Faculty Profile

زیبا اسلامی

دانشیار

تاریخ به‌روزرسانی: 1403/02/27

زیبا اسلامی

علوم ریاضی / علوم داده ها و کامپیوتر

Articles Faculty

مقالات علمی چاپ شده در مجلات

  1. "Certificate-based authenticated encryption with keyword search: Enhanced security model and a concrete construction for Internet of Things"
    Danial Shiraly, Ziba Eslami, Nasrollah Pakniat
    Journal of Information Security and Applications, Vol. 80, pp.103683-103693, 2024
  2. "An Efficient Ramp Secret Sharing Scheme Based on Zigzag-Decodable Codes"
    saeideh Kabirirad, Sorour Sheidani, Ziba Eslami
    Journal of Computer and Knowledge Engineering, Vol. 6, pp.15-24, 2023
  3. "Designated-Server Hierarchical Searchable Encryption in Identity-Based Setting"
    Danial Shiraly, Nasrollah Pakniat, Ziba Eslami
    ISeCure-ISC International Journal of Information Security, Vol. 15, pp.1-16, 2023
  4. "A generic construction to build simple oblivious transfer protocols from homomorphic encryption schemes"
    Saeid Esmaeilzade, Nasrollah Pakniat, Ziba Eslami
    JOURNAL OF SUPERCOMPUTING, Vol. 78, pp.72-92, 2022
  5. "Pairing-free certificateless authenticated encryption with keyword search"
    Danial Shiraly, Nasrollah Pakniat, Mahnaz Noroozi, Ziba Eslami
    JOURNAL OF SYSTEMS ARCHITECTURE, Vol. 124, 2022
  6. "Public key encryption with distributed keyword search"
    Ziba Eslami, Mahnaz Noroozi, Kobra Amirizirtol
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, pp.1-25, 2021
  7. "Blind multipurpose image watermarking with perfect security"
    Sorour Sheidani, Ziba Eslami
    ISeCure-ISC International Journal of Information Security, Vol. 13, pp.145-156, 2021
  8. "CPA-Secure Privacy-Preserving Reversible Data Hiding for JPEG Images"
    Sorour Sheidani, Ahmad Mahmoudi-Aznaveh, Ziba Eslami
    IEEE Transactions on Information Forensics and Security, Vol. 16, pp.3647-3661, 2021
  9. "Blind multipurpose watermarking with insertion of a single watermark: a generic construction based on verifiable threshold secret sharing"
    Sorour Sheidani, Ziba Eslami
    IET Image Processing, Vol. 14, pp.4766-4773, 2020
  10. "Public-key encryption with keyword search: a generic construction secure against online and offline keyword guessing attacks"
    Mahnaz Noroozi, Ziba Eslami
    Journal of Ambient Intelligence and Humanized Computing, Vol. 11, pp.879-890, 2020
  11. "Cryptanalysis and improvement of a group RFID authentication protocol"
    Nasrollah Pakniat, Ziba Eslami
    WIRELESS NETWORKS, Vol. 26, pp.3363-3372, 2020
  12. "Certificateless authenticated encryption with keyword search: Enhanced security model and a concrete construction for industrial IoT"
    Nasrollah Pakniat, Danial Shiraly, Ziba Eslami
    Journal of Information Security and Applications, Vol. 53, 2020
  13. "Improvement of (n, n)-multi-secret image sharing schemes based on Boolean operations"
    Saeideh Kabirirad, Ziba Eslami
    Journal of Information Security and Applications, Vol. 47, pp.16-27, 2019
  14. "High-speed GPU implementation of a secret sharing scheme based on cellular automata"
    Saeideh Kabirirad, Mahmood Fazlali, Ziba Eslami
    JOURNAL OF SUPERCOMPUTING, Vol. 75, pp.7314-7336, 2019
  15. "On the Security of a Privacy-Preserving Ranked Multi-Keyword Search Scheme"
    Ziba Eslami, Mahnaz Noroozi, joonsang baek
    Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, Vol. 10, pp.75-85, 2019
  16. "Public key authenticated encryption with keyword search: revisited"
    Mahnaz Noroozi, Ziba Eslami
    IET Information Security, Vol. 13, pp.336-342, 2019
