: 2013, SOURCE: International Journal of Signal Processing, Image Processing and Pattern Recognition, VOLUME: 6, ISSUE: 5
AUTHORS: Reza Moradi Rad; Abdolrahman Attar; Reza Ebrahimi Atani;
PUBLISHED: 2013, SOURCE: International Journal of Signal Processing, Image Processing and Pattern Recognition, VOLUME: 6, ISSUE: 5
140
TITLE: Modeling and Analysis of Reliability in Grid using Petri Nets
AUTHORS: Mahnoosh Vahebi; Mehdi Sadeghzadeh; Reza Ebrahimi Atani;
PUBLISHED: 2013, SOURCE: International Journal of Computer Applications Technology and Research, VOLUME: 2, ISSUE: 6
AUTHORS: Mahnoosh Vahebi; Mehdi Sadeghzadeh; Reza Ebrahimi Atani;
PUBLISHED: 2013, SOURCE: International Journal of Computer Applications Technology and Research, VOLUME: 2, ISSUE: 6