Follow
Mahmoud Ahmadian Attari
Mahmoud Ahmadian Attari
Professor of Electrical Engineering, KN Toosi University of Technology
Verified email at eetd.kntu.ac.ir
Title
Cited by
Cited by
Year
An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps
MS Farash, MA Attari
Nonlinear Dynamics 77 (1), 399-411, 2014
1132014
Lowering the error floor of LDPC codes using cyclic liftings
R Asvadi, AH Banihashemi, M Ahmadian-Attari
IEEE Transactions on information theory 57 (4), 2213-2224, 2011
962011
An enhanced authenticated key agreement for session initiation protocol
MS Farash, MA Attari
Information Technology and Control 42 (4), 333-342, 2013
652013
A secure and efficient identity-based authenticated key exchange protocol for mobile client–server networks
MS Farash, MA Attari
The Journal of Supercomputing 69 (1), 395-411, 2014
642014
Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing
MS Farash, MA Attari
Nonlinear Dynamics 76 (2), 1203-1213, 2014
572014
Squaring attacks on McEliece public-key cryptosystems using quasi-cyclic codes of even dimension
C L÷ndahl, T Johansson, M Koochak Shooshtari, M Ahmadian-Attari, ...
Designs, Codes and Cryptography 80 (2), 359-377, 2016
472016
Adaptive secure channel coding based on punctured turbo codes
A Payandeh, M Ahmadian, MR Aref
IEE Proceedings-Communications 153 (2), 313-316, 2006
432006
Performance analysis of energy detection-based spectrum sensing over fading channels
N Reisi, M Ahmadian, S Salari
2010 6th International Conference on Wireless Communications Networking andá…, 2010
422010
A new detector for contourlet domain multiplicative image watermarking using Bessel K form distribution
M Rabizadeh, M Amirmazlaghani, M Ahmadian-Attari
Journal of Visual Communication and Image Representation 40, 324-334, 2016
412016
A Pairing-free ID-based Key Agreement Protocol with Different PKGs.
MS Farash, M Ahmadian-Attari
Int. J. Netw. Secur. 16 (2), 143-148, 2014
402014
An efficient client–client password-based authentication scheme with provable security
MS Farash, MA Attari
The Journal of Supercomputing 70 (2), 1002-1022, 2014
392014
An anonymous and untraceable password‐based authentication scheme for session initiation protocol using smart cards
MS Farash, MA Attari
International Journal of Communication Systems 29 (13), 1956-1967, 2016
382016
A new efficient authenticated multiple-key exchange protocol from bilinear pairings
MS Farash, MA Attari, RE Atani, M Jami
Computers & Electrical Engineering 39 (2), 530-541, 2013
362013
An enhanced and secure three-party password-based authenticated key exchange protocol without using server's public-keys and symmetric cryptosystems
MS Farash, MA Attari
Information Technology and Control 43 (2), 143-150, 2014
342014
Network-coded two-way relaying in spectrum-sharing systems with quality-of-service requirements
S Hatamnia, S Vahidian, S A´ssa, B Champagne, M Ahmadian-Attari
IEEE Transactions on Vehicular Technology 66 (2), 1299-1312, 2016
332016
A provably secure and efficient authentication scheme for access control in mobile pay-TV systems
MS Farash, MA Attari
Multimedia Tools and Applications 75 (1), 405-424, 2016
322016
Vulnerability of two multiple-key agreement protocols
MS Farash, M Bayat, MA Attari
Computers & Electrical Engineering 37 (2), 199-204, 2011
322011
The effect of research and development incentive on wind power investment, a system dynamics approach
M Esmaieli, M Ahmadian
Renewable energy 126, 765-773, 2018
312018
Bidirectional AF relaying with underlay spectrum sharing in cognitive radio networks
S Vahidian, E Soleimani-Nasab, S A´ssa, M Ahmadian-Attari
IEEE Transactions on Vehicular Technology 66 (3), 2367-2381, 2016
312016
A practical differential power analysis attack against an FPGA implementation of AES cryptosystem
M Masoomi, M Masoumi, M Ahmadian
2010 International Conference on Information Society, 308-312, 2010
292010
The system can't perform the operation now. Try again later.
Articles 1–20