  17. "A verifiable threshold secret sharing scheme based on lattices"
    Bahman Rajabi Kafshgar, Ziba Eslami
    INFORMATION SCIENCES, pp.655-661, 2019
  18. "Comments on a chaos-based public key encryption with keyword search scheme"
    Mahnaz Noroozi, Ziba Eslami, Nasrollah Pakniat
    NONLINEAR DYNAMICS, Vol. 94, pp.1127-1132, 2018
  19. "Designing a secure designated server identity-based encryption with keyword search scheme: still unsolved"
    Mahnaz Noroozi, Iman Karoobi, Ziba Eslami
    Annals of Telecommunications, Vol. 73, pp.769-776, 2018
  20. "A (t,n) -multi secret image sharing scheme based on Boolean operations"
    Saeideh Kabirirad, Ziba Eslami
    JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, Vol. 57, pp.39-47, 2018
  21. "A CCA2-Secure Incomparable Public Key Encryption Scheme"
    Bahman Rajabi Kafshgar, Ziba Eslami
    Journal of Computing and Security, Vol. 3, pp.3-12, 2017
  22. "Cryptanalysis of a multiparty quantum key agreement protocol based on commutative encryption"
    Razieh Mohajer, Ziba Eslami
    Quantum Information Processing, Vol. 16, pp.1-9, 2017
  23. "Verifiable Social Multi-Secret Sharing Secure in Active Adversarial"
    Nasrollah pakniat, Ziba Eslami
    Journal of Computing and Security, Vol. 4, pp.3-12, 2017
  24. "Provably Secure Group Key Exchange Protocol in the Presence of Dishonest Insiders"
    Ziba Eslami, Mahnaz Noroozi, Saeideh Kabirirad
    International Journal of Network Security, Vol. 18, pp.33-42, 2016
  25. "Reducing multi-secret sharing problem to sharing a single secret based on cellular automata"
    Nasrollah Pakniat, Mahnaz Noroozi, Ziba Eslami
    the csi journal of computer science and engineering, Vol. 14, pp.38-43, 2016
  26. "Ideal social secret sharing using Birkhoff interpolation method"
    Ziba Eslami, Nasrollah Pakniyat, mehrdad nojoumian
    Security and Communication Networks, Vol. 9, pp.4973-4982, 2016
  27. "Distributed key generation protocol with hierarchical threshold access structure"
    Nasrollah Pakniyat, Mahnaz Noroozi, Ziba Eslami
    IET Information Security, pp.1-8, 2015
  28. "Algorithmic Aspects of Trades"
    Ziba Eslami
    ARS COMBINATORIA, Vol. 120, pp.245-253, 2015
  29. "A note on Selling multiple secrets to a single buyer"
    Nasrollah Pakniyat, Ziba Eslami, Ali Miri
    INFORMATION SCIENCES, Vol. 279, pp.889-892, 2014
  30. "Secret image sharing scheme with hierarchical threshold access structure"
    Nasrollah Pakniyat, Mahnaz Noroozi, Ziba Eslami
    JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, Vol. 25, pp.1093-1101, 2014
  31. "Proxy signatures and buyer seller watermarking protocols for the protection of multimedia content"
    Ziba Eslami, Mohammad Kazem Nasab Haji, Narges Mirehi
    MULTIMEDIA TOOLS AND APPLICATIONS, Vol. 72, pp.2723-2740, 2014
  32. "Cryptanalysis of an Attribute-based Key Agreement Protocol"
    Ziba Eslami, Nasrollah Pakniat, Mahnaz Noroozi
    international journal of computer and information technologies, Vol. 2, pp.351-358, 2014
  33. "Certificateless aggregate signcryption Security model and a concrete construction secure in the random oracle model"
    Ziba Eslami, Nasrollah Pakniyat
    journal of king university-computer and information sciences, Vol. 26, pp.276-286, 2014
  34. "An authenticated image encryption scheme based on chaotic maps and memory cellular automata"
    Atieh Bakhshandeh Kapoorchali, Ziba Eslami
    OPTICS AND LASERS IN ENGINEERING, pp.665-673, 2013
  35. "An improvement over an image encryption method based on total shuffling"
