داده های ثبت شده در پورتال
1
Ali Nazari, Babak Sadeghiyan, "Electronic Money Laundering Detection in Transactions of Payment Service Providers ", 19th International ISC Conference on Information Security and Cryptography (ISCISC2022), August 2022
2
Maryamalsadat Mahootiha, S.Alireza Hashemi Golpayegany, Babak Sadeghiyan, "Designing a new method for detecting money laundering based on social network analysis ", 26th International Computer Conference, Computer Society of Iran, March 2021
3
Sara Asgari, Babak Sadeghiyan, "Towards Generating Benchmark Datasets for Worm Infection Studies ", 10th International Symposium on Telecommunications (IST2020), December 2020
4
Motahareh Dehghan Chachkamy, Babak Sadeghiyan, "Secure Multi-party Sorting Protocol Based on Distributed Oblivious Transfer Protocol ", 10th International conference on Computer and Knowledge Engineering (ICCKE), October 2020
5
Babak Sadeghiyan, Sara Asgari, "Reconstruction of Worm Propagation Path Using a Trace-back Approach ", 10th International Conference on Computer and Knowledge Engineering (ICCKE2020), October 2020
6
Motahareh Dehghan Chachkamy, Babak Sadeghiyan, ٍErfan Khosravian, "Private Trajectory Intersection Detection Using Grobner Basis ", 17th international ISC Conference on Information Security & Cryptology, September 2020
7
Mohammad Hosein Hojati, Babak Sadeghiyan, "Classification of payment system providers customers websites with data mining techniques ", 16th International ISC Conference
on Information Security and Cryptology (ISCISC19), August 2019
8
Amirahmad Chapnevis, Babak Sadeghiyan, "A Secure two-party computation protocol for intersection detection between two convex hulls ", CSICC 2019, March 2019
9
Seyed Amir Hossain Naseredini, Babak Sadeghiyan, "Security Assessment of ARX-Design Hash Functions against Algebraic Cryptanalysis ", 26th Iranian Conference on Electrical Engineering (ICEE2018), May 2018
10
Hamed Mashayekhi, Babak Sadeghiyan, "Automatic Generation of Exploit Code Using Unlink Technique for Heap overflow Vulnerability ", 26th Iranian Conference on Electrical Engineering (ICEE2018), May 2018
11
Ehsan Edalat, Mahmoud Aghvamipanah, Babak Sadeghiyan, "Guided Concolic Execution of Android Apps for Automatic Test-Input Generation ", 26th Iranian Conference on Electrical Engineering (ICEE2018), May 2018
12
Motahareh Dehghan Chachkamy, Babak Sadeghiyan, "An Efficient Secure Generalized Comparison Protocol ", 26th Iranian Conference on Electrical Engineering (ICEE2018), May 2018
13
Ehsan Edalat, Babak Sadeghiyan, "Concolic Execution for Detecting SQL Injection Vulnerability in Android Apps ", CSICC 2018, February 2018
14
Motahareh Dehghan Chachkamy, Babak Sadeghiyan, "Privacy Preserving Collision Detection of Moving Objects ", 23th Conference of Computer Society of Iran, February 2018
15
Parichehr Rezazadeh Bavil Soflae, Babak Sadeghiyan, "Automatic generation of USB spreading worm Signature Based on Security Policy ", IKT 2017, October 2017
16
Hamid Mozaffari, Babak Sadeghiyan, "Mitigating Sniper Attack in Tor using Congestion Control ", 22nd National CSI Computer Conference, March 2017
17
Tala Tafazzoli, Babak Sadeghiyan, "Probability of Infectious Nodes in Backward Time ", International Symposium on Telecommunications (IST2016, September 2016
18
Mojtaba Zaheri, Babak Sadeghiyan, "Comparing Resistance against Cube like Attacks ", The 24th Iranian Conference on Electrical Engineering
(ICEE 2016), May 2016
19
Tala Tafazzoli, Babak Sadeghiyan, "A Stochastic Model for the Size of Worm Origin ", Second international conference on networks and information security, October 2015
20
Soroush Karami, Babak Sadeghiyan, Salman Niksefat, "Secure outsourcing of neural computing on distributed data ", CSICC 2015, March 2015
21
Soroush Karami, Babak Sadeghiyan, Salman Niksefat, "Secure Outsourcing of Neural Computation on Distributed Data ", 20th National Conference of Iranss Computer Association, March 2015
22
Mojtaba Javanmardi, Babak Sadeghiyan, "Automatic security vulnerability detection of programs using Input-configuration fuzzing approach ", 20th National CSI Computer Conference (CSICC2015), March 2015
23
Ali Varshovi, Maryam Rostamipoor, Babak Sadeghiyan, "A fuzzy Intrusion Detection System based on categorization of attacks ", (6th Conference on Information and Knowledge Technology (IKT 2014, May 2014
24
