Obserwuj
Shahram Etemadi Borujeni
Shahram Etemadi Borujeni
Assistant Professor Computer Architecture, Faculty of Computer Engineering, University of Isfahan
Zweryfikowany adres z eng.ui.ac.ir - Strona główna
Tytuł
Cytowane przez
Cytowane przez
Rok
Image encryption using random bit sequence based on chaotic maps
H Khanzadi, M Eshghi, S Etemadi Borujeni
Arabian Journal for Science and Engineering 39 (2), 1039-1047, 2014
1222014
Chaotic image encryption design using Tompkins-Paige algorithm
S Etemadi Borujeni, M Eshghi
Mathematical Problems in Engineering 2009, 2009
1032009
Chaotic image encryption system using phase-magnitude transformation and pixel substitution
S Etemadi Borujeni, M Eshghi
Telecommunication Systems, 1-13, 2013
932013
A Side-Channel Analysis for Hardware Trojan Detection Based on Path Delay Measurement
A Amelian, S Etemadi Borujeni
Journal of Circuits, Systems and Computers 27 (09), 1850138, 2018
432018
Speech encryption based on fast fourier transform permutation
S Etemadi Borujeni
Electronics, Circuits and Systems, 2000. ICECS 2000. The 7th IEEE …, 2000
43*2000
Modified Logistic Maps for Cryptographic Application
S Etemadi Borujeni, MS Ehsani
Applied Mathematics 6 (5), 773-782, 2015
382015
Design and FPGA implementation of a pseudo random bit generator using chaotic maps
H Khanzadi, M Eshghi, S Etemadi Borujeni
IETE Journal of Research 59 (1), 63-73, 2013
332013
End-to-end privacy preserving scheme for IoT-based healthcare systems
MN Esfahani, BS Ghahfarokhi, S Etemadi Borujeni
Wireless Networks, 1-29, 2021
16*2021
Ultrasonic underwater depth measurement
S Etemadi Borujeni
International Symposium on Underwater Technology, 33-36, 2002
15*2002
Fast Fourier transform speech scrambler
MS Ehsani, S Etemadi Borujeni
Intelligent Systems, 2002. Proceedings. 2002 First International IEEE …, 2002
152002
Design and simulation of encryption system based on PRNG and Tompkins-Paige permutation algorithm using VHDL
S Etemadi Borujeni, M Eshghi
Proceedings of the International Conference on Robotics, Vision, Information …, 2007
112007
On the feasibility of using evolvable hardware for hardware trojan detection and prevention
M Labafniya, S Picek, S Etemadi Borujeni, N Mentens
Applied Soft Computing, 106247, 2020
92020
Secure scan-based design using Blum Blum Shub algorithm
E Koopahi, S Etemadi Borujeni
East-West Design & Test Symposium (EWDTS), 2016 IEEE, 1-5, 2016
82016
Security analysis of a key based color image watermarking vs. a non-key based technique in telemedicine applications
P Nibakht, M Mahdavi,S Etemadi Borujeni, S Arasteh
Multimedia Tools and Applications, 1–23, 2018
7*2018
Cryptography by pseudo random number generator
S Etemadi Borujeni
Intelligent Systems, 2002. Proceedings. 2002 First International IEEE …, 2002
7*2002
A new method for reversible circuit synthesis using a Simulated Annealing algorithm and don’t-cares
SM Shahidi, S Etemadi Borujeni
Journal of Computational Electronics 20, 718–734, 2021
52021
A novel approach on femtocell placement in the commercial buildings using genetic algorithm
MJ Nassiri, S Etemadi Borujeni
Transactions on Emerging Telecommunications Technologies 32 (9), e4285, 2021
42021
Hardware Trojan Prevention and Detection by Filling Unused Space Using Shift registers, Gate-chain and Extra Routing
M Labbafniya, S Etemadi Borujeni, R Saeidi
The ISC International Journal of Information Security 13 (1), 47-57, 2021
32021
Mehrab maps: One-dimensional piecewise nonlinear chaotic maps
S Etemadi Borujeni, M Eshghi, M Safarnejad Boroujeni
International Journal of Bifurcation and Chaos 22 (05), 2012
32012
A New Optimal Method for the Secure Design of Combinational Circuits against Hardware Trojans Using Interference Logic Locking
Z Mirmohammadi, S Etemadi Borujeni
Electronics 12 (5), 1107, 2023
22023
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20