Saman Shojae Chaeikar
Saman Shojae Chaeikar
Zweryfikowany adres z monash.edu
Cytowane przez
Cytowane przez
Genetic substitution-based audio steganography for high capacity applications
M Zamani, AB Abdul Manaf, HR Zeidanloo, S Shojae Chaeikar
International Journal of Internet Technology and Secured Transactions 3 (1 …, 2011
A proposed framework for P2P Botnet detection
HR Zeidanloo, ABA Manaf, RB Ahmad, M Zamani, S Shojae Chaeikar
International Journal of Engineering and Technology 2 (2), 161, 2010
A novel approach for genetic audio watermarking
M Zamani, AA Manaf, R Ahmad, F Jaryani, H Taherdoost, ...
Journal of Information Assurance and Security 5 (1), 102-111, 2010
Definitions and criteria of CIA security triangle in electronic voting system
S Shojae Chaeikar, M Jafari, H Taherdoost, N Shojae Chaei Kar
International Journal of Advanced Computer Science and Information …, 2013
Correlation between PSNR and bit per sample rate in audio steganography
M Zamani, ABA Manaf, SM Abdullah, S Shojae Chaeikar
11th International Conference on Signal Processing (SIP'12), 163-168, 2012
PSW statistical LSB image steganalysis
S Shojae Chaeikar, M Zamani, ABA Manaf, AM Zeki
Multimedia Tools and Applications 77 (1), 805-835, 2018
Genetic audio steganography
M Zamani, AA Manaf, R Ahmad, F Jaryani, H Taherdoost, ...
International Journal on Recent Trends in Engineering & Technology [IJRTET …, 2010
Mazdak Technique for PSNR Estimation in Audio Steganography
M Zamani, ABA Manaf, SM Abdullah, S Shojae Chaeikar
2012 International Conference on Mechanical and Electrical Technology (ICMET …, 2012
Ensemble SW image steganalysis: A low dimension method for LSBR detection
S Shojae Chaeikar, A Ahmadi
Signal Processing: Image Communication 70, 233-245, 2019
Smart card adoption model: Social and ethical perspectives
H Taherdoost, S Sahibuddin, M Namayandeh, N Jalaliyoon, A Kalantari, ...
Science 3 (4), 2012
Genetic Audio Watermarking
M Zamani, ABA Manaf, RB Ahmad, F Jaryani, S Shojae Chaeikar
Springer Berlin Heidelberg, 2010
Interpretative key management (IKM), A novel framework
S Shojae Chaeikar, SA Razak, S Honarbakhsh, HR Zeidanloo, M Zamani, ...
2010 Second International Conference on Computer Research and Development …, 2010
A Prospective Study of Mobile Cloud Computing
M Alizadeh, WH Hassan, M Zamani, T Khodadadi, S Shojae Chaeikar
International Journal of Advancements in Computing Technology(IJACT) 5 (11 …, 2013
Comparative analysis of Master-key and Interpretative Key Management (IKM) frameworks
S Shojae Chaeikar, ABA Manaf, M Zamani
Cryptography and security in computing, 203-218, 2012
Security features comparison of master key and IKM cryptographic key management for researchers and developers
S Yazdanpanah, S Shojae Chaeikar, M Zamani, R Kourdi
Proceedings of the 3rd International Conference on Software Technology and …, 2011
PFW: Polygonal Fuzzy Weighted—An SVM Kernel for the Classification of Overlapping Data Groups
S Shojae Chaeikar, AA Manaf, AA Alarood, M Zamani
ELectronics 9 (4), 2020
Electronic Voting Systems for European Union Countries
S Shojae Chaeikar, M Zamani, ...
Journal of next Generation Information Technology 4 (5.3), 16-26, 2013
Node Based Interpretative Key Management Framework
S Shojae Chaeikar, H Sabet Moghaddam, H Rouhani Zeidanloo
Proceedings of The 2010 Congress in Computer science, Computer engineering …, 2010
An intelligent cryptographic key management model for secure communications in distributed industrial intelligent systems
S Shojae Chaeikar, M Alizadeh, MH Tadayon, A Jolfaei
International Journal of Intelligent Systems, 2021
IKM-based Security Usability Enhancement Model
S Yazdanpanah, S Shojae Chaeikar
IRACST-International Journal of Computer Science and Information Technology …, 2012
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20