Mojtaba Javanmardi, Ali Ghayuomi Bidhendi, Babak Sadeghiyan, "Differential Cryptanalysis of underlying Block Cipher of SHA-1 ", 18th National CSI Computer Conference, March 2013
25
Saeid Nourizadeh, Mojtaba Javanmardi, Babak Sadeghiyan, "Cryptanalysis of the Reduced-Round Version of JH ", International Symposium on Telecommunications, November 2012
26
Iman Vakilinia, Mostafa Doroudian, Babak Sadeghiyan, "finding a optimized linear relation with converting modular sum in linear analysis of MD5 hashing function ", 17th CSI Computer Conference, March 2012
27
Payman Mohasel, Salman Niksefat, Saeed Sadeghian, Babak Sadeghiyan, "An Efficient Protocol for Oblivious DFA Evaluation and Applications ", RSA Conference 2012, February 2012
28
Peyman Mohassel, Salman Niksefat, Saeed Sadeghian, Babak Sadeghiyan, "An Efficient Protocol for Oblivious DFA evaluation and Application ", RSA Conference , CT-RSA 2012, February 2012
29
Parisa Kaghazgaran, Babak Sadeghiyan, "Secure two party comparison over encrypted data ", World Congress on Information and Communication Technologies - WICT 2011, December 2011
30
Mona Hosseinkhani Loorak, Babak Sadeghiyan, "A Two Dimensional Approach for Detecting Input Validation Attacks Based on HMM ", The 2011 International Conference on Database and Data Mining (ICDDM 2011, March 2011
31
Amirreza Niakanlahiji, Babak Sadeghiyan, "Worm Containment in Gnutella Network With Heterogeneity ", International Conference on Network Communication and Computer - ICNCC 2011, March 2011
32
Setareh Bazargan, Saadat Pourmozafari, Babak Sadeghiyan, Kooroush Manocheri Kalantari, "Improvement of Montgomery Modulo Multiplier by Word-Based Architecture and New Data Coding ", 16th CSICC International Conference, March 2011
33
Mohammad Nourian Awal Noughabi, Babak Sadeghiyan, "Design of S-boxes based on neural networks ", International Conference on Electronics and Information Engineering, August 2010
34
Babak Sadeghiyan, "Improving the Implementation of Montgomery Modular Multiplication Algorithm through Combining Fast Multiplication Architecture and the New Coding ", 15th Computer Society of Iran Computer Conference, February 2010
35
Babak Sadeghiyan, "Design of S-box Functions with Employing PSO Optimization Method ", 15th Computer Society of Iran Computer Conference, February 2010
36
Maryam Izadi, Babak Sadeghiyan, "MIBS a new lightweight block cipher ", , December 2009
37
Amin Hassanzadeh, Babak Sadeghiyan, "A data correlation method for anomaly detection systems using regression relations ", First International Conference on Future Information Networks, October 2009
38
Babak Sadeghiyan, "A Protocol fulfilling anonymity requirements through adjusting buffering delays ", , August 2009
39
[en-name N/A], Babak Sadeghiyan, "Multicollisions attack in Zipper hash structure ", 10th International Symposium on Communication Theory and Application, July 2009
40
Nasour Bagheri, Majid Naderi, Babak Sadeghiyan, "A Model for Design of Compression Functions and Enhance of Hashing Algorithms of MDx Family ", Iranian Conference of Electrical Engineering (ICEE2009), May 2009
41
Nasour Bagheri, Babak Sadeghiyan, Mansoureh Safkhani, Majid Naderi, "Cryptanalysis of L-pipe Hash Function ", Iranian Conference of Electrical Engineering (ICEE2009), May 2009
42
Fatemeh Sadat Kazemeyni, Babak Sadeghiyan, Mehdi Shajari, "Host based P2P Worm Detection ", 16th Iranian Electrical and Electronic Enginering Conference, May 2008
43
Kooroush Manocheri Kalantari, Saadat Pourmozafari, Babak Sadeghiyan, "Very fast multi operand addition method by bitwise subtraction ", , April 2008
44
Amin Hassanzadeh, Babak Sadeghiyan, "Intrusion detection with data correlation relation graph ", , March 2008
45
Kooroush Manocheri Kalantari, Saadat Pourmozafari, Babak Sadeghiyan, "A new operator for multi addition calculations ", , March 2008
46
Kooroush Manocheri Kalantari, Saadat Pourmozafari, Babak Sadeghiyan, "A New Operator for Multi-Addition Calculations ", 13th International CSICC conference, February 2008
47
Borna Jafarpour, Azadeh Nematzadeh Chekuvar, [en-name N/A], Babak Sadeghiyan, "A cheating model for cellular automata- based secret sharing schemes ", , November 2007
48
Fatemeh Sadat Kazemeyni, Babak Sadeghiyan, "Decreasing bogus alerts in P2P networks by a group membership protocol ", , June 2007
49
Bahador Bakhshisareskanrood, Babak Sadeghiyan, "A timing attack on Blakleys modular multiplication algorithm and application to DSA ", , June 2007
