default search action
Massoud Hadian Dehkordi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j29]Massoud Hadian Dehkordi, Seyed Taghi Farahi, Samaneh Mashhadi:
A verifiable essential secret image sharing scheme based on HLRs (VESIS-(t, s, k, n)). CAAI Trans. Intell. Technol. 9(2): 388-410 (2024) - [j28]Zahra Saeidi, Ameneh Yazdi, Samaneh Mashhadi, Massoud Hadian Dehkordi, Adnan Gutub:
High performance image steganography integrating IWT and Hamming code within secret sharing. IET Image Process. 18(1): 129-139 (2024) - [j27]Massoud Hadian Dehkordi, Seyed Taghi Farahi, Samaneh Mashhadi:
LWE-based verifiable essential secret image sharing scheme ( ( t , s , k , n ) $( {t,s,k,n} )$ - VESIS). IET Image Process. 18(4): 1053-1072 (2024) - [j26]Massoud Hadian Dehkordi, Samaneh Mashhadi, Seyed Taghi Farahi, Mohammad Hossein Noorallahzadeh, Shahed Vahedi, Ahmad Gholami, Reza Alimoradi:
OPTP: A new steganography scheme with high capacity and security. Multim. Tools Appl. 83(6): 17579-17599 (2024) - [j25]Massoud Hadian Dehkordi, Samaneh Mashhadi, Seyed Taghi Farahi, Mohammad Hossein Noorallahzadeh:
Changeable essential threshold secret image sharing scheme with verifiability using bloom filter. Multim. Tools Appl. 83(20): 58745-58781 (2024) - [j24]Massoud Hadian Dehkordi, Samaneh Mashhadi, Seyed Taghi Farahi, Mohammad Hossein Noorallahzadeh:
Verifiable Changeable Threshold Secret Image Sharing Scheme Based on LWE Problem. Wirel. Pers. Commun. 137(2): 1099-1118 (2024) - 2023
- [j23]Niloofar Kiamari, Massoud Hadian Dehkordi, Samaneh Mashhadi:
Non-interactive verifiable LWE-based multi secret sharing scheme. Multim. Tools Appl. 82(14): 22175-22187 (2023) - 2022
- [j22]Hossein Oraei, Massoud Hadian Dehkordi:
A New Variant of the Winternitz One Time Signature Based on Graded Encoding Schemes. ISC Int. J. Inf. Secur. 14(1): 1-11 (2022) - [j21]Ebad Mirzaei, Massoud Hadian Dehkordi:
Simorgh, a fully decentralized blockchain-based secure communication system. J. Ambient Intell. Humaniz. Comput. 13(8): 3903-3921 (2022)
2010 – 2019
- 2019
- [j20]Massoud Hadian Dehkordi, Hossein Oraei:
How to construct a verifiable multi-secret sharing scheme based on graded encoding schemes. IET Inf. Secur. 13(4): 343-351 (2019) - [j19]Massoud Hadian Dehkordi, Samaneh Mashhadi, Hossein Oraei:
A Proactive Multi Stage Secret Sharing Scheme for Any Given Access Structure. Wirel. Pers. Commun. 104(1): 491-503 (2019) - [i2]Hossein Oraei, Massoud Hadian Dehkordi:
A New Variant of the Winternitz One Time Signature Scheme Based on Graded Encoding Schemes. IACR Cryptol. ePrint Arch. 2019: 212 (2019) - 2018
- [j18]Ali Amerimehr, Massoud Hadian Dehkordi:
Quantum Symmetric Cryptosystem Based on Algebraic Codes. IEEE Commun. Lett. 22(9): 1746-1749 (2018) - [j17]Reza Ghasemi, Ali Safi, Massoud Hadian Dehkordi:
Efficient multisecret sharing scheme using new proposed computational security model. Int. J. Commun. Syst. 31(1) (2018) - 2017
- [j16]Samaneh Mashhadi, Massoud Hadian Dehkordi, Niloofar Kiamari:
Provably secure verifiable multi-stage secret sharing scheme based on monotone span program. IET Inf. Secur. 11(6): 326-331 (2017) - [j15]Massoud Hadian Dehkordi, Ali Safi:
The complexity of the connected graph access structure on seven participants. J. Math. Cryptol. 11(1): 25-35 (2017) - [j14]Massoud Hadian Dehkordi, Roghayeh Taghizadeh:
Multiple differential-zero correlation linear cryptanalysis of reduced-round CAST-256. J. Math. Cryptol. 11(2): 55 (2017) - [j13]Reza Ghasemi, Md Momin Al Aziz, Noman Mohammed, Massoud Hadian Dehkordi, Xiaoqian Jiang:
Private and Efficient Query Processing on Outsourced Genomic Databases. IEEE J. Biomed. Health Informatics 21(5): 1466-1472 (2017) - 2016
- [j12]Massoud Hadian Dehkordi, Reza Ghasemi:
A Lightweight Public Verifiable Multi Secret Sharing Scheme Using Short Integer Solution. Wirel. Pers. Commun. 91(3): 1459-1469 (2016) - [i1]Massoud Hadian Dehkordi, Ali Safi:
The complexity of the connected graph access structure on seven participants. IACR Cryptol. ePrint Arch. 2016: 928 (2016) - 2015
- [j11]Samaneh Mashhadi, Massoud Hadian Dehkordi:
Two verifiable multi secret sharing schemes based on nonhomogeneous linear recursion and LFSR public-key cryptosystem. Inf. Sci. 294: 31-40 (2015) - 2014
- [j10]Massoud Hadian Dehkordi, Reza Alimoradi:
Certificateless identification protocols from super singular elliptic curve. Secur. Commun. Networks 7(6): 979-986 (2014) - 2013
- [j9]Motahhareh Gharahi, Massoud Hadian Dehkordi:
Average complexities of access structures on five participants. Adv. Math. Commun. 7(3): 311-317 (2013) - [j8]Motahhareh Gharahi, Massoud Hadian Dehkordi:
The complexity of the graph access structures on six participants. Des. Codes Cryptogr. 67(2): 169-173 (2013) - [j7]Motahhareh Gharahi, Massoud Hadian Dehkordi:
Perfect secret sharing schemes for graph access structures on six participants. J. Math. Cryptol. 7(2): 143-146 (2013) - [j6]Massoud Hadian Dehkordi, Elham Fattahi:
Threshold quantum secret sharing between multiparty and multiparty using Greenberger-Horne-Zeilinger state. Quantum Inf. Process. 12(2): 1299-1306 (2013) - 2011
- [j5]Massoud Hadian Dehkordi, Reza Alimoradi:
Identity-Based Multiple Key Agreement Scheme. KSII Trans. Internet Inf. Syst. 5(12): 2393-2402 (2011)
2000 – 2009
- 2009
- [j4]Massoud Hadian Dehkordi, Reza Alimoradi:
A New batch Identification Scheme. Discret. Math. Algorithms Appl. 1(3): 369-376 (2009) - 2008
- [j3]Massoud Hadian Dehkordi, Samaneh Mashhadi:
Verifiable secret sharing schemes based on non-homogeneous linear recursions and elliptic curves. Comput. Commun. 31(9): 1777-1784 (2008) - [j2]Massoud Hadian Dehkordi, Samaneh Mashhadi:
An efficient threshold verifiable multi-secret sharing. Comput. Stand. Interfaces 30(3): 187-190 (2008) - [j1]Massoud Hadian Dehkordi, Samaneh Mashhadi:
New efficient and practical verifiable multi-secret sharing schemes. Inf. Sci. 178(9): 2262-2274 (2008)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint