Dr. Reza Ebrahimi Atani
Faculty: Faculty of Engineering
Department: Department of Computer Engineering
University of Guilan
Home | Login | Password Recovery | | فارسی
Dr. Reza Ebrahimi Atani
Academic Rank:

Assistant Prof.

Faculty:

Faculty of Engineering

Department:

Department of Computer Engineering



Profile :: Educations :: Publications :: Courses :: Schedule :: Links :: CV :: Contact


Reza Ebrahimi Atani was born in Arak, Iran. He graduated from Razi high school of Rasht in 1998; he studied Electronics Engineering at the University of Guilan in Rasht, Iran. He got his B.Sc degree in 2002 and at the same year he was accepted to follow his masters study at Iran University of Science & Technology (IUST) in Tehran, Iran. He joined the Electronics Research Center of IUST and received the M.Sc degree in Electronics-VLSI design in 2004 and again at the same year he was accepted to persue his studies as a full-time PhD student under supervision of Prof. Sattar Mirzakuchaki and Prof. Shahabaddin Ebrahimi Atani. He received the Ph.D. degree in 2010 where he worked on "Design and implementation of a stream cipher for mobile communications" as his PhD dissertation. He has an assistant professor position in Department of Computer Engineering at the University of Guilan. His research interests include Cryptology, Cryptographic Hardware and Embedded Systems (CHES), Computer and Network security,  Information Hiding, Semi-Ring Theory and Semi-Module Theory.

My Erdos Number = 4,

My Mathematics Genealogy Project Page



Ph.D. in Cryptology, (May 2010)

 

Electrical Engineering Department, Iran University of Science and Technology, Tehran Iran.

Thesis: "Design and Implementation of a Stream Cipher for Mobile Communication".

 

Visiting Scholar (7 Month), FHNW, Switzerland (Prof. Willi Meier)

Research Topic: Design and analysis of stream ciphers

 

International Scholar (6 Month ), K. U. Leuven, Belgium (Prof. Bart Preneel & Prof. Ingrid Verbauwhede)

Research Topic:  Cryptographic hardware and embedded system (CHES)

M.Sc. in VLSI, (November 2004)

 

Electrical Engineering Department, Iran University of Science and Technology, Tehran Iran.

Thesis: "Design and Implementation of a general purpose DSP processor on FPGA".

 

B.Sc. in Electronics, (September 2002)

 

Electrical Engineering Department, The University of Guilan, Rasht, Iran.

Thesis: "Sigma Delta A/D Converters".

 

Research Interests:

♦ Cryptography (Stream Ciphers, Block Ciphers, Hash Functions)  

♦ Computer Security 

♦ Information Hiding

♦ Steganography

♦ Network Security

Cryptographic Hardware and Embedded System (CHES)

♦ VLSI Design

Public Key Cryptography

Discrete Mathematics (Semi-Rings, Semi-Modules, Ideal Theory)

 

For more information in my publications in Farsi (Persian) please refer to my Persian webpage



Journal Papers & Book Chapters:

 

============================== 2015 =============================

1- Shahabaddin Ebrahimi Atani, Reza Ebrahimi Atani, and Amir Hassani Karbasi, The filter theory in quotients of complete lattices, The Journal Quasigroups and Related Systems, to appear.

2. Amir Hassani Karbasi, Mehran Alidoost Nia, and Reza Ebrahimi Atani, Designing of An Anonymous Communication System Using Lattice-based Cryptography, Journal of Electronic and Cyber Defence, to appear, Persian.

3. Amir Hassani Karbasi, Reza Ebrahimi Atani, Shahabaddin Ebrahimi Atani, and Javad Mehri Tekmeh, Projective Plane-Based Key Pre-distribution by Key Copying and Exchanging based on Connected Dominating Set in Distributed Wireless Sensor Networks, (Under Review).

4. Saman Tahouri, Reza Ebrahimi Atani, Amir Hassani Karbasi, Yashar Deldjoo, Application of Connected Dominating sets in Wildfire Detection based on Wireless Sensor Networks, (Under Review).

5. Shahabaddin Ebrahimi Atani, Reza Ebrahimi Atani, and Amir Hassani Karbasi, NETRU: A Non-Commutative Extension of the CTRU Public-Key Cryptosystem, (Under Review).

6. Shahabaddin Ebrahimi Atani, Reza Ebrahimi Atani, and Amir Hassani Karbasi, EEH: A GGH-Like Public Key Cryptosystem Over The Eisenstein Integers Using Polynomial Representations, (Under Review).

7. Amir Hassani Karbasi, and Reza Ebrahimi Atani, A Survey on Lattice-based Cryptography, (Persian, Under Review).

8. Shahabaddin Ebrahimi Atani, Reza Ebrahimi Atani, and Amir Hassani Karbasi, PairTRU: Pairwise Non-commutative Extension of The NTRU Public Key Cryptosystem, (Under Review).
 

============================== 2014 =============================

1. "Projective Plane-Based Key Pre-distribution by Key Copying and Exchanging based on Connected Dominating Set in Distributed Wireless Sensor Networks", (Under Review).

5. "An Anonymous Communication System Using Lattice-based Cryptography, (Persian, Under Review).

 

============================== 2013 =============================

1- Reza Ebrahimi Atani, Shahabaddin Ebrahimi Atani, "On semiprime multiplication modules over pullback rings", Communications in Algebra, Vol.41, Issue 2,(2013), Pages: 776-791.

2- Abdolrahman Attar, Reza Moradirad, Reza Ebrahimi Atani, “A survey of Image spamming and filtering techniques”, Artificial Intelligence Review, Volume 40, Issue 1, (2013), Pages: 71-105.

3- Reza Ebrahimi Atani, "Generalizations of Prime Ideals of Semirings", Azerbaijan Journal of Mathematics, Vol. 3, No. 1, (2013), Pages: 76-83.

4- Reza Moradi Rad, Abdolrahman Attar, Reza Ebrahimi Atani, "A Comprehensive Layer Based Encryption Method for Visual Data", International Journal of Signal Processing, Image Processing and Pattern Recognition, Vol. 6, No. 1, (2013), Pages: 37-48.

5- Mohammad Sabzinejad Farash, Mahmoud Ahmadian Attari, Reza Ebrahimi Atani, Mohamadreza Jami, "A new efficient authenticated multiple-key exchange protocol from bilinear pairings", Computers and Electrical Engineering, Vol. 39, Issue 2, February 2013, Pages: 530–541.

6- "A Framework to Counter back Insider Attacks on Information Sources", Under Reveiw.

7- "Alert Correlation for Computer Network"s Intrusion Detection in Distributed Environment", Under reveiw. 

8- َAmir Hassani Karbasi, Reza Ebrahimi Atani, "APPLICATION OF DOMINATING SETS IN WIRELESS SENSOR NETWORKS", To Appear in the International Journal of Security and Its Applications.  

