Image encryption using random bit sequence based on chaotic maps H Khanzadi, M Eshghi, S Etemadi Borujeni Arabian Journal for Science and Engineering 39 (2), 1039-1047, 2014 | 124 | 2014 |
Chaotic image encryption design using Tompkins-Paige algorithm S Etemadi Borujeni, M Eshghi Mathematical Problems in Engineering 2009, 2009 | 103 | 2009 |
Chaotic image encryption system using phase-magnitude transformation and pixel substitution S Etemadi Borujeni, M Eshghi Telecommunication Systems, 1-13, 2013 | 95 | 2013 |
A Side-Channel Analysis for Hardware Trojan Detection Based on Path Delay Measurement A Amelian, S Etemadi Borujeni Journal of Circuits, Systems and Computers 27 (09), 1850138, 2018 | 46 | 2018 |
Speech encryption based on fast fourier transform permutation S Etemadi Borujeni Electronics, Circuits and Systems, 2000. ICECS 2000. The 7th IEEE …, 2000 | 43* | 2000 |
Modified Logistic Maps for Cryptographic Application S Etemadi Borujeni, MS Ehsani Applied Mathematics 6 (5), 773-782, 2015 | 38 | 2015 |
Design and FPGA implementation of a pseudo random bit generator using chaotic maps H Khanzadi, M Eshghi, S Etemadi Borujeni IETE Journal of Research 59 (1), 63-73, 2013 | 34 | 2013 |
End-to-end privacy preserving scheme for IoT-based healthcare systems MN Esfahani, BS Ghahfarokhi, S Etemadi Borujeni Wireless Networks, 1-29, 2021 | 19* | 2021 |
Ultrasonic underwater depth measurement S Etemadi Borujeni International Symposium on Underwater Technology, 33-36, 2002 | 15* | 2002 |
Fast Fourier transform speech scrambler MS Ehsani, S Etemadi Borujeni Intelligent Systems, 2002. Proceedings. 2002 First International IEEE …, 2002 | 15 | 2002 |
Design and simulation of encryption system based on PRNG and Tompkins-Paige permutation algorithm using VHDL S Etemadi Borujeni, M Eshghi Proceedings of the International Conference on Robotics, Vision, Information …, 2007 | 11 | 2007 |
On the feasibility of using evolvable hardware for hardware trojan detection and prevention M Labafniya, S Picek, S Etemadi Borujeni, N Mentens Applied Soft Computing, 106247, 2020 | 9 | 2020 |
Secure scan-based design using Blum Blum Shub algorithm E Koopahi, S Etemadi Borujeni East-West Design & Test Symposium (EWDTS), 2016 IEEE, 1-5, 2016 | 8 | 2016 |
Security analysis of a key based color image watermarking vs. a non-key based technique in telemedicine applications P Nibakht, M Mahdavi,S Etemadi Borujeni, S Arasteh Multimedia Tools and Applications, 1–23, 2018 | 7* | 2018 |
Cryptography by pseudo random number generator S Etemadi Borujeni Intelligent Systems, 2002. Proceedings. 2002 First International IEEE …, 2002 | 7* | 2002 |
A novel approach on femtocell placement in the commercial buildings using genetic algorithm MJ Nassiri, S Etemadi Borujeni Transactions on Emerging Telecommunications Technologies 32 (9), e4285, 2021 | 5 | 2021 |
A new method for reversible circuit synthesis using a Simulated Annealing algorithm and don’t-cares SM Shahidi, S Etemadi Borujeni Journal of Computational Electronics 20, 718–734, 2021 | 5 | 2021 |
Hardware Trojan Prevention and Detection by Filling Unused Space Using Shift registers, Gate-chain and Extra Routing M Labbafniya, S Etemadi Borujeni, R Saeidi The ISC International Journal of Information Security 13 (1), 47-57, 2021 | 3 | 2021 |
Mehrab maps: One-dimensional piecewise nonlinear chaotic maps S Etemadi Borujeni, M Eshghi, M Safarnejad Boroujeni International Journal of Bifurcation and Chaos 22 (05), 2012 | 3 | 2012 |
A New Optimal Method for the Secure Design of Combinational Circuits against Hardware Trojans Using Interference Logic Locking Z Mirmohammadi, S Etemadi Borujeni Electronics 12 (5), 1107, 2023 | 2 | 2023 |