Personal information

No personal information available

Activities

Employment (2)

Shahid chamran university of kerman: Kerman, kerman, IR

Teaches computer engineering courses (Computer engineering)
Employment
Source: Self-asserted source
Mohammad Soltani

Islamic Azad University branch of kerman: Kerman, Kerman, IR

Teaches computer engineering courses (Computer engineering)
Employment
Source: Self-asserted source
Mohammad Soltani

Education and qualifications (3)

Islamic Azad University: Mashhad, Mashhad, IR

2018 to 2022 | PhD (Computer engineering)
Education
Source: Self-asserted source
Mohammad Soltani

Islamic Azad University: Kerman, Kerman, IR

2015 to 2017 | Master of science (Computer engineering)
Qualification
Source: Self-asserted source
Mohammad Soltani

Shahid Bahonar University of Kerman: Kerman, Kerman, IR

2009 to 2014 | Bachelor of science (Computer engineering)
Education
Source: Self-asserted source
Mohammad Soltani

Works (10)

A DICOM ENCRYPTION ALGORITHM TO INCREASE SECURITY AND PRIVACY IN HEALTH DATA MANAGEMENT BASED ON PATIENT BIOMETRICS DATA, ARTIFICIAL INTELLIGENCE, AND RNA ENCRYPTION ALGORITHM

EURASIAN JOURNAL OF MATHEMATICAL AND COMPUTER APPLICATIONS
2025-03-31 | Journal article
Contributors: Mohammad Soltani
Source: Self-asserted source
Mohammad Soltani

حفظ محرمانگی و صحت داده‌ها و جلوگیری از دسترسی غیرمجاز به تصاویر پزشکی DICOM

نشریه مهندسی برق و مهندسی کامپیوتر ایران
2023-02-01 | Journal article
Contributors: Mohammad Soltani
Source: Self-asserted source
Mohammad Soltani

Designing A Novel Hybrid Algorithm for QR-Code Images Encryption and Steganography

Journal of Computers
2018-09-25 | Journal article
Source: Self-asserted source
Mohammad Soltani

A New Secure Image Encryption Algorithm using Logical and Visual Cryptography Algorithms and based on Symmetric Key Encryption

Journal of Basic and Applied Scientific Research
2013-06-16 | Journal article
Source: Self-asserted source
Mohammad Soltani

A New Secure Cryptography Algorithm Based on Symmetric Key Encryption

Journal of Basic and Applied Scientific Research
2013-04-18 | Journal article
Source: Self-asserted source
Mohammad Soltani

A NEW ROBUST CRYPTOGRAPHY ALGORITHM BASED ON SYMMETRIC KEY TO PREVENT UNAUTHORIZED ACCESS TO CONTENTS OF ENCRYPTED FILES

International Journal of Computer Science Issues
2013-02-20 | Journal article
Source: Self-asserted source
Mohammad Soltani

بررسی ساختار و ویژگی های الگوریتم رمزنگاری RSA و نحوه اجرای آن در GPU

چهارمین کنفرانس بین المللی مهندسی برق و کامپیوتر
Conference paper
Source: Self-asserted source
Mohammad Soltani

بررسی ساختار و ویژگیهای الگوریتم رمزنگاری AES و همچنین نحوه اجرای آن در GPU

چهارمین کنفرانس بین المللی مهندسی برق و کامپیوتر
Conference paper
Source: Self-asserted source
Mohammad Soltani

تعریف و بررسی ویژگی های الگوریتم های رمز نگاری AES و RSA و نحوه اجرای الگوریتم RSA در زبان برنامه نویسی c#

اولین کنفرانس بین المللی چشم انداز های نو در مهندسی برق و کامپیوتر
Conference paper
Source: Self-asserted source
Mohammad Soltani

تعریف و بررسی ویژگی های الگوریتم های رمزنگاری AES و RSA و نحوه اجرای الگوریتم AES در زبان برنامه نویسی # C

چهارمین کنفرانس ملی فناوری اطلاعات، کامپیوتر و مخابرات
Conference paper
Source: Self-asserted source
Mohammad Soltani