9- "A New Fast and Simple Image Encryption Algorithm Using Scan Patterns and XOR", Under reveiw.

10- Seyed Mehrzad Almasi Mousavi, Hamid Reza Naji, Reza Ebrahimi Atani, "Optimization of majority protocol for controlling transactions concurrency in distributed databases by multi-agent systems", International Journal of Applied Operational Research, Vol. 2, No. 4 (2013), pp. 95-109.

11- Ramin Bahrampour, Reza Ebrahimi Atani, "A Novel Key Management Protocol for Wireless Sensor Netwroks Based on PUFs", International Journal of Future Generation Communication and Networking, Vol. 6, No. 2, April, 2013, Pages: 93-106.

12- Amir Hassani Karbasi, Reza Ebrahimi Atani, Shahabaddin Ebrahimi Atani, and Javad Mehri Tekmeh, Key Pre-distribution Based on Projective Plane by Key Copying And Exchanging Using Dominating Sets in Wireless Sensor Networks, Journal of Electronics Industries, Vol. 4, No. 1, (2013), pages 45-54 (Persian).

============================== 2012 =============================

1- Reza Ebrahimi Atani, "The L-total Graph of an L-module", ISRN Discrete Mathematics, Volume 2011 (2011), Pages: 1-10, doi:10.5402/2011/491936.

2- Ali Ahmadian Ramaki, Reza Ebrahimi Atani, "Language Based Security to Apply Computer Security", International Journal on Cryptography and Information Security (IJCIS), Vol.2, No.3, September 2012, Pages: 37-47.

3- R. Asgari, A. Ahmadian Ramaki, Reza Ebrahimi Atani and A. Shahbahrami, "Multi Objective Design Space Exploration for Grid ALU Processor", International Journal of Embedded Systems and Applications (IJESA), Vol.2, No.3, September 2012, Pages: 23-35.

4- Reza Asgari, Reza Ebrahimi Atani, "Anomaly Detection In Databases Based On Ontology Graph", International Journal on Cybernetics & Informatics ( IJCI), Vol. 1(5), 2012, Pages: 1-10.

5- Ali Ahmadian Ramaki, Reza Asgari, Reza Ebrahimi Atani, "Credit Card Fraud Detection Based on Ontology Graph", International Journal of Security, Privacy and Trust Management ( IJSPTM), Vol. 1, No 5, October 2012, Pages: 1-12.

6- Asghar Mokhtari, Mehregan Mahdavi, Reza Ebrahimi Atani, Mahrokh Maghsoudi, "Using Capture Effect in DFSA Anti-collision Protocol in RFID Systems According to ISO18000-6C Standard", Majlesi Journal of Mechatronic Systems Vol. 6, No. 2, June 2012.

7- Zahra Ghane Fashtali, Mahrokh Maghsoudi, Reza Ebrahimi Atani, Mehregan Mahdavi, "0.5-7.5 GHZ Low-Power, Inductorless Current Folded Mixer In 0.18-µM CMOS For Broadband Applications", International Journal of Electrical and Electronics Engineering (IJEEE), Vol. 1, Iss-4, 2012, Pages: 108-112.

8- Somayeh Izadi, Saeed Zahedi, Reza Ebrahimi Atani, “A novel Secure Protocol ,IES, For Mobile Voting”, IOSR Journal of Engineering (IOSRJEN), Vol. 2(8), Pages: 6-11, August 2012.

9- Somayeh Izadi, Reza Ebrahimi Atani, “Mobile Voting (Chance or Challenge)”, IOSR Journal of Engineering (IOSRJEN), Vol. 2(8), PAges: 1-5, August 2012.

10- Somayeh Izadi, Saeed Zahedi, Kamran Morovati, Reza Ebrahimi Atani, Hadi Foroutan Jazi, “Advanced in Mobile Voting”, International Journal of Advanced Research in Computer Science (IJARCS), Vol. 3(5), PP 127 - 131 (2012).

11- Maryam pirouz, Mehregan Mahdavi, Reza Ebrahimi Atani and Maziar Salahi, “Operational Risk Evaluating and Modeling for e-Banking”, International Journal of Advanced Research in Computer Science (IJARCS), Vol. 3, No.3, pp. 1-4, May 2012.

============================== 2011 =============================

1. Shahabaddin Ebrahimi Atani, Reza Ebrahimi Atani, "Graded multiplication modules and the ideal $ heta_{g} (M)$", Turkish Journal of Mathematics, Vol. 35, Issue 1, (2011), Pages: 1-9.

2. Reza Ebrahimi Atani, Shahabaddin Ebrahimi Atani "On DPA-Resistive Implementation of FSR-based Stream Ciphers using WDDL Logic Styles", International Journal on Communications Antenna and Propagation (IRECAP), Vol. 1, No. 1, (2011), Pages: 83-91.

3. Shahriar Mohammadi, Reza Ebrahimi Atani, Hossein Jadidoleslamy, "A Comparison Of Link Layer Attacks On Wireless Sensor Networks", Journal of Information Security, Vol. 2, No. 2, (2011), Pages: 69-84.

4. Shahriar Mohammadi, Reza Ebrahimi Atani, Hossein Jadidoleslamy, "A Comparison of Routing Attacks on Wireless Sensor Networks", International Journal of Information Assurance and Security, Vol. 6, Issue 3, (2011), Pages: 195-215.

5. Saeed Mehmandoust, Reza Ebrahimi Atani, "Application of PUF-enabled RFID Tags In Electronic Banking", to appear in the International Journal of Computer Science & Information Technology, Vol. 3. No. 2, (2011), Pages: 191-202.

6. Reza Ebrahimi Atani, Shahabaddin Ebrahimi Atani, "On primarily multiplication module over pullback ring", to appear in the Algebra and Discrete Mathematics, Vol. 11 (2011) No.1.

7. Farzad Tavakkoli, Reza Ebrahimi Atani, Shahriar Mohammadi, "A Novel Model for Secure Mobile SMS Banking", International Journal of Information Assurance and Security, Vol. 6, Issue 4, (2011), Pages: 369-378.

8- Mehdi Ayat, Reza Ebrahimi Atani, Sattar Mirzakuchaki, "On Design of PUF-Based Random Number Generators", To appear in the International journal of Network Security & Its Applications (2011).

9- Shahabaddin Ebrahimi Atani, Reza Ebrahimi Atani, Unsal Tekir, "A Zariski Topology For Semimodules", To appear in the European Journal Of Pure And Applied Mathematics (2011).

10- Shahabaddin Ebrahimi Atani, Reza Ebrahimi Atani, "On strong QR-ideals of commutative semirings", To appear in the Journal of Advanced Research in Pure Mathematics (JARPM) (2011).

11- Shahabaddin Ebrahimi Atani, Reza Ebrahimi Atani, "A Zariski topology for k-semirings”, To appear in the Quasigroups and Related Systems, 2011.

12- Farzad Tavakkoli, Azam Andalib, Asadollah Shahbahrami, Reza Ebrahimi Atani, "A Comparison of Lightweight Databases in Mobile Systems", Journal of Computing, Volume 3, Issue 7, July 2011, Pages: 147 –152.

13- Reza Ebrahimi Atani, Shahabaddin Ebrahimi Atani "Spectra of semimodules", Buletinul Academiei de Ştiinţe a Republicii Moldova, Matematica, Number 3(67), 2011, Pages 15–28.

14- Sara Salehi Mahboub, Seyed Mohammad Asadinejad, Reza Ebrahimi Atani, "A Novel Secure Smart Student Card Model Case Study: Guilan University", Journal of Computing, VOL. 3, ISSUE 12, Dec 2011, Pages: 108-112.

============================== 2010 =============================

1. Shahabaddin Ebrahimi Atani, Reza Ebrahimi Atani, "Very Strong multiplication ideals and the idea $ heta_{g} (I)$ over a commutative semiring", Glasnik Matematicki, Vol. 45(65), (2010), Pages: 395 – 406.

2. Shahabaddin Ebrahimi Atani, Reza Ebrahimi Atani, "Some Remarks On Partitioning Semirings", Analele Stiintifice ale Universitatii Ovidius Constanta, Seria Matematica, Vol. 18(1), (2010), Pages: 49-62.

3. Reza Ebrahimi Atani, Shahabaddin Ebrahimi Atani "On subsemimodules of semimodules", Buletinul Academiei de Ştiinţe a Republicii Moldova, Matematica, Vol. 63(2), (2010), Pages: 20–30.

4. Reza Ebrahimi Atani, "Prime Subsemimodules of Semimodules", International Journal of Algebra, Vol. 4, No. 26, (2010), Pages: 1299 - 1306.

5. Gholamreza Karimi, Reza Ebrahimi Atani, Abolfazl Taleb Baygi, "A Novel Design Technique to Speed-up the Charge Pump and improve the Stability of PLLs", International Review on Computers and Software (IRECOS), Vol. 5(6), (2010), Pages: 671-679.

============================== 2009 =============================

1. Reza Ebrahimi Atani, Shahabaddin Ebrahimi Atani, "Comultiplication Modules Over a Pullback of Dedekind Domains", Czechoslovak Mathematical Journal, Vol. 59(4), (2009), Pages: 1103-1114.

2. Reza Ebrahimi Atani, Shahabaddin Ebrahimi Atani, "Weak Comultiplication Modules Over a Pullback of Commutative Local Dedekind Domains", Algebra and Discrete Mathematics, No. 1, (2009), Pages: 1 – 13.

============================== 2008 =============================

1. Reza Ebrahimi Atani, Shahabaddin Ebrahimi Atani, "Ideal Theory in Commutative Semirings" Buletinul Academiei de Ştiinţe a Republicii Moldova, Matematica, No. 2(57), (2008) Pages: 14–23.

2. Reza Ebrahimi Atani, Shahabaddin Ebrahimi Atani, Sattar Mirzakuchaki, "Public Key Cryptography using Semi-Group Actions and Semi-Rings", Journal of Discrete Mathematical Sciences and cryptography, Vol. 11(4), (2008), Pages: 427- 445.

3. Reza Ebrahimi Atani, Willi Meier, Sattar Mirzakuchaki, Shahabaddin Ebrahimi Atani "Design and Implementation of DPA Resistive Grain-128 Stream Cipher Based on SABL Logic", International Journal of Computers, Communications and Control Vol. 3 (suppl. issue), (2008) Pages: 293-298.

4. Reza Ebrahimi Atani, Sattar Mirzakuchaki, Shahabaddin Ebrahimi Atani, Willi Meier "On DPA-Resistive Implementation of FSR-based Stream Ciphers using SABL Logic Styles", International Journal of Computers, Communications and Control (IJCCC), Vol 3(4), (2008) Pages: 324-335.

5. Reza Ebrahimi Atani, Sattar Mirzakuchaki, Shahabaddin Ebrahimi Atani "Design and Implementation of an Image CoProcessor", Advances in Image and Signal Processing, Lecture Note in Computer Science Vol. 5099, Springer, (2008), Pages: 498 - 507.

6. Reza Ebrahimi Atani, Shahabaddin Ebrahimi Atani, "A Note On Uniformly Primary Submodules" Novi Sad Journal of Mathematics (NSJOM), Vol. 38(2), (2008) Pages: 83-89.

7. Reza Ebrahimi Atani, Shahabaddin Ebrahimi Atani, "Secondary representation of semimodules over a commutative semiring", Quasigroups and related systems, Issue 16, (2008), Pages: 133-140.

==============================   2007  =============================

1. Reza Ebrahimi Atani, Shahabaddin Ebrahimi Atani, Sattar Mirzakuchaki "Public key cryptography based on semi modules over quotient semi rings", International Mathematical Forum, No. 52, (2007) Pages: 2561–2570.

2. Babak Zamanlooy, Vahid Vaghef, Sattar Mirzakuchaki, Ali Bakhtiari, and Reza Ebrahimi Atani,"A Real Time Infrared Imaging System Based on DSP and FPGA ", Advances in Image and Video Technology, Lecture Note in Computer Science Vol. 4872, Springer (2007) Pages: 16-23.

 

 

 Conference papers:

 

============================== 2012 =============================

1- Mehran Pourvahab, Reza Ebrahimi Atani, Laleh Boroumand, "SPKT: Secure Port Knock-Tunneling, an Enhanced Port Security Authentication Mechanism", IEEE Symposium on Computers & Informatics (ISCI 2012), 18 - 20 March 2012, Penang, Malaysia.

2- Nima Karimpour, Reza Ebrahimi Atani, Erfan Aghaei, Ahmad Tahmasivand, Mahsa Rahmani, Mina Moazzam, "CIARP: Crypto Instruction-Aware RISC Processor ", IEEE Symposium on Computers & Informatics (ISCI 2012), 18 - 20 March 2012, Penang, Malaysia.

3- Morteza Daneshkar, Reza Ebrahimi Atani," A Novel Initialization Approach for Solving Permutation Ambiguity of Frequency Domain Blind Source Separation", IEEE Symposium on Computers & Informatics (ISCI 2012), 18 - 20 March 2012, Penang, Malaysia.

4- Reza Moradi Rad, Abdolrahman Attar, Reza Ebrahimi Atani,"A Robust Face Recognition Method Using Edge-Based Features", IEEE Symposium on Computers & Informatics (ISCI 2012), 18 - 20 March 2012, Penang, Malaysia.

5- Anahita Azimi, Mahrokh Maghsoodi, Reza Ebrahimi Atani,"A High Gain UWB common Gate Low-Noise Amplifier", International Confernce on Electronics and Communication Engineering (ICECE - 2012), 17 March 2012, Chandigarh, India.

6- Ali Ahmadian Ramaki, Reza Asgari, Reza Ebrahimi Atani, "Ontology-Based Credit Card Fraud Detection", National Congress on Electrical, Computer and Information Technology Engineering, Khayyam Higher Education Institute, Mashhad, Iran, September 15-17, 2012.

7- Mehran Pourvahab, Reza Ebrahimi Atani, Milad Shavandasht, "Port-Knocking with the usage of Web, Internet control message protocol and Tunneling (PWIT)", 6th National Conference Iran"s Scientific Society on Command, Control, Communications, Computer and Inteligence (C4I), Nov. 2012, Shahid Beheshti University, Tehran.

8- Ali Ahmadian Ramaki, Shahin Shirmohammadzadeh Sahraeii and Reza Ebrahimi Atani, "Security Enforcement with Language-Based Security",  Third International Conference on Contemporary Issues in Computer and Information Sciences (CICIS 2012), Pages: 26-29.

9- Reza Ebrahimi Atani, Nima Karimpour Darav, Saeedeh Arabani Mostaghim, "A Statistical Test Suite for Windows to Cryptography Purposes", Third International Conference on Contemporary Issues in Computer and Information Sciences (CICIS 2012), Pages: 109-113.

10- Seyed Mehrzad Almasi, Hamid Reza Naji, Reza Ebrahimi Atani, Use of multi-agent system approach for concurrency control of transactions in distributed databases", Third International Conference on Contemporary Issues in Computer and Information Sciences (CICIS 2012), Pages: 426-429. 

 11- Zahra ghane, Mahrokh Maghsoodi, Reza Ebrahimi Atani, Mehrgan Mahdavi, "A 1-V, 1.3-mW Mixer for MB-OFDM UWB Receivers by 0.18-µm CMOS Technology", The Sixth International Symposium on Telecommunications (IST"2012), November 6-8, 2012, Tehran, Iran.

============================== 2011 =============================

1- Hadi Samiee, Reza Ebrahimi Atani, Hamidreza Amindavar, "A Novel Area-Throughput Optimized Architecture for the AES Algorithm", To appear in the IEEE International Conference on Electronic Devices, Systems & Applications (ICEDSA 2011), 25 - 27 April 2011, Kuala Lumpur, Malaysia.

2- Farzad Tavakkoli, Azam Andalib, Somayyeh soufi, Reza Ebrahimi Atani, "The role of Open Source and open standard in E-Learning", International Conference on e-Learning and Knolwedge Management Technology (ICEKMT 2011), Kuala Lumpur, Malaysia on 8th - 9th July , 2011.

3- Reza Moradi Rad, Abdolrahman Attar, Reza Ebrahimi Atani, "Image Spam Issue : Tricks and Detection Techniques", International Conference on e-Learning and Knolwedge Management Technology (ICEKMT 2011), Kuala Lumpur, Malaysia on 8th - 9th July , 2011. 

4- Reza Asgari, Milad Gholipoor, Shahin Sahraei, Reza Ebrahimi Atani, "An Approach To Ontologies Alignment Based Upon Pareto Front", 5th International Computer and Instructional Technologies Symposium, 22-24 September  2011, Elazig, Turkey.

5- Morteza Elmi Maryan, Maryam Habibi, Reza Ebrahimi Atani, Asadollah Shahbahrami, "Application of Barcode Tattoo in Security Systems", 5th International Computer and Instructional Technologies Symposium, 22-24 September 2011, Elazig, Turkey.

6- Maryam Pirouz, Mehregan Mahdavi, Reza Ebrahimi Atani, Maziar Salahi, "Operational Risk Evaluating and Modeling for E-Banking", 5th International Computer and Instructional Technologies Symposium, 22-24 September 2011, Elazig, Turkey.

7- Hadi Sharifi, Reza Ebrahimi Atani, "A Review on Cryptanalysis and Attacks against PRINTCipher" First CSUT Conference on Computer, Communication and Information Technologies, 16-17 Nov. 2011, Tabriz, Iran.

============================== 2010 =============================

1. Sakineh Aghighi, Reza Ebrahimi Atani "Averaged Value Analysis of 24-Pulse Rectifiers for Aerospace Applications", International Conference on Electronic Devices, Systems & Applications (ICEDSA2010), 11 - 13 April 2010, Kuala Lumpur, Malaysia, Pages: 212 – 217.

2. Mehdi Ayat, Behnam Babaei, Reza Ebrahimi Atani, Babak Zamanlooy, Sattar Mirzakuchaki, "Design of A 100 MHz - 1.66 GHz, 0.13um CMOS Phase Locked Loop", International Conference on Electronic Devices, Systems & Applications (ICEDSA2010), 11 - 13 April 2010, Kuala Lumpur, Malaysia, Pages 154-158.

3. Mehdi Ayat, Reza Ebrahimi Atani, Sattar Mirzakuchaki, Yadollah Zamanidoost, "Design and Simulation of a CMOS DLL-Based Frequency Multiplier", IEEE International Symposium on Industrial Electronics and Applications, ISIEA 2010, Penang, Malaysia, 3 – 5 October 2010, Page(s): 450-455.

4. Yadollah Zamanidoost, Sattar Mirzakuchaki, Reza Ebrahimi Atani, Zhinoos Razavi Hesabi, Mehdi Ayat, "A Novel 3D Wavelet-Based Method for Blind Digital Video Watermarking", IEEE International Symposium on Industrial Electronics and Applications, ISIEA 2010, Penang, Malaysia, 3 – 5 October 2010, Page(s): 186 - 189.

5. Seyed Mohammad Seyedzade, Reza Ebrahimi Atani, Sattar Mirzakuchaki, "A Novel Image Encryption Algorithm Based on Hash Functions", To appear in the proceeding of the 6th Iranian Conference on Machine Vision and Image Processing (MVIP 2010), October. 2010, Isfahan, Iran.

6. Mehdi Ayat, Reza Ebrahimi Atani, Sattar Mirzakuchaki, "On Design of Differential Voltage Controlled Oscillators with Single Ended Control Line", IEEE International Conference on Computer Applications & Industrial Electronics, ICCAIE 2010, Kuala Lumpur, Malaysia, 5 - 7 December 2010, Pages: 397-402.

============================== 2009 =============================

1. Reza Ebrahimi Atani, Sattar Mirzakuchaki, Shahabaddin Ebrahimi Atani "Design and simulation of A DPA Resistive Circuit for Trivium Stream Cipher Based on WDDL logic Styles", ICMSAO"09, Jan. 20-22 2009 , Sharjah, U.A.I..

