Follow
Mahmoud Ahmadian Attari
Mahmoud Ahmadian Attari
Professor of Electrical Engineering, KN Toosi University of Technology
Verified email at eetd.kntu.ac.ir
Title
Cited by
Cited by
Year
An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps
MS Farash, MA Attari
Nonlinear Dynamics 77, 399-411, 2014
1262014
Lowering the error floor of LDPC codes using cyclic liftings
R Asvadi, AH Banihashemi, M Ahmadian-Attari
IEEE Transactions on information theory 57 (4), 2213-2224, 2011
1052011
A secure and efficient identity-based authenticated key exchange protocol for mobile client–server networks
MS Farash, MA Attari
The Journal of Supercomputing 69, 395-411, 2014
692014
An enhanced authenticated key agreement for session initiation protocol
MS Farash, MA Attari
Information Technology and Control 42 (4), 333-342, 2013
682013
Squaring attacks on McEliece public-key cryptosystems using quasi-cyclic codes of even dimension
C Löndahl, T Johansson, M Koochak Shooshtari, M Ahmadian-Attari, ...
Designs, Codes and Cryptography 80, 359-377, 2016
612016
Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing
MS Farash, MA Attari
Nonlinear Dynamics 76, 1203-1213, 2014
582014
A new detector for contourlet domain multiplicative image watermarking using Bessel K form distribution
M Rabizadeh, M Amirmazlaghani, M Ahmadian-Attari
Journal of Visual Communication and Image Representation 40, 324-334, 2016
502016
Adaptive secure channel coding based on punctured turbo codes
A Payandeh, M Ahmadian, M Reza Aref
IEE Proceedings-Communications 153 (2), 313-316, 2006
502006
Performance analysis of energy detection-based spectrum sensing over fading channels
N Reisi, M Ahmadian, S Salari
2010 6th International Conference on Wireless Communications Networking and …, 2010
472010
The effect of research and development incentive on wind power investment, a system dynamics approach
M Esmaieli, M Ahmadian
Renewable Energy 126, 765-773, 2018
432018
An efficient client–client password-based authentication scheme with provable security
MS Farash, MA Attari
The Journal of Supercomputing 70, 1002-1022, 2014
422014
An anonymous and untraceable password‐based authentication scheme for session initiation protocol using smart cards
MS Farash, MA Attari
International Journal of Communication Systems 29 (13), 1956-1967, 2016
402016
Network-coded two-way relaying in spectrum-sharing systems with quality-of-service requirements
S Hatamnia, S Vahidian, S Aïssa, B Champagne, M Ahmadian-Attari
IEEE Transactions on Vehicular Technology 66 (2), 1299-1312, 2016
402016
A Pairing-free ID-based Key Agreement Protocol with Different PKGs.
MS Farash, M Ahmadian-Attari
Int. J. Netw. Secur. 16 (2), 143-148, 2014
402014
A lightweight auditing service for shared data with secure user revocation in cloud storage
R Rabaninejad, MA Attari, MR Asaar, MR Aref
IEEE Transactions on Services Computing 15 (1), 1-15, 2019
372019
A new efficient authenticated multiple-key exchange protocol from bilinear pairings
MS Farash, MA Attari, RE Atani, M Jami
Computers & Electrical Engineering 39 (2), 530-541, 2013
372013
An enhanced and secure three-party password-based authenticated key exchange protocol without using server's public-keys and symmetric cryptosystems
MS Farash, MA Attari
Information Technology and Control 43 (2), 143-150, 2014
342014
Bidirectional AF relaying with underlay spectrum sharing in cognitive radio networks
S Vahidian, E Soleimani-Nasab, S Aïssa, M Ahmadian-Attari
IEEE Transactions on Vehicular Technology 66 (3), 2367-2381, 2016
332016
A provably secure and efficient authentication scheme for access control in mobile pay-TV systems
MS Farash, MA Attari
Multimedia Tools and Applications 75, 405-424, 2016
322016
Vulnerability of two multiple-key agreement protocols
MS Farash, M Bayat, MA Attari
Computers & Electrical Engineering 37 (2), 199-204, 2011
322011
The system can't perform the operation now. Try again later.
Articles 1–20