Follow
Saman Shojae Chaeikar
Saman Shojae Chaeikar
Sydney International School of Technology and Commerce
Verified email at sistc.edu.au
Title
Cited by
Cited by
Year
Definitions and criteria of CIA security triangle in electronic voting system
S Shojae Chaeikar, M Jafari, H Taherdoost, N Shojae Chaei Kar
International Journal of Advanced Computer Science and Information …, 2013
49*2013
PSW statistical LSB image steganalysis
S Shojae Chaeikar, M Zamani, ABA Manaf, AM Zeki
Multimedia Tools and Applications 77 (1), 805-835, 2018
472018
A novel approach for genetic audio watermarking
M Zamani, AA Manaf, R Ahmad, F Jaryani, H Taherdoost, ...
Journal of Information Assurance and Security 5 (1), 102-111, 2010
432010
Genetic substitution-based audio steganography for high capacity applications
M Zamani, AB Abdul Manaf, HR Zeidanloo, S Shojae Chaeikar
International Journal of Internet Technology and Secured Transactions 3 (1 …, 2011
422011
A proposed framework for P2P Botnet detection
HR Zeidanloo, ABA Manaf, RB Ahmad, M Zamani, S Shojae Chaeikar
International Journal of Engineering and Technology 2 (2), 161, 2010
382010
Ensemble SW image steganalysis: A low dimension method for LSBR detection
S Shojae Chaeikar, A Ahmadi
Signal Processing: Image Communication 70, 233-245, 2019
372019
Correlation between PSNR and bit per sample rate in audio steganography
M Zamani, ABA Manaf, SM Abdullah, S Shojae Chaeikar
11th International Conference on Signal Processing (SIP'12), 163-168, 2012
372012
Genetic audio steganography
M Zamani, AA Manaf, R Ahmad, F Jaryani, H Taherdoost, ...
International Journal on Recent Trends in Engineering & Technology [IJRTET …, 2010
37*2010
Mazdak Technique for PSNR Estimation in Audio Steganography
M Zamani, ABA Manaf, SM Abdullah, S Shojae Chaeikar
2012 International Conference on Mechanical and Electrical Technology (ICMET …, 2012
35*2012
Genetic Audio Watermarking
M Zamani, ABA Manaf, RB Ahmad, F Jaryani, S Shojae Chaeikar
Springer Berlin Heidelberg, 2010
34*2010
Smart card adoption model: Social and ethical perspectives
H Taherdoost, S Sahibuddin, M Namayandeh, N Jalaliyoon, A Kalantari, ...
Science 3 (4), 2012
322012
Interpretative key management (IKM), A novel framework
S Shojae Chaeikar, SA Razak, S Honarbakhsh, HR Zeidanloo, M Zamani, ...
2010 Second International Conference on Computer Research and Development …, 2010
252010
A Prospective Study of Mobile Cloud Computing
M Alizadeh, WH Hassan, M Zamani, T Khodadadi, S Shojae Chaeikar
International Journal of Advancements in Computing Technology(IJACT) 5 (11 …, 2013
23*2013
Comparative analysis of Master-key and Interpretative Key Management (IKM) frameworks
S Shojae Chaeikar, ABA Manaf, M Zamani
Cryptography and security in computing, 203-218, 2012
222012
PFW: Polygonal Fuzzy Weighted—An SVM Kernel for the Classification of Overlapping Data Groups
S Shojae Chaeikar, AA Manaf, AA Alarood, M Zamani
ELectronics 9 (4), 2020
212020
An intelligent cryptographic key management model for secure communications in distributed industrial intelligent systems
S Shojae Chaeikar, M Alizadeh, MH Tadayon, A Jolfaei
International Journal of Intelligent Systems, 2021
20*2021
Security features comparison of master key and IKM cryptographic key management for researchers and developers
S Yazdanpanah, S Shojae Chaeikar, M Zamani, R Kourdi
Proceedings of the 3rd International Conference on Software Technology and …, 2011
192011
Electronic Voting Systems for European Union Countries
S Shojae Chaeikar, M Zamani, ...
Journal of next Generation Information Technology 4 (5.3), 16-26, 2013
162013
Node Based Interpretative Key Management Framework
S Shojae Chaeikar, H Sabet Moghaddam, H Rouhani Zeidanloo
Proceedings of The 2010 Congress in Computer science, Computer engineering …, 2010
14*2010
Cryptography and security in computing
J Sen
BoD–Books on Demand, 2012
132012
The system can't perform the operation now. Try again later.
Articles 1–20