    Ziba Eslami, Atieh Bakhshandeh Kapoorchali
    OPTICS COMMUNICATIONS, pp.51-55, 2013
  36. "A new verifiable multi-secret sharing scheme based on bilinear maps"
    Ziba Eslami, Saeedeh Kabirirad
    WIRELESS PERSONAL COMMUNICATIONS, pp.459-467, 2012
  37. "Data security in unattended wireless sensor networks through aggregate signcryption"
    Faezeh Sadat Babamir, Ziba Eslami
    KSII Transactions on Internet and Information Systems, Vol. 6, pp.2940-2955, 2012
  38. "SECRET IMAGE SHARING BASED ON CELLULAR AUTOMATA AND STEGANOGRAPHY"
    Ziba Eslami, Seyyed Hossein Razzaghi, Jamal Zarepour Ahmadabadi
    PATTERN RECOGNITION, Vol. 43, pp.397-404, 2011
  39. "a proxy e- raffle protocol based on proxy signatures"
    Nasrollah Pakniyat, Ziba Eslami
    Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, Vol. 2, pp.74-84, 2011
  40. "A new untraceable off-line electronic cash system"
    mehdi talebi, Ziba Eslami
    Electronic Commerce Research and Applications, Vol. 10, pp.59-66, 2011
  41. "Secret image sharing with authentication-chaining and dynamic embedding"
    Ziba Eslami, Jamal Zarepour Ahmadabadi
    JOURNAL OF SYSTEMS AND SOFTWARE, Vol. 84, pp.803-809, 2011
  42. "A verifiable multi-secret sharing scheme based on cellular automata"
    Ziba Eslami, Jamal Zarepour Ahmadabadi
    INFORMATION SCIENCES, Vol. 180, pp.2889-2894, 2010
  43. "On the possible automorphisms of a 3-(16 7 5) design"
    Ziba Eslami
    ARS COMBINATORIA, Vol. 95, pp.217-224, 2010
  44. "Another security weakness in an authenticated group key agreement"
    Ziba Eslami, Saeideh Kabirirad
    Journal of Internet Technology, Vol. 11, pp.573-576, 2010
  45. "Classification of trades by large sets"
    Ziba Eslami
    ARS COMBINATORIA, Vol. 82, 2007
  46. "Classification of Designs with nontrivial Automorphism groups"
    Ziba Eslami
    JOURNAL OF COMBINATORIAL DESIGNS, pp.479-489, 2006
  47. "Some New 4-Designs"
    Ziba Eslami, G.B Khosro Shahi, M.M Noori, B Tayfeh Rezaiie
    ARS COMBINATORIA, pp.225-229, 2004
  48. "Enumeration of t-Designs Through Intserction Matrices"
    Ziba Eslami, G.B Khosro Shahi, M.M Noori
    DESIGNS CODES AND CRYPTOGRAPHY, pp.185-191, 2004
  49. "LS 7 (3 5 11)Exists"
    Ziba Eslami
    JOURNAL OF COMBINATORIAL DESIGNS, pp.312-316, 2003
  50. "On the indecomposable partition problem Ipp(10 )"
    Ziba Eslami
    DISCRETE MATHEMATICS, pp.255-264, 2002
  51. "Some New 6-(14 7 4)Designs"
    Ziba Eslami, G.B Khosro Shahi
    JOURNAL OF COMBINATORIAL THEORY SERIES A, pp.141-152, 2001
  52. "On Classification of 2(8 3)and 2-(9 3)Trades"
    Ziba Eslami, G.B Khosro Shahi, B Tayfeh Rezaiie
    Journal of Combinatorial Mathematics and Combinatorial Computing, pp.231-242, 2001
  53. "On Halvings of The 2-(10 3 8) Design"
    Ziba Eslami, G.B Khosro Shahi, B Tayfeh Rezaiie
    JOURNAL OF STATISTICAL PLANNING AND INFERENCE, pp.411-419, 2000
  54. "Classification of Some Large Sets and Designs"
    Ziba Eslami, G.B Khosro Shahi
    JOURNAL OF GEOMETRIC ANALYSIS, pp.105-110, 2000
  55. "A Complete Classification of 3-(11 4 4) Designs with nontrivial automorphism group"
    Ziba Eslami, G.B Khosro Shahi
    JOURNAL OF COMBINATORIAL DESIGNS, pp.419-425, 2000
  56. "On 2-(v 3)Trades of Minimum Volume"
    Ziba Eslami, B Tayfeh Rezaiie
    Australasian Journal of Combinatorics, pp.239-245, 1999
  57. "تحلیل امنیت و بهبود یک سامانه حمل ونقل هوشمند مبتنی بر امضای تجمعی فاقد گواهینامه"
    نصرالله پاک نیت، زیبا اسلامی
    پدافند الکترونیکی و سایبری، نسخه 8، صفحات:25-33، 1398

