default search action
Majid Naderi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2016
- [j19]Hamidreza Tavakoli, Jelena V. Misic, Majid Naderi, Vojislav B. Misic:
Adaptive low-energy clustering in slotted beacon-enabled IEEE 802.15.4 networks. Wirel. Commun. Mob. Comput. 16(4): 393-407 (2016) - 2015
- [j18]Hamidreza Tavakoli, Jelena V. Misic, Majid Naderi, Vojislav B. Misic:
Evaluation of Single Dimensional Sensor Network Implemented Using Slave-Slave Bridging in IEEE 802.15.4 Technology. Ad Hoc Sens. Wirel. Networks 24(3-4): 179-197 (2015) - [j17]Hamidreza Tavakoli, Jelena V. Misic, Vojislav B. Misic, Majid Naderi:
Energy-Efficient Cluster-Head Rotation in Beacon-Enabled IEEE 802.15.4 Networks. IEEE Trans. Parallel Distributed Syst. 26(12): 3371-3380 (2015) - 2014
- [j16]Masoumeh Safkhani, Nasour Bagheri, Majid Naderi:
A note on the security of IS-RFID, an inpatient medication safety. Int. J. Medical Informatics 83(1): 82-85 (2014) - [j15]Nasour Bagheri, Masoumeh Safkhani, Majid Naderi:
Cryptanalysis of a new EPC class-1 generation-2 standard compliant RFID protocol. Neural Comput. Appl. 24(3-4): 799-805 (2014) - 2013
- [j14]Hamidreza Tavakoli, Majid Naderi:
Increasing Lifetime of a Two-Dimensional Wireless Sensor Network Using Radio Range Adjustments. IEICE Trans. Inf. Syst. 96-D(7): 1489-1494 (2013) - [j13]Masoumeh Safkhani, Nasour Bagheri, Majid Naderi:
Strengthening the Security of EPC C-1 G-2 RFID Standard. Wirel. Pers. Commun. 72(2): 1295-1308 (2013) - [c15]Hamidreza Tavakoli, Jelena V. Misic, Majid Naderi, Vojislav B. Misic:
Energy-Efficient Clustering in IEEE 802.15.4 Wireless Sensor Networks. ICDCS Workshops 2013: 262-267 - [c14]Hamidreza Tavakoli, Jelena V. Misic, Majid Naderi, Vojislav B. Misic:
Interaction of clustering period and event sensing reliability in IEEE 802.15.4 based WSNs. IWCMC 2013: 774-779 - [c13]Hamidreza Tavakoli, Jelena V. Misic, Majid Naderi, Vojislav B. Misic:
Lifetime Properties in Cluster-Based IEEE 802.15.4WSNs. VTC Fall 2013: 1-5 - 2012
- [j12]Saeed Bahrami, Majid Naderi:
Image Encryption Using a Lightweight Stream Encryption Algorithm. Adv. Multim. 2012: 767364:1-767364:8 (2012) - [j11]Masoumeh Safkhani, Nasour Bagheri, Majid Naderi:
On the Designing of a Tamper Resistant Prescription RFID Access Control System. J. Medical Syst. 36(6): 3995-4004 (2012) - [c12]Masoumeh Safkhani, Pedro Peris-Lopez, Nasour Bagheri, Majid Naderi, Julio César Hernández Castro:
On the Security of Tan et al. Serverless RFID Authentication and Search Protocols. RFIDSec 2012: 1-19 - [c11]Julio César Hernández Castro, Pedro Peris-Lopez, Masoumeh Safkhani, Nasour Bagheri, Majid Naderi:
Another Fallen Hash-Based RFID Authentication Protocol. WISTP 2012: 29-37 - [i11]Masoumeh Safkhani, Nasour Bagheri, Majid Naderi:
How a Cryptographer Can Get Rich? IACR Cryptol. ePrint Arch. 2012: 23 (2012) - [i10]Masoumeh Safkhani, Nasour Bagheri, Majid Naderi:
On the Traceability of Tags in SUAP RFID Authentication Protocols. IACR Cryptol. ePrint Arch. 2012: 334 (2012) - 2011
- [j10]Ali Mahani, Yousef Seifi Kavian, Majid Naderi, Habib F. Rashvand:
Heavy-tail and voice over internet protocol traffic: queueing analysis for performance evaluation. IET Commun. 5(18): 2736-2743 (2011) - [c10]Masoumeh Safkhani, Nasour Bagheri, Majid Naderi, Yiyuan Luo, Qi Chai:
Tag Impersonation Attack on Two RFID Mutual Authentication Protocols. ARES 2011: 581-584 - [c9]Masoumeh Safkhani, Nasour Bagheri, Somitra Kumar Sanadhya, Majid Naderi, Hamid Behnam:
On the Security of Mutual Authentication Protocols for RFID Systems: The Case of Wei et al.'s Protocol. DPM/SETOP 2011: 90-103 - [c8]Masoumeh Safkhani, Nasour Bagheri, Majid Naderi:
Vulnerabilities in a new RFID access control protocol. ICITST 2011: 500-503 - [c7]Masoumeh Safkhani, Nasour Bagheri, Majid Naderi, Somitra Kumar Sanadhya:
Security analysis of LMAP++, an RFID authentication protocol. ICITST 2011: 689-694 - [i9]Masoumeh Safkhani, Majid Naderi, Nasour Bagheri, Somitra Kumar Sanadhya:
Cryptanalysis of Some Protocols for RFID Systems. IACR Cryptol. ePrint Arch. 2011: 61 (2011) - [i8]Nasour Bagheri, Masoumeh Safkhani, Majid Naderi, Somitra Kumar Sanadhya:
Security Analysis of LMAP++, an RFID Authentication Protocol. IACR Cryptol. ePrint Arch. 2011: 193 (2011) - [i7]Masoumeh Safkhani, Nasour Bagheri, Majid Naderi:
Cryptanalysis of Chen et al.'s RFID Access Control Protocol. IACR Cryptol. ePrint Arch. 2011: 194 (2011) - [i6]Masoumeh Safkhani, Pedro Peris-Lopez, Julio César Hernández Castro, Nasour Bagheri, Majid Naderi:
Cryptanalysis of Cho et al.'s Protocol, A Hash-Based Mutual Authentication Protocol for RFID Systems. IACR Cryptol. ePrint Arch. 2011: 331 (2011) - [i5]Masoumeh Safkhani, Nasour Bagheri, Majid Naderi:
Cryptanalysis of AZUMI: an EPC Class-1 Generation-2 Standard Compliant RFID Authentication Protocol. IACR Cryptol. ePrint Arch. 2011: 424 (2011) - [i4]Masoumeh Safkhani, Nasour Bagheri, Somitra Kumar Sanadhya, Majid Naderi:
Cryptanalysis of improved Yeh et al.'s authentication Protocol: An EPC Class-1 Generation-2 standard compliant protocol. IACR Cryptol. ePrint Arch. 2011: 426 (2011) - [i3]Masoumeh Safkhani, Nasour Bagheri, Majid Naderi:
On the Security of RFID Anti Cloning Security Protocol(ACSP). IACR Cryptol. ePrint Arch. 2011: 563 (2011) - [i2]Masoumeh Safkhani, Nasour Bagheri, Majid Naderi:
Security Analysis of a PUF based RFID Authentication Protocol. IACR Cryptol. ePrint Arch. 2011: 704 (2011) - 2010
- [j9]Masoumeh Safkhani, Majid Naderi, Nasour Bagheri:
Cryptanalysis of AFMAP. IEICE Electron. Express 7(17): 1240-1245 (2010) - [j8]Nasour Bagheri, Praveen Gauravaram, Majid Naderi, Babak Sadeghiyan:
EPC: A Provably Secure Permutation Based Compression Function. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(10): 1833-1836 (2010) - [c6]Nasour Bagheri, Praveen Gauravaram, Majid Naderi, Søren S. Thomsen:
On the Collision and Preimage Resistance of Certain Two-Call Hash Functions. CANS 2010: 96-105 - [c5]Ashish Kumar, Somitra Kumar Sanadhya, Praveen Gauravaram, Masoumeh Safkhani, Majid Naderi:
Cryptanalysis of Tav-128 Hash Function. INDOCRYPT 2010: 118-130
2000 – 2009
- 2009
- [j7]Nasour Bagheri, Lars R. Knudsen, Majid Naderi, Søren S. Thomsen:
Hash Functions and Information Theoretic Security. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(12): 3401-3403 (2009) - [j6]Ali Mahani, Habib F. Rashvand, Ebrahim Teimoury, Majid Naderi, Bahman Abolhassani:
Wireless mesh networks channel reservation: modelling and delay analysis. IET Commun. 3(5): 772-783 (2009) - [j5]Ali K. Mahani, Majid Naderi, Claudio Casetti, Carla-Fabiana Chiasserini:
MAC-layer channel utilisation enhancements for wireless mesh networks. IET Commun. 3(5): 794-807 (2009) - [j4]Nasour Bagheri, Matt Henricksen, Lars R. Knudsen, Majid Naderi, B. Sadeghyian:
Cryptanalysis of an iterated halving-based hash function: CRUSH. IET Inf. Secur. 3(4): 129-138 (2009) - 2008
- [j3]Yousef Seifi Kavian, Wei Ren, Majid Naderi, Mark S. Leeson, Evor L. Hines:
Optical Communications Survivable wavelength-routed optical network design using genetic algorithms. Eur. Trans. Telecommun. 19(3): 247-255 (2008) - [j2]Yousef Seifi Kavian, Habib F. Rashvand, Wei Ren, Majid Naderi, Mark S. Leeson, Evor L. Hines:
Genetic algorithm quality of service design in resilient dense wavelength division multiplexing optical networks. IET Commun. 2(4): 505-513 (2008) - [j1]Ørjan Grøttem Martinsen, Sverre Grimnes, Jon Kerr Nilsen, Christian Tronstad, Wooyoung Jang, Hongsig Kim, Kunsoo Shin, Majid Naderi, FrankThielmann:
Gravimetric Method for in Vitro Calibration of Skin Hydration Measurements. IEEE Trans. Biomed. Eng. 55(2): 728-732 (2008) - [c4]Kourosh Hassanli, Ali Khayatzadeh Mahani, Majid Naderi:
The Impact of Hidden Terminal on WMNet Performance. CSICC 2008: 921-925 - [c3]Ali Khayatzadeh Mahani, Majid Naderi, Claudio Casetti, Carla-Fabiana Chiasserini:
Performance evaluation of the MESH-DQDC protocol. ICT 2008: 1-6 - [c2]Nasour Bagheri, Babak Sadeghiyan, Majid Naderi:
Multi-Collisions Attack in Ring Hash Structure. SECRYPT 2008: 278-284 - [i1]Nasour Bagheri, Majid Naderi, Babak Sadeghiyan:
Cryptanalysis of CRUSH hash structure. IACR Cryptol. ePrint Arch. 2008: 43 (2008) - 2007
- [c1]Maryam Mohseni, Shabnam Vahedi, Majid Naderi:
A New Position-Based Routing Algorithm for the Reduction of Overhead in Ad-hoc Networks. ICSNC 2007: 7
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint