Ehsan Toreini
Title
Cited by
Cited by
Year
On the privacy of private browsing–a forensic approach
K Satvat, M Forshaw, F Hao, E Toreini
Data Privacy Management and Autonomous Spontaneous Security, 380-389, 2013
472013
Stealing PINs via mobile sensors: actual risk versus user perception
M Mehrnezhad, E Toreini, SF Shahandashti, F Hao
International Journal of Information Security 17 (3), 291-313, 2018
432018
Touchsignatures: identification of user touch actions and pins based on mobile sensor data via javascript
M Mehrnezhad, E Toreini, SF Shahandashti, F Hao
Journal of Information Security and Applications 26, 23-38, 2016
352016
Texture to the rescue: Practical paper fingerprinting based on texture patterns
E Toreini, SF Shahandashti, F Hao
ACM Transactions on Privacy and Security (TOPS) 20 (3), 1-29, 2017
112017
Multiple seimcha: multiple semantic image captcha
M Mehrnejad, AG Bafghi, A Harati, E Toreini
2011 International Conference for Internet Technology and Secured …, 2011
10*2011
SEIMCHA: A New Semantic Image CAPTCHA Using Geometric Transformations.
M Mehrnejad, AG Bafghi, A Harati, E Toreini
ISeCure 4 (1), 2012
92012
A novel fuzzy metric to evaluate clusters for prolonging lifetime in wireless sensor networks
P Neamatollahi, H Taheri, E Toreini, M Naghibzadeh, MH Yaghmaee
2011 International Symposium on Artificial Intelligence and Signal …, 2011
92011
Touchsignatures: Identification of user touch actions based on mobile sensors via javascript
M Mehrnezhad, E Toreini, SF Shahandashti, F Hao
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
82015
Clustering data with Particle Swarm Optimization using a new fitness
E Toreini, M Mehrnejad
2011 3rd Conference on Data Mining and Optimization (DMO), 266-270, 2011
72011
Security analyzing and designing GUI with the resources model
M Mehrnejad, E Toreini, AG Bafghi
2011 8th International ISC Conference on Information Security and Cryptology …, 2011
52011
An acoustic side channel attack on enigma
E Toreini, B Randell, F Hao
School of Computing Science Technical Report Series, 2015
42015
A novel method in fuzzy data clustering based on chaotic PSO
E Toreini, M Mehrnejad
2011 International Conference for Internet Technology and Secured …, 2011
42011
A new image based CAPTCHA based on geometric transformations
M Mehrnejad, A Ghaemi, A Harati, E Toreini
8thInternational ISC Conference on Information Security and Cryptology, FUM …, 2011
42011
PiSHi: click the images and I tell if you are a human
M Mehrnezhad, AG Bafghi, A Harati, E Toreini
International Journal of Information Security 16 (2), 133-149, 2017
32017
Removing trusted tallying authorities
P McCorry, E Toreini, M Mehrnezhad
School of Computing Science Technical Report Series, 2016
32016
The relationship between trust in AI and trustworthy machine learning technologies
E Toreini, M Aitken, K Coopamootoo, K Elliott, CG Zelaya, A van Moorsel
Proceedings of the 2020 Conference on Fairness, Accountability, and …, 2020
22020
What Is This Sensor and Does This App Need Access to It?
M Mehrnezhad, E Toreini
Informatics 6 (1), 7, 2019
22019
Analysis Of The Usage Of Chaotic Theory In Data Clustering Using Particle Swarm Optimization
SP NAVI, E TOREINI, M MEHRNEJAD, S KAZEM
Indian J. Sci. Res 4 (3), 335-353, 2014
12014
Establishing a social licence for Financial Technology: Reflections on the role of the private sector in pursuing ethical data practices
M Aitken, E Toreini, P Carmichael, K Coopamootoo, K Elliott, ...
Big Data & Society 7 (1), 2053951720908892, 2020
2020
DOMtegrity: ensuring web page integrity against malicious browser extensions
E Toreini, SF Shahandashti, M Mehrnezhad, F Hao
International Journal of Information Security 18 (6), 801-814, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–20