مقالات علمی ارائه شده در همایش‌ها

  1. "Forgery attack on an outsourced attribute-based signature scheme"
    saideh kabiri rad, Ziba Eslami
    27th international computer conference, 2022
  2. "Accelerating Robust Watermarking through Parallelization"
    Sorour Sheidani, Mahmood Fazlali, Ziba Eslami
    CSICC 2020, pp.1-6, 2020
  3. "A Block-Based Image Encryption Scheme UsingCellular AutomataWith Authentication Capability"
    Ziba Eslami, Saeideh Kabirirad
    THIRD INTERNATIONAL CONFERENCE OF MATHEMATICAL SCIENCES (ICMS 2019), 2019
  4. "Quantum Secret Sharing using single states"
    Razieh Mohajer, Ziba Eslami
    8th International Symposium on Telecommunictions, 2016
  5. "issuer-free oblivious transfer with threshold access control policy"
    PARISA MOMENI, Ziba Eslami
    2nd international conference on knowledge-base engineering and innovation, 2015
  6. "proactive multi-secret sharing scheme"
    Davood Faramarzi Filabadi, Ziba Eslami
    2nd international conference on knowledge-base engineering and innovation, 2015
  7. "multi-user searchable encryption scheme with general access structure"
    Kobra Amirizirtol, Mahnaz Noroozi, Ziba Eslami
    2nd international conference on knowledge-base engineering and innovation, 2015
  8. "social multi-secret sharing scheme"
    Abdolkarim Mohammadi, Ziba Eslami
    2nd international conference on knowledge-base engineering and innovation, 2015
  9. "Hierarchical Threshold Multi-Secret Sharing Scheme Based on Birkhoff Interpolation and Cellular Automata"
    Ziba Eslami, Nasrollah Pakniyat, Mahnaz Noroozi
    18th CSI International Symposium on Computer Architecture Digital Systems (CADS 2015), 2015
  10. "improving a coding method in unattended wireless sensor networks"
    Faezeh Sadat Babamir, Ziba Eslami
    5th Conference on Algebraic Combinatorics and Graph Theory, 2012
  11. "an aggregate signcryption based on elliptic curves in unattended environments"
    Ziba Eslami
    international congress on applied analysis and algebra, 2012
  12. "A certificateless proxy signature scheme secure in"
    Ziba Eslami, Nasrollah Pakniyat
    international conference on latest computational technologies, 2012
  13. "secret image sharing with high quality stego images"
    Ziba Eslami, Jamal Zarepour Ahmadabadi
    6 international isc confrrence on information security and cryptology(iscisc09), 2009
  14. "a simple protocol for selling multiple secrets to a single buyer without a trusted party"
    Ziba Eslami, Nasrollah Pakniat