2. Reza Ebrahimi Atani, Sattar Mirzakuchaki, Shahabaddin Ebrahimi Atani "Design and Simulation of a DPA Resistive Circuit for Trivium Stream Cipher Based on SABL Logic Styles", ICMSAO"09, Jan. 20-22 2009 , Sharjah, U.A.I..

3. Sakineh Aghighi, Alfred Baghramian, Reza Ebrahimi Atani "Averaged Value Analysis of 18-Pulse Rectifiers for Aerospace Applications", IEEE International Symposium on Industrial Electronics (ISIE 2009), July 5 - 8, 2009, Seoul, Korea. Pages: 1498 - 1503.

4. Reza Ebrahimi Atani, Sattar Mirzakuchaki, Shahabaddin Ebrahimi Atani "Low Cost Implementation of Pomaranch S-Boxs", WirelessVITAE"09, May 17-20, 2009, Aalborg, Denmark, Pages: 875 – 879.

5. Reza Ebrahimi Atani, Sattar Mirzakuchaki, Shahabaddin Ebrahimi Atani "Alamout: A new Synchronous stream cipher with Authentication", WirelessVITAE"09, May 17-20, 2009, Aalborg, Denmark, Pages: 886 – 890.

6. Mohamadamin Amiri, Mojdeh Mahdavi, Reza Ebrahimi Atani, Sattar Mirzakuchaki "QCA Implementation of Serpent Block Cipher", Advances in Circuits, Electronics and Micro-electronics (CENICS "09), October 11-16, 2009 - Sliema, Malta. Pages 16 – 19.

============================== 2008 =============================

1. Reza Ebrahimi Atani, Mehdi Baboli, and Sattar Mirzakuchaki, "Analysis and Implementation of WiMAX security system ", EHAC 2008, February 20-22, 2008, Cambridge, UK, Pages Pages: 107-110.

2. Reza Ebrahimi Atani, Mehdi Baboli, Sattar Mirzakuchaki, Shahabaddin Ebrahimi Atani, and Babak Zamanlooy,"Design and Implementation of a 118 MHz 2D DCT Processor", IEEE International Symposium on Industrial Electronics (ISIE 2008), 30 June-2 July, 2008, Cambridge, UK, Pages: 1076 – 1081.

3. Babak Zamanlooy, Hamidreza Chamani Takaldani, Amir Moosavienia, Khalil Monfaredi and Reza Ebrahimi Atani "Design and Implementation of a Stable Platform Digital Controller Based on DSP", International Conference on Signals and Electronic Systems, (ICSES "08), (2008), Krakow, Poland, Pages: 453 – 456.

4. Reza Ebrahimi Atani, Sattar Mirzakuchaki, Shahabaddin Ebrahimi Atani, Willi Meier "Design and Simulation of a DPA Resistive Circuit for Trivium Stream Cipher Based on SABL Logic Styles", 15th International Conference on Mixed Design of Integrated Circuits and Systems (MIXDES 2008), Poznan, 19-21 June 2008, Pages 203 - 208.

  ============================== 2007 =============================

1. Mohammadamin Amiri, Reza Ebrahimi Atani, Sattar Mirzakuchaki, and Mojdeh Mahdavi " Design and Implementation of A 50MHZ DXT Coprocessor " 10th Euromicro Conference on Digital System Design Architectures, Methods and Tools (DSD 2007), August 29 - 31, Lubeck - Germany, 2007, Pages: 43-50.

2. Reza Ebrahimi Atani, Sattar Mirzakuchaki, Farshid Sanii Anlashi, and Mohammadreza Nasrollahzadeh, "Design and Implementation of a 157 MHz DA-Based DXT CoProcessor", IEEEGCC 2007, Manamma, Bahrain, 11-14 November 2007.

3. Farshid Samii Amlashi, Adib Abrishamifar, and Reza Ebrahimi Atani, "Jitter Peaking Investigation in Charge Pump Based Clock and Data Recovery Circuits", Africon 2007, 26 - 28 September 2007, Namibia, Pages: 1 – 6.

 

Technical reports:

1- Reza Ebrahimi Atani, Shahabaddin Ebrahimi Atani, Sattar Mirzakuchaki "A Novel Public Key Crypto System Based on Semi-modules over Quotient Semi-rings", eprint Archive, http://eprint.iacr.org/2007/391.

 

Membership in the Editorial Board of International Journals

► Research and Communications in Mathematics and Mathematical Sciences

► Current Advances in Information Security (CAIS)

► International Journal on Cryptography and Information Security (IJCIS)

► International Journal in Foundations of Computer Science & Technology (IJFCST)

► International Journal on Bioinformatics & Biosciences (IJBB)

► International Journal on Organic Electronics (IJOE)

► International Journal of Programming Languages and Applications ( IJPLA)

► International Journal of Advanced Information Technology (IJAIT)

International Program Committee

► 4th International Conference on Computer and Knowledge Engineering (ICCKE 2014) October 29-30, 2014 - Ferdowsi University of Mashhad.

► The 11th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC 2013), University of Tehran, September 12-13, 2014, Tehran, Iran.

► The 2014 International Conference on Computer Science and Service System (CSSS 2014), June 13th-15th, 2014, Bangkok, Thailand.

► GS International Multi-Conference on Science and Technology 2014, (GS-MICST 14), November 07-09 ,2014, Dubai, United Arab Emirates (UAE)

► The Fourth International Conference on Peer-to-Peer Networks and Trust Management (P2PTM-2014), July 26 - 27, 2014, Chennai, India.

► International workshop on Foundations of Computer Science & Technology (CST-2014), Zurich, Switzerland, January 2- 4, 2014.

► Second International Conference on Advanced Information Technologies and Applications (ICAITA-2013), Nov. 2-3 2013, Dubai, U.A.E.

► International workshop on Information Theory (WIT-2013), 7-9 June 2013 Turkey.

► The Second International workshop on Cryptography and Information Security (CRYPIS-2013), June 07 - 09, 2013, Konya,Turkey.

► The first International Conference on Computational Science and Engineering (CSE 2013), May 18-19 2013 , Dubai, UAE.

► The 10th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC 2013), Yazd University, September 14-15 2013, Yazd, Iran.

► The 9th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC 2012), Tabriz University, September 14-15 2012, Tabriz, Iran. 

► International Conference on Advanced Information Technologies and Applications (ICAITA-2012), 28-29 Dec. Dubai, UAE.

► International Workshop on Education Engineering and Economics(IW3E 2011), Zhengzhou, China Aug 8-10th, 2011.

► The Second International Conference on Computer Science, Engineering and Applications (ICCSEA 2012), May 25–27, 2012, New Delhi, India.

