داده های ثبت شده در پورتال
1
Motahareh Dehghan Chachkamy, Babak Sadeghiyan, ٍErfan Khosravian, "Private Trajectory Intersection Detection Using Grobner Basis ", 17th international ISC Conference on Information Security & Cryptology, September 2020
2
Amirahmad Chapnevis, Babak Sadeghiyan, "A Secure two-party computation protocol for intersection detection between two convex hulls ", CSICC 2019, March 2019
3
Hamed Mashayekhi, Babak Sadeghiyan, "Automatic Generation of Exploit Code Using Unlink Technique for Heap overflow Vulnerability ", 26th Iranian Conference on Electrical Engineering (ICEE2018), May 2018
4
Seyed Amir Hossain Naseredini, Babak Sadeghiyan, "Security Assessment of ARX-Design Hash Functions against Algebraic Cryptanalysis ", 26th Iranian Conference on Electrical Engineering (ICEE2018), May 2018
5
Ehsan Edalat, Mahmoud Aghvamipanah, Babak Sadeghiyan, "Guided Concolic Execution of Android Apps for Automatic Test-Input Generation ", 26th Iranian Conference on Electrical Engineering (ICEE2018), May 2018
6
Motahareh Dehghan Chachkamy, Babak Sadeghiyan, "An Efficient Secure Generalized Comparison Protocol ", 26th Iranian Conference on Electrical Engineering (ICEE2018), May 2018
7
Motahareh Dehghan Chachkamy, Babak Sadeghiyan, "Privacy Preserving Collision Detection of Moving Objects ", 23th Conference of Computer Society of Iran, February 2018
8
Ehsan Edalat, Babak Sadeghiyan, "Concolic Execution for Detecting SQL Injection Vulnerability in Android Apps ", CSICC 2018, February 2018
9
Parichehr Rezazadeh Bavil Soflae, Babak Sadeghiyan, "Automatic generation of USB spreading worm Signature Based on Security Policy ", IKT 2017, October 2017
10
Hamid Mozaffari, Babak Sadeghiyan, "Mitigating Sniper Attack in Tor using Congestion Control ", 22nd National CSI Computer Conference, March 2017
11
Tala Tafazzoli, Babak Sadeghiyan, "Probability of Infectious Nodes in Backward Time ", International Symposium on Telecommunications (IST2016, September 2016
12
Mojtaba Zaheri, Babak Sadeghiyan, "Comparing Resistance against Cube like Attacks ", The 24th Iranian Conference on Electrical Engineering
(ICEE 2016), May 2016
13
Tala Tafazzoli, Babak Sadeghiyan, "A Stochastic Model for the Size of Worm Origin ", Second international conference on networks and information security, October 2015
14
Soroush Karami, Babak Sadeghiyan, Salman Niksefat, "Secure outsourcing of neural computing on distributed data ", CSICC 2015, March 2015
15
Soroush Karami, Babak Sadeghiyan, Salman Niksefat, "Secure Outsourcing of Neural Computation on Distributed Data ", 20th National Conference of Iranss Computer Association, March 2015
16
Mojtaba Javanmardi, Babak Sadeghiyan, "Automatic security vulnerability detection of programs using Input-configuration fuzzing approach ", 20th National CSI Computer Conference (CSICC2015), March 2015
17
Mojtaba Javanmardi, Ali Ghayuomi Bidhendi, Babak Sadeghiyan, "Differential Cryptanalysis of underlying Block Cipher of SHA-1 ", 18th National CSI Computer Conference, March 2013
18
Saeid Nourizadeh, Mojtaba Javanmardi, Babak Sadeghiyan, "Cryptanalysis of the Reduced-Round Version of JH ", International Symposium on Telecommunications, November 2012
19
Iman Vakilinia, Mostafa Doroudian, Babak Sadeghiyan, "finding a optimized linear relation with converting modular sum in linear analysis of MD5 hashing function ", 17th CSI Computer Conference, March 2012
20
Parisa Kaghazgaran, Babak Sadeghiyan, "Secure two party comparison over encrypted data ", World Congress on Information and Communication Technologies - WICT 2011, December 2011
21
Amirreza Niakanlahiji, Babak Sadeghiyan, "Worm Containment in Gnutella Network With Heterogeneity ", International Conference on Network Communication and Computer - ICNCC 2011, March 2011
22
Setareh Bazargan, Saadat Pourmozafari, Babak Sadeghiyan, Kooroush Manocheri Kalantari, "Improvement of Montgomery Modulo Multiplier by Word-Based Architecture and New Data Coding ", 16th CSICC International Conference, March 2011
23
Mona Hosseinkhani Loorak, Babak Sadeghiyan, "A Two Dimensional Approach for Detecting Input Validation Attacks Based on HMM ", The 2011 International Conference on Database and Data Mining (ICDDM 2011, March 2011
24
Mohammad Nourian Awal Noughabi, Babak Sadeghiyan, "Design of S-boxes based on neural networks ", International Conference on Electronics and Information Engineering, August 2010
25
Babak Sadeghiyan, "Design of S-box Functions with Employing PSO Optimization Method ", 15th Computer Society of Iran Computer Conference, February 2010
26
Babak Sadeghiyan, "Improving the Implementation of Montgomery Modular Multiplication Algorithm through Combining Fast Multiplication Architecture and the New Coding ", 15th Computer Society of Iran Computer Conference, February 2010
27
Maryam Izadi, Babak Sadeghiyan, "MIBS a new lightweight block cipher ", , December 2009
28
Amin Hassanzadeh, Babak Sadeghiyan, "A data correlation method for anomaly detection systems using regression relations ", First International Conference on Future Information Networks, October 2009
29
Babak Sadeghiyan, "A Protocol fulfilling anonymity requirements through adjusting buffering delays ", , August 2009
30
[en-name N/A], Babak Sadeghiyan, "Multicollisions attack in Zipper hash structure ", 10th International Symposium on Communication Theory and Application, July 2009
31
Nasour Bagheri, Babak Sadeghiyan, Mansoureh Safkhani, Majid Naderi, "Cryptanalysis of L-pipe Hash Function ", Iranian Conference of Electrical Engineering (ICEE2009), May 2009
32
Nasour Bagheri, Majid Naderi, Babak Sadeghiyan, "A Model for Design of Compression Functions and Enhance of Hashing Algorithms of MDx Family ", Iranian Conference of Electrical Engineering (ICEE2009), May 2009
33
Fatemeh Sadat Kazemeyni, Babak Sadeghiyan, Mehdi Shajari, "Host based P2P Worm Detection ", 16th Iranian Electrical and Electronic Enginering Conference, May 2008
34
Kooroush Manocheri Kalantari, Saadat Pourmozafari, Babak Sadeghiyan, "Very fast multi operand addition method by bitwise subtraction ", , April 2008
35
Amin Hassanzadeh, Babak Sadeghiyan, "Intrusion detection with data correlation relation graph ", , March 2008
36
Kooroush Manocheri Kalantari, Saadat Pourmozafari, Babak Sadeghiyan, "A new operator for multi addition calculations ", , March 2008
37
Kooroush Manocheri Kalantari, Saadat Pourmozafari, Babak Sadeghiyan, "A New Operator for Multi-Addition Calculations ", 13th International CSICC conference, February 2008
38
Borna Jafarpour, Azadeh Nematzadeh Chekuvar, [en-name N/A], Babak Sadeghiyan, "A cheating model for cellular automata- based secret sharing schemes ", , November 2007
39
Fatemeh Sadat Kazemeyni, Babak Sadeghiyan, "Decreasing bogus alerts in P2P networks by a group membership protocol ", , June 2007
40
Bahador Bakhshisareskanrood, Babak Sadeghiyan, "A timing attack on Blakleys modular multiplication algorithm and application to DSA ", , June 2007
41
, Mohammad Bagher Menhaj, Babak Sadeghiyan, "A simple and efficient training algorithm to store desired number of stable equilibrium points in self feed back neural network structures ", , June 2007
42
Kooroush Manocheri Kalantari, Saadat Pourmozafari, Babak Sadeghiyan, "Efficient Methods in Converting to Modulo 2^ n+ 1 and 2^ n-1 ", Information Technology: New Generations, 2006. ITNG 2006. Third International Conference on(IEEE), April 2006
43
Kooroush Manocheri Kalantari, Saadat Pourmozafari, Babak Sadeghiyan, "Efficient Methods in Converting to Modulo 2n+1 and 2n-1 ", , April 2006