    6 international isc confrrence on information security and cryptology(iscisc09), 2009
  15. "Application of Trades in Construction/Enumeration of Combinatorial Objects"
    Ziba Eslami
    ICM 2002, 2003
  16. "Classification of Some Large Sets and Designs"
    Ziba Eslami
    2nd Pythagorean Conf., 1999
  17. "تحلیل امنیت یک امضای فاقد گواهینامه جهت دار"
    نصرالله پاک نیت، مجتبی گودرزی، زیبا اسلامی
    سومین کنفرانس ملی پژوهش های نوین در مهندسی و علوم کاربردی، 1400
  18. "Blind Multipurpose Image Watermarking Based onSecret Sharing"
    سرور شیدانی، زیبا اسلامی
    شانزدهمین کنفرانس بین المللی انجمن رمز ایران، صفحات:1-8، 1398
  19. "تحلیل امنیت یک طرح رمزنگاری با قابلیت جست و جوی رتبه بندی شده ی چند کلمه ی کلیدی و دارای چند صاحب داده"
    پوریا زنداکبری، زیبا اسلامی
    چهارمین کنفرانس موضوعات نوین در علوم کامپیوتر و اطلاعات، صفحات:217-220، 1397
  20. "بهبود یافته یک روش تسهیم راز آستانه ای بر مبنای الگوریتم های پخش اطلاعات"
    سعیده کبیری راد، زیبا اسلامی
    چهارمین کنفرانس موضوعات نوین در علوم کامپیوتر و اطلاعات، 1397
  21. "رمزگذاری کلید عمومی با قابلیت جستجوی کلیدواژه"
    مهناز نوروزی، نصرالله پاک نیت، زیبا اسلامی
    چهاردهمین کنفرانس بین المللی انجمن رمز ایران، صفحات:1-6، 1396
  22. "پروتکل انتقال فراموشکار 1 از 2 مبتنی بررمزگذاری دوحالته تعمیم یافته"
    سیدمحمود موسوی، زیبا اسلامی
    چهل و هشتمین کنفرانس ریاضی ایران، صفحات:1703-1707، 1396
  23. "پروتکل توافق کلید گروهی مقاوم در برابرتقلب با ویژگی تصحیح خطای ناشی از اختلال کانال"
    زیبا اسلامی، مهناز نوروزی
    هفتمین کنفرانس بین المللی فناوری اطلاعات دانش و توسعه، 1394
  24. "پروتکل واترمارکینگ فروشنده-خریدار غیرخطی بدون شخص سوم معتمد"
    غلامرضا هجرودی، زیبا اسلامی
    هفتمین کنفرانس بین المللی فناوری اطلاعات دانش و توسعه، 1394
  25. "یک روش رمزنگاری تصویر بلوک-مبنا با استفاده از آتاماتای سلولی و نگاشت آشوب"
    سعیده کبیری راد، زیبا اسلامی
    بیستمین کنفرانس ملی سالانه انجمن کامپیوتر ایران، 1393
  26. "Cryptanalysis of an Attribute-based Key Agreement Protocol"
    نصراله پاک نیت، زیبا اسلامی، مهناز نوروزی
    کنفرانس بین المللی ، فناوری اطلاعات و رسانه های دیجیتال، صفحات:179-182، 1392
  27. "پایداری داده ها در شبکه های حسگر بی سیم بی ملازم"
    فائزه سادات بابامیر، زیبا اسلامی
    نهمین کنفرانس بین المللی انجمن رمز ایران، 1391
  28. "an efficient buyer- seller watermarking protcol based on proxy signatures"
    محمد کاظم نسب حاجی، زیبا اسلامی
    8TH INTERNATIonal isc conferance on information security and cryptology، 1390
  29. "یک طرح انتخابات الکترونیک امن و کار آمد مبتنی بر امضای کور"
    زیبا اسلامی، هدی قوامی پور
    یازدهمین کنفرانس انجمن کامپیوتر ایران، 1384