50
, Mohammad Bagher Menhaj, Babak Sadeghiyan, "A simple and efficient training algorithm to store desired number of stable equilibrium points in self feed back neural network structures ", , June 2007
51
Kooroush Manocheri Kalantari, Saadat Pourmozafari, Babak Sadeghiyan, "Efficient Methods in Converting to Modulo 2n+1 and 2n-1 ", , April 2006
52
Kooroush Manocheri Kalantari, Saadat Pourmozafari, Babak Sadeghiyan, "Efficient Methods in Converting to Modulo 2^ n+ 1 and 2^ n-1 ", Information Technology: New Generations, 2006. ITNG 2006. Third International Conference on(IEEE), April 2006
53
Ali Valizadeh, Morteza Saheb Zamani, Babak Sadeghiyan, Farhad Mehdipour, "A Reconfigurable Architecture for Implementing Multiple Cipher Algorithms ", , December 2005
54
Abbas Ghaemi Bafghi, Babak Sadeghiyan, "A Differential Boomerang Attack Against 10-round Kahkeshan ", , September 2005
55
[en-name N/A], Babak Sadeghiyan, "A Genetic Algorithm for Finding High-Probable Differential Characteristics of Substitution-Permutation Networks ", , September 2005
56
Babak Sadeghiyan, "RUPsec: extending business modeling and requirements disciplines of RUP for developing secure systems ", , September 2005
57
Pooya Jaferian, Golnaz Elahi, Mohammad Reza Ayatollahzadeh Shirazi, Babak Sadeghiyan, "Extending Business Modeling and Requirement Disciplines of RUP for Developing Secure Systems ", , August 2005
58
Robabeh Alishzadeh, Babak Sadeghiyan, Reza Safabakhsh, "A Hierarchicel Anomely Detection in Large Networks Using Neural Networks ", , May 2005
59
Babak Sadeghiyan, "a genetic algorithm for finding high probable differential character stics of substitution ", , March 2005
60
Babak Sadeghiyan, "a differetial boomerang attack against 10 round kahkeshan ", , March 2005
61
Babak Sadeghiyan, "RUPsec -an extension on RUP for developing secure systems requirements discipline ", , March 2005
62
Mohammad Reza Ayatollahzadeh Shirazi, Pooya Jaferian, Golnaz Elahi, [en-name N/A], Babak Sadeghiyan, "Rupsec : An Extension on RUP for Developing secure systems - Reguirements Discipline ", , February 2005
63
Bahram Najafi Uchevler, Babak Sadeghiyan, Morteza Saheb Zamani, Ali Valizadeh, "High speed Implementation of serpent Algorithm ", , December 2004
64
Ali Valizadeh, Morteza Saheb Zamani, Babak Sadeghiyan, Farhad Mehdipour, "A High performance Reconfigurable Implementation of DES- Like Algorithms ", , December 2004
65
Babak Sadeghiyan, Morteza Saheb Zamani, Bahram Najafi Uchevler, "Reconfiguration of RTL Designs Using JBits ", , September 2004
66
Ali Valizadeh, Morteza Saheb Zamani, Babak Sadeghiyan, "Hardware Implementation of LOKI Block cipher ", , September 2004
67
Abbas Ghaemi Bafghi, Babak Sadeghiyan, "Finding suitable Differential characteristics for Block ciphers with Ant colony Techniguer ", , June 2004
68
Amir Rezaeinia, Hossein Pedram, Babak Sadeghiyan, "Asynchronous us. synchronous Design of RSA ", , May 2004
69
Abbas Ghaemi Bafghi, Babak Sadeghiyan, "Differential Model of Block Ciphers with Ant Colony Telecommicehins 2003 ", , August 2003
70
Abbas Ghaemi Bafghi, Babak Sadeghiyan, "Design of a Differential cyptanelyin attach with ant colony for SERPENT ", , June 2003
71
[en-name N/A], Mehdi Shajari, Mehran Nadjarbashi Noghani, Babak Sadeghiyan, Behrooz Tork Ladani, Masoud Bahrami, "Advanced Domestic Firewall : services protocols high_Level design ", , August 2001
72
Masoud Bahrami, Babak Sadeghiyan, "Effcient Modulo 2n+1 Multiplication Schemes for IDEA ", , May 2001
73
[en-name N/A], Babak Sadeghiyan, "A New architecture of fast binary montgomery modular multiplication for rsa cryptosystem ", , March 2001
74
[en-name N/A], Babak Sadeghiyan, "A New VLSI Architecture for Speedling RSA ", , March 2001
75
Mohammad Kazem Akbari, Babak Sadeghiyan, Reza Sepahi, "Neural Network Performance Analysis in FEAL Cryptanalysis ", , March 2001
76
Babak Sadeghiyan, Masoud Bahrami, "New Efficient Methods of Modulo 2 ^16+1 Multiplications for IDEA Block Cipher ", , March 2000
77
Babak Sadeghiyan, Mahrokh Mohajeri, "Moamagar : A160 _bit Block Cipher ", , March 2000
78
Babak Sadeghiyan, "A New Method for the Design of S- boxes ", , March 1997
79
Babak Sadeghiyan, [en-name N/A], "A New Universal Test for Bit Strings ", , May 1996
80
Babak Sadeghiyan, "Permutations based on single pseudo random functions. ", , January 1993