An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps MS Farash, MA Attari Nonlinear Dynamics 77, 399-411, 2014 | 126 | 2014 |
Lowering the error floor of LDPC codes using cyclic liftings R Asvadi, AH Banihashemi, M Ahmadian-Attari IEEE Transactions on information theory 57 (4), 2213-2224, 2011 | 104 | 2011 |
A secure and efficient identity-based authenticated key exchange protocol for mobile client–server networks MS Farash, MA Attari The Journal of Supercomputing 69, 395-411, 2014 | 69 | 2014 |
An enhanced authenticated key agreement for session initiation protocol MS Farash, MA Attari Information Technology and Control 42 (4), 333-342, 2013 | 68 | 2013 |
Squaring attacks on McEliece public-key cryptosystems using quasi-cyclic codes of even dimension C Löndahl, T Johansson, M Koochak Shooshtari, M Ahmadian-Attari, ... Designs, Codes and Cryptography 80, 359-377, 2016 | 61 | 2016 |
Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing MS Farash, MA Attari Nonlinear Dynamics 76, 1203-1213, 2014 | 58 | 2014 |
A new detector for contourlet domain multiplicative image watermarking using Bessel K form distribution M Rabizadeh, M Amirmazlaghani, M Ahmadian-Attari Journal of Visual Communication and Image Representation 40, 324-334, 2016 | 50 | 2016 |
Adaptive secure channel coding based on punctured turbo codes A Payandeh, M Ahmadian, M Reza Aref IEE Proceedings-Communications 153 (2), 313-316, 2006 | 50 | 2006 |
Performance analysis of energy detection-based spectrum sensing over fading channels N Reisi, M Ahmadian, S Salari 2010 6th International Conference on Wireless Communications Networking and …, 2010 | 47 | 2010 |
The effect of research and development incentive on wind power investment, a system dynamics approach M Esmaieli, M Ahmadian Renewable Energy 126, 765-773, 2018 | 43 | 2018 |
An efficient client–client password-based authentication scheme with provable security MS Farash, MA Attari The Journal of Supercomputing 70, 1002-1022, 2014 | 42 | 2014 |
An anonymous and untraceable password‐based authentication scheme for session initiation protocol using smart cards MS Farash, MA Attari International Journal of Communication Systems 29 (13), 1956-1967, 2016 | 40 | 2016 |
Network-coded two-way relaying in spectrum-sharing systems with quality-of-service requirements S Hatamnia, S Vahidian, S Aïssa, B Champagne, M Ahmadian-Attari IEEE Transactions on Vehicular Technology 66 (2), 1299-1312, 2016 | 40 | 2016 |
A Pairing-free ID-based Key Agreement Protocol with Different PKGs. MS Farash, M Ahmadian-Attari Int. J. Netw. Secur. 16 (2), 143-148, 2014 | 40 | 2014 |
A lightweight auditing service for shared data with secure user revocation in cloud storage R Rabaninejad, MA Attari, MR Asaar, MR Aref IEEE Transactions on Services Computing 15 (1), 1-15, 2019 | 37 | 2019 |
A new efficient authenticated multiple-key exchange protocol from bilinear pairings MS Farash, MA Attari, RE Atani, M Jami Computers & Electrical Engineering 39 (2), 530-541, 2013 | 37 | 2013 |
An enhanced and secure three-party password-based authenticated key exchange protocol without using server's public-keys and symmetric cryptosystems MS Farash, MA Attari Information Technology and Control 43 (2), 143-150, 2014 | 34 | 2014 |
Bidirectional AF relaying with underlay spectrum sharing in cognitive radio networks S Vahidian, E Soleimani-Nasab, S Aïssa, M Ahmadian-Attari IEEE Transactions on Vehicular Technology 66 (3), 2367-2381, 2016 | 33 | 2016 |
A provably secure and efficient authentication scheme for access control in mobile pay-TV systems MS Farash, MA Attari Multimedia Tools and Applications 75, 405-424, 2016 | 32 | 2016 |
Vulnerability of two multiple-key agreement protocols MS Farash, M Bayat, MA Attari Computers & Electrical Engineering 37 (2), 199-204, 2011 | 32 | 2011 |