Mahmoud Ahmadian Attari
Mahmoud Ahmadian Attari
Professor of Electrical Engineering, KN Toosi University of Technology
Verificeret mail på eetd.kntu.ac.ir
Citeret af
Citeret af
An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps
MS Farash, MA Attari
Nonlinear Dynamics 77, 399-411, 2014
Lowering the error floor of LDPC codes using cyclic liftings
R Asvadi, AH Banihashemi, M Ahmadian-Attari
IEEE Transactions on information theory 57 (4), 2213-2224, 2011
An enhanced authenticated key agreement for session initiation protocol
MS Farash, MA Attari
Information Technology and Control 42 (4), 333-342, 2013
A secure and efficient identity-based authenticated key exchange protocol for mobile client–server networks
MS Farash, MA Attari
The Journal of Supercomputing 69, 395-411, 2014
Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing
MS Farash, MA Attari
Nonlinear Dynamics 76, 1203-1213, 2014
Squaring attacks on McEliece public-key cryptosystems using quasi-cyclic codes of even dimension
C Löndahl, T Johansson, M Koochak Shooshtari, M Ahmadian-Attari, ...
Designs, Codes and Cryptography 80, 359-377, 2016
A new detector for contourlet domain multiplicative image watermarking using Bessel K form distribution
M Rabizadeh, M Amirmazlaghani, M Ahmadian-Attari
Journal of Visual Communication and Image Representation 40, 324-334, 2016
Adaptive secure channel coding based on punctured turbo codes
A Payandeh, M Ahmadian, MR Aref
IEE Proceedings-Communications 153 (2), 313-316, 2006
Performance analysis of energy detection-based spectrum sensing over fading channels
N Reisi, M Ahmadian, S Salari
2010 6th International Conference on Wireless Communications Networking and …, 2010
An efficient client–client password-based authentication scheme with provable security
MS Farash, MA Attari
The Journal of Supercomputing 70, 1002-1022, 2014
Network-coded two-way relaying in spectrum-sharing systems with quality-of-service requirements
S Hatamnia, S Vahidian, S Aïssa, B Champagne, M Ahmadian-Attari
IEEE Transactions on Vehicular Technology 66 (2), 1299-1312, 2016
A Pairing-free ID-based Key Agreement Protocol with Different PKGs.
MS Farash, M Ahmadian-Attari
Int. J. Netw. Secur. 16 (2), 143-148, 2014
An anonymous and untraceable password‐based authentication scheme for session initiation protocol using smart cards
MS Farash, MA Attari
International Journal of Communication Systems 29 (13), 1956-1967, 2016
A new efficient authenticated multiple-key exchange protocol from bilinear pairings
MS Farash, MA Attari, RE Atani, M Jami
Computers & Electrical Engineering 39 (2), 530-541, 2013
The effect of research and development incentive on wind power investment, a system dynamics approach
M Esmaieli, M Ahmadian
Renewable energy 126, 765-773, 2018
An enhanced and secure three-party password-based authenticated key exchange protocol without using server's public-keys and symmetric cryptosystems
MS Farash, MA Attari
Information Technology and Control 43 (2), 143-150, 2014
Bidirectional AF relaying with underlay spectrum sharing in cognitive radio networks
S Vahidian, E Soleimani-Nasab, S Aïssa, M Ahmadian-Attari
IEEE Transactions on Vehicular Technology 66 (3), 2367-2381, 2016
A provably secure and efficient authentication scheme for access control in mobile pay-TV systems
MS Farash, MA Attari
Multimedia Tools and Applications 75, 405-424, 2016
Vulnerability of two multiple-key agreement protocols
MS Farash, M Bayat, MA Attari
Computers & Electrical Engineering 37 (2), 199-204, 2011
A practical differential power analysis attack against an FPGA implementation of AES cryptosystem
M Masoomi, M Masoumi, M Ahmadian
2010 International Conference on Information Society, 308-312, 2010
Systemet kan ikke foretage handlingen nu. Prøv igen senere.
Artikler 1–20