► International workshop on Foundations of Computer Science & Technology (CST-2013), February 18 - 20, 2013, Bangalore, India

► International Conference on Foundations of Computer Science & Technology (FCST-2012), 14-15 July, Chennai, India.

► Interdisciplinary Conference on Art, Language & Technology (ICALT2012), Mashhad, Iran.

► The 9th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC 2012), University of Tabriz, September 14-15, 2012, Tabriz, Iran. http://iscisc12.tabrizu.ac.ir

► 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC 2011), Aug. 8-10, 2011, Zhenhzhou, China. http://www.aimsec.org

► International workshop on Cryptography and Information Security (CRYPIS-2012), October 26~28, 2012, Venue : Avinashilingam University, Coimbatore, India.

► The Second International Conference on Computational Science, Engineering and Information Technology (CCSEIT-2012), Venue: Avinashilingam University, October 26~28, Coimbatore, India.

► International workshop on Signal Image Processing and Multimedia (SIPM-2012), 14-15 July, Chennai, India.

► First International Conference on Signal, Image Processing and Pattern Recognition (SPPR 2012), http://coneco2009.com/sppr2013/index.html, May 24-26, Delhi, India.

► The International Conference on e-Learning and Knolwedge Management Technology ( ICEKMT 2011 ), July. 8-9, 2011, Kuala Lumpur, Malaysia. http://www.icekm.com/index.php

► First International Conference on Signal, Image Processing and Pattern Recognition (SPPR 2012), http://coneco2009.com/sppr2011/index.html .

► 2nd International Conference on Management Science and Artificial Intelligence (MSAI 2011), Aug. 8-10, 2011, DengFeng, China.  http://www.msaiconf.org

► The 8th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC 2011), Ferdowsi University of Mashhad, September 14-15 2011, Mashhad, Iran. http://iscisc2011.um.ac.ir 

► 3rd National Conference on Computer Engineering and Information Engineering (CEIT 2011), 17 Febuary, 2011, Hamedan, Iran. http://ceit2011.hscs.ir/

 Refereeing Activities:

► Reviewer of Zentralblatt MATH.

► Reviewer of the American Mathematical Reviews.

Journal refereeing:

► IEEE Transactions on Circuits and Systems for Video Technology

► IET Information Security

► Analele Stiintifice ale Universitatii Ovidius Constanta, Seria Matematica

► Journal of Systems and Software

► Security and Communication Networks

► International Journal on Cryptography and Information Security - IJCIS

► International Journal in Foundations of Computer Science & Technology - IJFCST

► International Journal on Bioinformatics & Biosciences - IJBB

► International Journal on Organic Electronics- IJOE

► International Journal of Programming Languages and Applications- IJPLA

► International Journal of Advanced Information Technology - IJAIT

► International Journal of Network Security

► Journal of Nature Science and Sustainable Technology

► Journal of Technical-Engineering, Islamic Azad University – Mashhad Branch

► Biannual journal, Signal and Data Processing

► Italian Journal of Pure and Applied Mathematics.

Conference refereeing:

• IEEE 69th Vehicular Technology Conference, (VTC2009 - Fall)

• IEEE International Conference on Electronic Devices, Systems & Applications, (ICEDSA 2010)

• IEEE Symposium on Industrial Electronics & Applications, (ISIEA 2010)

• IEEE International Conference on Computer Applications & Industrial Electronics, (ICCAIE 2010)

• IEEE International Conference on Scientific & Social Science Research, (CSSR 2010)

• IEEE International Conference on Open Systems, (ICOS 2010)

• 36th Annual Conference of the IEEE Industrial Electronics Society, (IECON 2010)

• 7th International ISC Conference on Information Security and Cryptology (ISCISC 2010)

• IEEE Applied Power Electronics Colloquium (IEEE-IAPEC 2011)

• IEEE International Symposium on Computers & Informatics, (ISCI 2011)

• IEEE International Symposium on Humanities, Science and Engineering (SHUSER 2011)

• IEEE International Conference on Business, Engineering and Industrial Applications (ICBEIA 2011)

• IEEE International Conference on Signal & Image Processing Applications (ICSIPA 2011)

• National Conference On information And Communication Security, (CICS 2010)

• 3rd National Conference on Computer Engineering and Information Engineering (CEIT 2011)

• The International Conference on Informatics Engineering & Information Science (ICIEIS2011)

• The International Conference on Digital Information & Communication Technology & its Applications (DICTAP 2011)

• The International Conference on Digital Information Processing & Communications (ICDIPC 2011)

• The International Conference on Electronic Technologies & Digital Computing (ETDC2011)

• The First International Conference on e-Technologies and Networks for Development (ICeND2011)

• The International Conference on Digital Enterprise and Information Systems (DEIS 2011)

• The 2nd International Conference on Software Engineering and Computer Systems (ICSECS 2011)

• The 19th Iranian Conference on Electrical Engineering (ICEE 2011)

• The Fourth International Conference on Network Security & Applications (CNSA-2011)

• The Third International conference on Networks & Communications (NeCoM-2011)

• The Third International Conference on Web & Semantic Technology (WesT-2011)

• IEEE International Conference on Open Systems, (ICOS 2011)

• The Third International Conference on Wireless & Mobile Networks (WiMoN-2011)

• The Seventh Advanced International Conference on Telecommunications (AICT-2011)

• International Symposium on Business, Engineering and Industrial Applications (ISBEIA2011)

• IEEE International Conference on Electronic Devices, Systems & Applications, ICEDSA 2011

• IEEE Symposium on Industrial Electronics & Applications, (ISIEA 2011)

• IEEE International Conference on Computer Applications & Industrial Electronics, (ICCAIE 2011)

• 2011 IEEE Symposium on Wireless Technology Applications (ISWTA 2011)

• 2011 IEEE Colloquium on Humanities, Science and Engineering Research (CHUSER 2011)

• 2011 IEEE Student Conference on Research and Developments (SCOReD 2011)

• First International Conference on Signal, Image Processing and Pattern Recognition (SPPR 2012)

• The First International workshop on Signal and Image Processing (SIP 2012)

• Second International Conference on Computer Science, Engineering and Applications (ICCSEA 2012)

• IEEE Applied Power Electronics Colloquium (IAPEC 2012)

• IEEE Business Engineering and Industrial Applications Colloquium 2012 (BEIAC 2012)

• 2012 IEEE Symposium on Humanities, Science and Engineering Research (SHUSER 2012)

• 2012 IEEE Symposium on Computers & Informatics (ISCI 2012)

• 2012 IEEE Symposium on Wireless Technology & Applications (ISWTA 2012)

• Second International Conference on Advances in Computing and Information technology (ACITY 2012)

• 2012 IEEE Asia-Pacific Conference on Applied Electromagnetics (APACE2012)

• The 20th Iranian Conference on Electrical Engineering (ICEE 2012)

• IEEE International Conference on Open Systems, (ICOS 2012)

• The 4th Conference on Information and Knowledge Technology (IKT 2012)

• 3rd International Conference on Engineering Industry, ICEI2012, Dec. 3 - 5, 2012, Seoul, Korea.

• 1st IEEE International Conference on Computer Systems and Industrial Informatics (ICCSII"12)

 

Membership:

IACR : International Association for Cryptologic Research 2007 - 2014.

IEEE : Institute of Electrical and Electronics Engineers, Inc. 2007 - 2014.

IEEE : Communications Society 2008 - 2011.

ISC  : Iranian Society of Cryptology 2007 - 2014.

MVIP: The Iranian Machine Vision and Image Processing 2011-2014.

IECA: Iranian E-Commerce Scientific Association 2011-2014.

 

 

Advisory for Post Graduate Programs:

 

Current Ph.D. Students:

Amir Hassani Karbasi, "Lattice Based Cryptography", Computer Science, 2013.

Former Graduate Students:

1- Ali Ahmadian Ramaki, "Alert Correlation in Early Warning System", Software Engineering, University of Guilan, 2014.

2- Reza Asgari, "Efficiency and security analysis of smart card operating systems", Software Engineering, University of Guilan, 2014.

3- Asghar Tavakkoli, "Performance Improvement of Anonymity Communication Protocols Based on Mix-Nets", Software Engineering, University of Guilan, 2014.

4- Ebrahim Zohari, "Security and performance analysis of TinyOS operating system applicable in wireless sensor networks", Software Engineering, University of Guilan, 2014.

5- Ali Moradi, "XML Documents Clustering for knowleage Discovery", Software Engineering, University of Guilan, 2014.

6- Hassan Farzaneh, "Improving quality of Test Input Data in Mutation Testing", Software Engineering, University of Guilan, 2014.

7- Parinaz Mobedi, "Providing a Semi-Automatic Model for Web Services Composition", Software Engineering, University of Guilan, 2014.

8- Amir Molaei, "Query Optimization in Cloud Computing", Software Engineering, University of Guilan, 2014.

9- Hossein Pourasadi, "Security Analysis Of Electronic Payment Protocols Using Data Mining"و Information Technology, E-Commerce, University of Guilan, 2014.

10- Seyed Hashem Mirbahari, "Detecting Insider Attacks in Relational Databases of Organizations", Information Technology - E-Commerce, University of Guilan, 2012.

11- Taha Yasin Rezapour, "Key Management Protocols in Heterogeneous Wireless Sensor Networks", Information Technology - E-Commerce, Guilan University, (Jointly with Prof. Salmasizadeh - Sharif University of Technology), 2013.

12- Mir Soheil Abolghasemi, "Design of a novel electronic payment protocol using location based cryptography", Information Technology - E-Commerce, University of Guilan, 2013.

13- Mehdi Mokarrami, "َApplication of Data Mining Techniques in Intrusion Detection Systems", Information Technology - E-Commerce, Guilan University, 2013.

14- Hamed Vasmaghi, "Evaluation of Electronic Readiness in UAST", Information Technology - E-Commerce, Guilan University, 2012.

15- Meisam Shabanpour, "Application of Recommender systems on disease recognition and treatment", Information Technology - E-Commerce, Guilan University, 2012.

16- Elham Sheikhloo, "Designing of a secure E-payment protocol for mobile wallet", Information Technology - E-Commerce, Guilan University, 2013.

17- Mona Pourghasem, "Customer relationship and bank security model, using a public key infrastructure for cellular networks", Information Technology - E-Commerce, Guilan University, 2013.

18- Gilandokht Mofaser Bagheri, "Design of a Novel Signature scheme for delegation of signing rights for electronic cheques", Information Technology - E-Commerce, Guilan University, 2013.

19- Somayeh Izadi, "Deisgn A New Secure Protocol For Mobile Voting", Information Technology - E-Commerce, University of Guilan, 2012.

20- Saeed Zadehi, "Trusted computing techniques in electronic voting systems", Information Technology - E-Commerce, University of Guilan, 2012.

21- Ramin Bahrampour, "Countermeasures against Node Capturing Attacks on Wireless Sensor Networks", Information Technology - E-Commerce, University of Guilan, 2013.

22- Sina Gholmohammadi, "Designing a Secure Protocol for Mobile Language Learning", Information Technology - E-Commerce, University of Guilan, 2012.

23- Leila Azari, "EvaInvestinating and offering Possible IT Solution in bupdating Data Transmission networks in Oil & Gas", Information Technology - E-Commerce, University of Guilan, 2013.

24- Mostafa Ayoubi, "A New Secure Model for Mobile Payment through GPRS", Information Technology - E-Commerce, University of Guilan, 2012.

25- Mojtaba Ayoubi, "Security Analysis of Mobile Payment Protocols based on WAP", Information Technology - E-Commerce, University of Guilan, 2012.

26- Morteza Delkhosh, "Providing an Effective Model for Micropayments via Mobile Devices", Information Technology - E-Commerce, Guilan University, 2013.

27- Asgar Mokhtari, "Improving Security of Data communication in RFID Systems", Electronics Engineering, University of Guilan, 2012.

28- Payam Ghasemi Afshar, "Design of a High Conversion Gain and Low Noise Figure Mixer for WiMAX Systems", Electronics Engineering, University of Guilan, 2012.

29- Amir Hassani Karbasi, "Key Pre-distribution for Wireless Sensor Networks based on Combinatorial Schemes", Information Technology, Computer Networks, University of Guilan, 2013.

30- Azam Toushekhah, "Design of an Efficient Low Power Routing Protocol for Wireless Sensor Networks", Information Technology, Computer Networks, University of Guilan, 2013. 

31- Hero Isavi, "Information Security Related Operational Risk Management Of Modern Banking Systems", MBA, University of Guilan, 2012.

32- Aida Ghorbani, "Security Analysis of Anonymous Communications in Mix-Network, based on Onion Routing", Information Technology, Computer Networks, University of Guilan, 2013.

33- Neda Solari, "Evaluation and improvement of scalable key pre-distribution for wireless sensor networks", Information Technology, Computer Networks, University of Guilan, 2013.

34- Nazanin Ghasempour, "Application of Recommender systems In Music websites", Software Engineering, Zanjan Islamic Azad University, Jointly with Dr. Mehregan Mahdavi (University of Guilan), 2012.

35- Abosaleh Mohammad Sharifi, "Design and Implementation of a Security Model to Prevent DDoS Attacks on Web Servers", Information Technology - E-Commerce, University of Guilan, 2012.

36- Mostafa Rahmanpour, "Information Technology Contingency Plan in Shipbuilding", Information Technology - E-Commerce, University of Guilan, 2012.

37- Reza Kazemi, "The effect of the key success factors of knowledge management to organization innovation and organizational learning (Case Study: Gilan province education office", Information Technology - E-Commerce, University of Guilan, 2013.

38- Faraz Ghasempour, "Designing a Security Model for Food Industries", Information Technology - E-Commerce, University of Guilan, 2012.

39- Mohammad Nezadeh, "َA Novel Security Model for Electronic Health System In Guilan Province", Information Technology - E-Commerce, University of Guilan, 2012.

40- Ali Deghati, "Design a Model for Car Identification using RFID Technology", Information Technology - E-Commerce, University of Guilan, 2012.

41- Saeed Mehmandoust, "Design of a Co-processor for Token Based Biometric Authentication"Information Technology - E-Commerce, University of Guilan, 2012.

42- Samaneh Sorournejad, "Credit Card fraud detection using Artificial Immune system", Information Technology - E-Commerce, University of Guilan, 2012.

45- Farzad Tavakkoli, "Designing a model for secure SMS banking", Information Technology - E-Commerce, University of Guilan, 2012.

46- Fatemeh Asadi, "The layered design methodology to improve the performance of wireless networks", Information Technology, Computer Networks, University of Guilan, 2013.

47- Vahid Deilami, "Feasibility study and evaluation of IT infrastructure of an Electronic Port", Information Technology - E-Commerce, University of Guilan, 2012.

48- Faezeh Mahmoudi, "Study the trend of next generation network development and proposing the possible migration solutions" , Information Technology, Computer Networks, University of Guilan, 2013.

49- Hengameh Rajab Pour Nikoo, "Dynamic quiz generation in e-learning system",  Information Technology - E-Commerce, University of Guilan, 2013.

50- Saman Tahouri, "A Novel Secure and Fast Framework for Forest Fire Detection based on Wireless Sensor Networks", Information Technology, Computer Networks, University of Guilan, 2013.

51- Marziyeh Hedayat Panah, "A Novel Virtual Classroom Model for the University of Guilans Learning Management System" , Information Technology - E-Commerce, University of Guilan, 2013.

52- Hamideh Khodashenas, "Measuring the Readiness of Payame Nour University of Guilan for E-learning" , Information Technology - E-Commerce, University of Guilan, 2013.

53- Alireza Naghizadeh, "Security and Privacy in Scalable P2P Netwroks", Information Technology, Computer Networks, University of Guilan, 2013.

54- Azin Mohammadi, "Designing a Travel Recommender System" , Information Technology - E-Commerce, University of Guilan, 2013.

55- Kamal Bazargan, "Investigation of Ad-Hoc Networks Routing Protocols in Safe and Unsafe Environment", Information Technology, Computer Networks, University of Guilan, 2013.

56- Zahid Ansari, "The Legal and Applicational Aspects of Electronic Banking at Bank Saderat Iran", University of Guilan, 2012.

57- Zahra Jahambin, "Trust Evaluation of Electronic Resources on the Web" , Information Technology - E-Commerce, University of Guilan, 2013.

58- Vahed Mohammadi, "Privacy preserving security challenges of cloud computing in Electronic Commerce applications" , Information Technology - E-Commerce, University of Guilan, 2013.

59- Mohsen Tavaghoei, "Design of the IT Master Plan of the Centeral Fishery office of the Guilan"Information Technology - E-Commerce, University of Guilan, 2013.

60- Matin Mohammadi, "Security Analysis of Operating Systems of JAva Cards", Computer Science, Azad University of Sari, 2014.

61- Nasibeh Abin, "A Novel and Secure Electronic payment based on SMS", Software Engineering, Azad University of Zanjan, 2012.

62- Hossein Jadidoleslami, "High-Level Design of Dynamically Reconfigurable Intrusion Detection System for Wireless Sensor Networks Based on Agent and Policy" , Information Technology - E-Commerce,  (University of Guilan), 2011.

63- Somayeh Mirzaei Alamouti, "Hardware Trojan Detection Techniques on FPGA Based Crypto Processors", Electronics Engineering, University of Guilan, 2012.

64- Sara Salehi Mahboub, "Design of a Smart Student Card for university of Guilan", Information Technology - E



► Computer Networks (Graduate Course)

► Computer and Communication Networks Managment Systems (Graduate Course)

► e-Commerce Security (Graduate Course)

► Software Fault Tolerance (Graduate Course)

► Network Security (Graduate Course)

► Internet Engineering

► Computer Networks

► Seminar

Course Taught so far:

Graduate Courses:

Electronic Banking

VLSI Design

e-Commerce Security

e-Payment systems

Advance Computer Networks

Software Fault Tolerance

Software Fault Tolerance

Advance Cryptography

Computer and Communication Networks Managment Systems

Network Security

Network Processor

Bachelor Courses:

VLSI, Discrete Structures, Computer Networks, Internet Engineering, Digital Electronics, Digital Design, Microelectronic Circuits, Electronics I, Electronic II, Signals & Systems, Electrical Circuits I, Microelectronic Labroratory, Electronic Laboratory I, Electronic Laboratory II, Electronic Laboratory III, Microprocessor Laboratory (AVR, 8051), FPGA Laboratory

 



Second semester of 2013/2014
Day / Time 8 - 10 10 - 12 12 - 13 14 - 16 16 - 18 18 - 20
Sat Computer Networks Internet Engineering E-Learning Office Network Security Ecommerce Security Research
Sun Computer Networks Internet Engineering Computer Group Meeting E-Learning Office E-Learning Office E-Learning Office
Mon E-Learning Office Advance Computer Networks E-Learning Office E-Learning Office E-Learning Office E-Learning Office
Tue Advance Computer Networks e-Commerce Security E-Learning Office E-Learning Office E-Learning Office E-Learning Office
Wed E-Learning Office E-Learning Office E-Learning Office E-Learning Office E-Learning Office E-Learning Office


Personal Webpage2
Iranian Society of Cryptology
IEEE Security Call for Papers
19th Iranian Conference on Electrical Engineering
The 2nd International Conference on Management Science and Artificial Intelligence (MSAI)
Guilan Crypto Student Group
Parsiab Search Engine
Typeline: A Green Datatype Processor
SoftSec 2014
CAESAR: Competition for Authenticated Encryption: Security, Applicability, and Robustness
Journal Citation Reports (Impact factors as of 2013)




contact Dr. Reza Ebrahimi Atani
rebrahimi@guilan.ac.ir, reza.ebrahimi.atani@gmail.com
+98-131-6690274-8 (3017)
Department of Computer Engineering, Faculty of Engineering, University of Guilan, Rasht, Iran
Office: Electronic Corridor, Room E5
P.O. Box: 41635-3756
Postal Code: 41996-13769
Email: rebrahimi@guilan.ac.ir, reza.ebrahimi.atani@gmail.com   Login