Reza Ebrahimi Atani

ORCID: 0000-0001-9180-8707
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Internet Traffic Analysis and Secure E-voting
  • Cryptographic Implementations and Security
  • Advanced Malware Detection Techniques
  • Rings, Modules, and Algebras
  • Network Security and Intrusion Detection
  • Coding theory and cryptography
  • Chaos-based Image/Signal Encryption
  • Advanced Topics in Algebra
  • Advancements in PLL and VCO Technologies
  • Peer-to-Peer Network Technologies
  • Security in Wireless Sensor Networks
  • Algebraic structures and combinatorial models
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Vehicular Ad Hoc Networks (VANETs)
  • Advanced Steganography and Watermarking Techniques
  • Privacy-Preserving Technologies in Data
  • Fuzzy and Soft Set Theory
  • Caching and Content Delivery
  • Cloud Data Security Solutions
  • Cryptography and Residue Arithmetic
  • Energy Efficient Wireless Sensor Networks
  • Radio Frequency Integrated Circuit Design
  • Imbalanced Data Classification Techniques
  • Advanced Data Storage Technologies

University of Guilan
2014-2024

Islamic Azad University, Science and Research Branch
2013

Information Technology University
2013

Islamic Azad University, Bandar Anzali Branch
2011

Iran University of Science and Technology
2007-2010

Credit card plays a very important rule in today's economy. It becomes an unavoidable part of household, business and global activities. Although using credit cards provides enormous benefits when used carefully responsibly,significant financial damages may be caused by fraudulent Many techniques have been proposed to confront the growth fraud. However, all these same goal avoiding fraud; each one has its own drawbacks, advantages characteristics. In this paper, after investigating...

10.48550/arxiv.1611.06439 preprint EN other-oa arXiv (Cornell University) 2016-01-01

In this paper, a novel algorithm for image encryption based on SHA-512 is proposed. The main idea of the to use one half data other reciprocally. Distinct characteristics are high security, sensitivity and speed that can be applied gray-level color images. consists two sections: first does preprocessing operation shuffle image. second uses hash function generate random number mask. mask then XORed with part which going encrypted. aim work increase entropy. Both security performance aspects...

10.1109/iranianmvip.2010.5941167 article EN 2010-10-01

Wireless sensor networks (WSNs) have many potential applications [1,2] and unique challenges. They usually consist of hundreds or thousands small nodes such as MICA2, which operate autonomously; conditions cost, invisible deployment application domains, lead to size resource limited sensors [3]. WSNs are susceptible types link layer attacks [1] most traditional network security techniques unusable on [3]; This is due wireless shared nature communication channel, untrusted transmissions, in...

10.4236/jis.2011.22007 article EN Journal of Information Security 2011-01-01

In this paper, a new simple and fast algorithm for image encryption is proposed.It exploits the scan patterns function XOR in three standalone steps.The decryption procedure similar to that of but reversed order.We implement test proposed using different sample inputs our experimental result security analysis indicates robustness advantages algorithm.Using it possible reproduce original with no loss information process.Algorithm enough be comparable other recent approaches, has passed all...

10.14257/ijsip.2013.6.5.25 article EN International Journal of Signal Processing Image Processing and Pattern Recognition 2013-10-31

Abstract With the advent of new technologies and various services provided in context computer networks, a large volume data is being generated. The main challenge this area providing network protection against threats vulnerabilities. So far, many techniques have been proposed to deal with these threats. All pursue same goal, preventing attackers from reaching their objectives. A solution based on early warning system(s) (EWSs) what exactly security teams need manage properly. EWS, as...

10.1002/sec.1647 article EN Security and Communication Networks 2016-10-27

Vehicular Ad-hoc Networks (VANETs) are the special class of Mobile (MANETs) with high mobility and frequent changes topology. Clustering is applied in VANETs to divide network into smaller groups mobile vehicles improve routing, information dissemination data gathering. In this paper, we propose a 2-layer stable clustering scheme based on adaptive multiple metric combining both features static dynamic methods. The cluster head selected among members new called suitability value. It derived...

10.6688/jise.2015.31.2.1 article EN Journal of information science and engineering 2015-03-01

Cloud computing is a new approach in the field of information technology and development computer technologies based on World Wide Web. One most important challenges this area security cloud computing. On other hand access to critical confidential banks, institutions etc extremely essential. Sometimes even with enormous costs, it not fully guaranteed compromised by attackers. In paper providing novel method, we improve data for company or any specific locations using location-based encryption.

10.1109/icacci.2013.6637181 article EN 2013-08-01

Recently, involving wireless communication technologies in deployment of new vehicular networks becomes more attracting to the research community and vehicle manufacturers. It is beneficial providing intelligent transportation system as well assistant services drivers. However, limitation resources mobile vehicles a significant technical challenge applications. In this paper, we propose cloud architecture used clustering technique group provide cooperatively. We make cluster structure...

10.1109/cloudcom.2014.157 article EN 2014-12-01

Recently, involving wireless communication technologies in deployment of new vehicular networks becomes more attracting to the research community and vehicle manufacturers. It is beneficial providing intelligent transportation system as well assistant services drivers. However, limitation resources mobile vehicles a significant technical challenge applications. In this paper, we propose cloud architecture used clustering technique group provide cooperatively. We make cluster structure...

10.1109/nets4carsfall.2014.7000907 article EN 2014-10-01

Many methods are suggested to preserve anonymity of users for peer-to-peer (P2P) networks. Most these methods, by relying on established anonymous solutions client/server applications, presented unstructured P2P However, structured overlays, using distributed hash tables their routing, do not resemble traditional paradigms. Therefore, current cannot be implemented them easily. In this paper, we introduce structural-based tunneling (SBT) provide mutual circular structures. method, get help...

10.1002/dac.3036 article EN International Journal of Communication Systems 2015-08-11

In recent years, there has been an increasing interest in the authentication process due to key role that it network security. Port Knocking (PKn) is method which data transmits through closed ports. This prone attacks when attackers sniff network. paper proposes a new called "Secure Knock-Tunneling" eliminate both DOS-Knocking and NATK-nocking attacks. The possibility of implementation this investigated on Mikrotik devices.

10.1109/isci.2012.6222683 article EN 2012-03-01

In this paper we propose a new architecture Physical Random Functions (or Unclonable Functions, PUFs) to create candidate hardware random number generator.So far several generators based on ring oscillators were introduced but all of them have either security or stability problems.This presents novel which has solved both these idea higher data complexity and also nonlinearity secures the circuit against modeling attacks.The final lower make it suitable for lightweight generators.

10.5121/ijnsa.2011.3303 article EN International Journal of Network Security & Its Applications 2011-05-31

In this paper, an efficient method for high speed hardware implementation of AES algorithm is presented. So far, many implementations have been proposed, various goals that effect the SubByte transformation in ways. These methods are based on combinational logic and done polynomial bases. proposed architecture, it by using composite field arithmetic normal addition, key expansion architecture suitable 6 subpipelined round units also By non-feedback mode, a fully encryptor with substages each...

10.1109/icedsa.2011.5959055 article EN 2011-04-01

Vehicular Ad Hoc Network (VANET) is an emerging field of wireless networks that facilitates different applications such traffic information for participant vehicles and related authorities. However, deploying mainly depending on the market penetration rate this technology. In paper, we propose a new 3-steps approach estimation volume in road segment based actual wireless-equipped vehicles. For propose, fist collect groups using clustering algorithm. Then, chaining technique between clusters...

10.1109/istel.2014.7000885 article EN 2014-09-01

Abstract The increase of the capacity processing units and growth distributed computing make easy to collect process information Internet traffic flows. This information, however, can be used perform attacks in anonymous communications that could compromise privacy. With aim preventing these attacks, we propose a scheme implements multimodal behavior using random walk theory crypto‐types. mechanism is responsible for generating network patterns, cryptotype performs micro‐encryption tasks...

10.1002/sec.1219 article EN Security and Communication Networks 2015-02-09
Coming Soon ...