44
Ali Valizadeh, Morteza Saheb Zamani, Babak Sadeghiyan, Farhad Mehdipour, "A Reconfigurable Architecture for Implementing Multiple Cipher Algorithms ", , December 2005
45
Babak Sadeghiyan, "RUPsec: extending business modeling and requirements disciplines of RUP for developing secure systems ", , September 2005
46
Abbas Ghaemi Bafghi, Babak Sadeghiyan, "A Differential Boomerang Attack Against 10-round Kahkeshan ", , September 2005
47
[en-name N/A], Babak Sadeghiyan, "A Genetic Algorithm for Finding High-Probable Differential Characteristics of Substitution-Permutation Networks ", , September 2005
48
Pooya Jaferian, Golnaz Elahi, Mohammadreza Ayatolahzade Shirazi, Babak Sadeghiyan, "Extending Business Modeling and Requirement Disciplines of RUP for Developing Secure Systems ", , August 2005
49
Robabeh Alishzadeh, Babak Sadeghiyan, Reza Safabakhsh, "A Hierarchicel Anomely Detection in Large Networks Using Neural Networks ", , May 2005
50
Babak Sadeghiyan, "a differetial boomerang attack against 10 round kahkeshan ", , March 2005
51
Babak Sadeghiyan, "RUPsec -an extension on RUP for developing secure systems requirements discipline ", , March 2005
52
Babak Sadeghiyan, "a genetic algorithm for finding high probable differential character stics of substitution ", , March 2005
53
Mohammadreza Ayatolahzade Shirazi, Pooya Jaferian, Golnaz Elahi, [en-name N/A], Babak Sadeghiyan, "Rupsec : An Extension on RUP for Developing secure systems - Reguirements Discipline ", , February 2005
54
Ali Valizadeh, Morteza Saheb Zamani, Babak Sadeghiyan, Farhad Mehdipour, "A High performance Reconfigurable Implementation of DES- Like Algorithms ", , December 2004
55
Bahram Najafi Uchevler, Babak Sadeghiyan, Morteza Saheb Zamani, Ali Valizadeh, "High speed Implementation of serpent Algorithm ", , December 2004
56
Ali Valizadeh, Morteza Saheb Zamani, Babak Sadeghiyan, "Hardware Implementation of LOKI Block cipher ", , September 2004
57
Babak Sadeghiyan, Morteza Saheb Zamani, Bahram Najafi Uchevler, "Reconfiguration of RTL Designs Using JBits ", , September 2004
58
Abbas Ghaemi Bafghi, Babak Sadeghiyan, "Finding suitable Differential characteristics for Block ciphers with Ant colony Techniguer ", , June 2004
59
Amir Rezaeinia, Hossein Pedram, Babak Sadeghiyan, "Asynchronous us. synchronous Design of RSA ", , May 2004
60
Abbas Ghaemi Bafghi, Babak Sadeghiyan, "Differential Model of Block Ciphers with Ant Colony Telecommicehins 2003 ", , August 2003
61
Abbas Ghaemi Bafghi, Babak Sadeghiyan, "Design of a Differential cyptanelyin attach with ant colony for SERPENT ", , June 2003
62
[en-name N/A], Mehdi Shajari, Mehran Nadjarbashi Noghani, Babak Sadeghiyan, Behrooz Tork Ladani, Masoud Bahrami, "Advanced Domestic Firewall : services protocols high_Level design ", , August 2001
63
Masoud Bahrami, Babak Sadeghiyan, "Effcient Modulo 2n+1 Multiplication Schemes for IDEA ", , May 2001
64
[en-name N/A], Babak Sadeghiyan, "A New architecture of fast binary montgomery modular multiplication for rsa cryptosystem ", , March 2001
65
[en-name N/A], Babak Sadeghiyan, "A New VLSI Architecture for Speedling RSA ", , March 2001
66
Mohammad Kazem Akbari, Babak Sadeghiyan, Reza Sepahi, "Neural Network Performance Analysis in FEAL Cryptanalysis ", , March 2001
67
Babak Sadeghiyan, Mahrokh Mohajeri, "Moamagar : A160 _bit Block Cipher ", , March 2000
68
Babak Sadeghiyan, Masoud Bahrami, "New Efficient Methods of Modulo 2 ^16+1 Multiplications for IDEA Block Cipher ", , March 2000
69
Babak Sadeghiyan, "A New Method for the Design of S- boxes ", , March 1997
70
Babak Sadeghiyan, [en-name N/A], "A New Universal Test for Bit Strings ", , May 1996
71
Babak Sadeghiyan, "Permutations based on single pseudo random functions. ", , January 1993