default search action
Shahram Etemadi Borujeni
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Morteza Darvish Morshedi Hosseini, Mojtaba Mahdavi, Shahram Etemadi Borujeni:
Modification in spatial, extraction from transform: Keyless side-information steganography for JPEG. J. Vis. Commun. Image Represent. 103: 104249 (2024) - [j14]Maryam Nasr-Esfahani, Behrouz Shahgholi Ghahfarokhi, Shahram Etemadi Borujeni:
Blockchain-based end-to-end privacy-preserving scheme for IoT-based healthcare systems. J. Supercomput. 80(2): 2067-2127 (2024) - 2023
- [j13]Seyed Mansour Shahidi, Shahram Etemadi Borujeni:
A fault-tolerant and scalable column-wise reversible quantum multiplier with a reduced size. Quantum Inf. Process. 22(4): 166 (2023) - 2022
- [j12]Mohammad Javad Nassiri, Shahram Etemadi Borujeni:
Load-aware femtocell placement in the commercial buildings. Phys. Commun. 55: 101918 (2022) - [j11]Seyed Mansour Shahidi, Shahram Etemadi Borujeni:
Reversible multiplier with a column-wise structure and a reduced number of ancilla inputs and garbage outputs. J. Supercomput. 78(1): 315-342 (2022) - 2021
- [j10]Mohammad Javad Nassiri, Shahram Etemadi Borujeni:
A novel approach on femtocell placement in the commercial buildings using genetic algorithm. Trans. Emerg. Telecommun. Technol. 32(9) (2021) - [j9]Mansoureh Labbafniya, Shahram Etemadi Borujeni, Roghayeh Saeidi:
Hardware Trojan Prevention and Detection by Filling Unused Space Using Shift registers, Gate-chain and Extra Routing. ISC Int. J. Inf. Secur. 13(1): 47-57 (2021) - [j8]Mansoureh Labafniya, Shahram Etemadi Borujeni:
An Obfuscation Method Based on CFGLUTs for Security of FPGAs. ISC Int. J. Inf. Secur. 13(2): 157-162 (2021) - [j7]Maryam Nasr-Esfahani, Behrouz Shahgholi Ghahfarokhi, Shahram Etemadi Borujeni:
End-to-end privacy preserving scheme for IoT-based healthcare systems. Wirel. Networks 27(6): 4009-4037 (2021) - 2020
- [j6]Mansoureh Labafniya, Stjepan Picek, Shahram Etemadi Borujeni, Nele Mentens:
On the feasibility of using evolvable hardware for hardware Trojan detection and prevention. Appl. Soft Comput. 91: 106247 (2020) - [c3]Mansoureh Labafniya, Shahram Etemadi Borujeni, Nele Mentens:
Evolvable Hardware Architectures on FPGA for Side-Channel Security. ACNS Workshops 2020: 163-180
2010 – 2019
- 2019
- [j5]Hossein Mokhtarnia, Shahram Etemadi Borujeni, Sayyed Mohammad Saeed Ehsani:
Automatic Test Pattern Generation Through Boolean Satisfiability for Testing Bridging Faults. J. Circuits Syst. Comput. 28(14): 1950240:1-1950240:26 (2019) - 2018
- [j4]Atieh Amelian, Shahram Etemadi Borujeni:
A Side-Channel Analysis for Hardware Trojan Detection Based on Path Delay Measurement. J. Circuits Syst. Comput. 27(9): 1850138:1-1850138:13 (2018) - [j3]Pegah Nikbakht Bideh, Mojtaba Mahdavi, Shahram Etemadi Borujeni, Sima Arasteh:
Security analysis of a key based color image watermarking vs. a non-key based technique in telemedicine applications. Multim. Tools Appl. 77(24): 31713-31735 (2018) - 2016
- [c2]Elnaz Koopahi, Shahram Etemadi Borujeni:
Secure scan-based design using Blum Blum Shub algorithm. EWDTS 2016: 1-5 - 2013
- [j2]Shahram Etemadi Borujeni, Mohammad Eshghi:
Chaotic image encryption system using phase-magnitude transformation and pixel substitution. Telecommun. Syst. 52(2): 525-537 (2013) - 2012
- [j1]Shahram Etemadi Borujeni, Mohammad Eshghi, Mahdi Safarnejad Boroujeni:
Mehrab Maps: One-Dimensional Piecewise nonlinear Chaotic Maps. Int. J. Bifurc. Chaos 22(5) (2012)
2000 – 2009
- 2000
- [c1]Shahram Etemadi Borujeni:
Speech encryption based on fast Fourier transform permutation. ICECS 2000: 290-293
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-22 00:37 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint