Asghar Beheshti

Learn More
An elliptic curve-based signcryption scheme is introduced in this paper that effectively combines the functionalities of digital signature and encryption, and decreases the computational costs and communication overheads in comparison with the traditional signaturethen-encryption schemes. It simultaneously provides the attributes of message confidentiality,(More)
† Copyright © 2008 IEEE. Reprinted from the Proceedings of the 2 International Conference on Next Generation Mobile Applications, Services, and Technologies (NGMAST'08), pp.576-581, University of Glamorgan, Cardiff, UK, Sep. 2008 [DOI 10.1109/NGMAST.2008.88]. This material is posted here with permission of the IEEE. Internal or personal use of this material(More)
The non-repudiation as an essential requirement of many applications can be provided by the asymmetric key model. With the evolution of new applications such as mobile commerce, it is essential to provide secure and efficient solutions for the mobile environments. The traditional public key cryptography involves huge computational costs and is not so(More)
The signcryption is a relatively new cryptographic technique that is supposed to fulfill the functionalities of encryption and digital signature in a single logical step. Several signcryption schemes are proposed throughout the years, each of them having its own problems and limitations. In this paper, the security of a recent signcryption scheme, i.e.(More)
The signcryption is a relatively new cryptographic technique that is supposed to fulfill the functionalities of encryption and digital signature in a single logical step. Although several signcryption schemes are proposed over the years, some of them are proved to have security problems. In this paper, the security of Han et al.’s signcryption scheme is(More)
Secure communications in UWB based on cryptographic keys generated from channel measurements without a trusted third party have been developed. The fine time resolution of UWB allows high levels of mutual information to be obtained by a given A and B through independent characterizations of their shared communication channel. This mutual information(More)
† Copyright © 2009 IEEE. Reprinted from the Proceedings of the 14 IEEE Symposium on Computers and Communications (ISCC'09), pp.713-716, July 2009 [DOI 10.1109/ISCC.2009.5202242]. This material is posted here with permission of the IEEE. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for(More)
Wireless sensor networks are limited in energy. Any routing protocol used in wireless sensor networks should take into consideration the time sensitive nature of the traffic in such networks, along with the amount of energy left for each sensor. In this paper we present an energy aware packet delivery mechanism for probabilistic Quality of Service (QoS)(More)
A new and efficient method for combining iris biometrics with custom cryptographic schemes to obtain an efficient biocryptosystem is proposed in this paper. Though the method structure is basically derived from a previously described biocryptosystem scheme, the introduction of new image processing methods alongside with efficient utilization of traditional(More)