DNA base data hiding algorithm MR Abbasy, P Nikfard, A Ordi, MRN Torkaman International Journal of New Computer Architectures and their Applications …, 2012 | 59 | 2012 |
Enabling data hiding for resource sharing in cloud computing environments based on DNA sequences MR Abbasy, B Shanmugam 2011 IEEE World Congress on Services, 385-390, 2011 | 56 | 2011 |
Improving hybrid cryptosystems with DNA steganography MR Najaf Torkaman, P Nikfard, N Sadat Kazazi, MR Abbasy, ... Digital Enterprise and Information Systems: International Conference, DEIS …, 2011 | 29 | 2011 |
Data hiding method based on DNA basic characteristics MR Abbasy, AA Manaf, S MA Digital Enterprise and Information Systems: International Conference, DEIS …, 2011 | 25 | 2011 |
A novel proof of work model based on pattern matching to prevent DoS attack A Ordi, H Mousavi, B Shanmugam, MR Abbasy, MR Najaf Torkaman Digital Information and Communication Technology and Its Applications …, 2011 | 7 | 2011 |
Denial of Service (DoS) Attack Detection by Using Fuzzy Logic over Network Flows SF Tabatabaei, M Salleh, MR Abbasy, MR NajafTorkaman SAM 2012, 6, 2012 | 3 | 2012 |
An efficient cryptographic protocol based on DNA chip M Najaftorkaman, P Nikfard, M Masrom, M Abbasy Procedia Engineering, 2011 | 2 | 2011 |
Hybrid Cryptosystem with DNA Technology M Najaftorkaman, B Shanmuham, M Abbasy, A Ordi International Conference on Information Security and Artificial Intelligence …, 2010 | 2 | 2010 |
Scalable protocol for remote integrity attestation of cloud based distributed services S Azadiabad, H Pedram, MR Abbasy 2014 IEEE 8th International Conference on Application of Information and …, 2014 | 1 | 2014 |
Cryptographic File System: Easy and Reliable? MR Abbasy, M Sharifi, MRN Torkaman International Journal of Information and Electronics Engineering 3 (No. 6 …, 2013 | | 2013 |