Follow
Mahdi R. Alagheband
Title
Cited by
Cited by
Year
Dynamic and secure key management model for hierarchical heterogeneous sensor networks
MR Alagheband, MR Aref
IET Information Security 6 (4), 271-280, 2012
692012
Design of a secure communication system between base transmitter station and mobile equipment based on finite-time chaos synchronisation
S Hashemi, MA Pourmina, S Mobayen, MR Alagheband
International Journal of Systems Science 51 (11), 1969-1986, 2020
382020
Simulation-based traceability analysis of RFID authentication protocols
MR Alagheband, MR Aref
Wireless Personal Communications 77, 1019-1038, 2014
372014
Practical attacks on a RFID authentication protocol conforming to EPC C-1 G-2 standard
MH Habibi, M Gardeshi, MR Alaghband
arXiv preprint arXiv:1102.0763, 2011
372011
Attacks on a lightweight mutual authentication protocol under EPC C-1 G-2 standard
MH Habibi, MR Alagheband, MR Aref
Information Security Theory and Practice. Security and Privacy of Mobile …, 2011
302011
A new provable hierarchical anonymous certificateless authentication protocol with aggregate verification in ADS-B systems
A Asari, MR Alagheband, M Bayat, MR Asaar
Computer Networks 185, 107599, 2021
262021
Unified privacy analysis of new‐found RFID authentication protocols
MR Alagheband, MR Aref
Security and Communication Networks 6 (8), 999-1009, 2013
262013
Advanced digital signatures for preserving privacy and trust management in hierarchical heterogeneous IoT: Taxonomy, capabilities, and objectives
MR Alagheband, A Mashatan
Internet of Things 18, 100492, 2022
202022
Time-based gap analysis of cybersecurity trends in academic and digital media
MR Alagheband, A Mashatan, M Zihayat
ACM Transactions on Management Information Systems (TMIS) 11 (4), 1-20, 2020
202020
Traceability analysis of quadratic residue-based RFID authentication protocols
Z Sohrabi-Bonab, MR Alagheband, MR Aref
2013 Eleventh Annual Conference on Privacy, Security and Trust, 61-68, 2013
152013
A conditional privacy-preserving fair electronic payment scheme based on blockchain without trusted third party
Z Hatefi, M Bayat, MR Alaghband, N Hamian, SM Pournaghi
Journal of Ambient Intelligence and Humanized Computing 14 (8), 10089-10102, 2023
112023
Provably privacy analysis and improvements of the lightweight RFID authentication protocols
M Gholami, V. - R. Alagheband
Wireless Networks, https://doi.org/10.1007/s11276-019-02037-z, 2019
10*2019
Cryptanalysis of two mutual authentication protocols for low-cost RFID
MH Habibi, M Gardeshi, MR Alaghband
arXiv preprint arXiv:1102.0858, 2011
102011
A secure key management framework for heterogeneous wireless sensor networks
MR Alagheband, MR Aref
Communications and Multimedia Security: 12th IFIP TC 6/TC 11 International …, 2011
102011
Multiuser wireless speech encryption using synchronized chaotic systems
S Hashemi, MA Pourmina, S Mobayen, MR Alagheband
International Journal of Speech Technology 24, 651-663, 2021
92021
Formal cryptanalysis of a CRC-based RFID authentication protocol
Z Sohrabi-Bonab, MR Alagheband, MR Aref
2014 22nd Iranian Conference on Electrical Engineering (ICEE), 1642-1647, 2014
92014
User-friendly visual secret sharing for color images based on random grids
SM Paknahad, SA Hosseini, MR Alagheband
2016 10th International Symposium on Communication Systems, Networks and …, 2016
72016
Communications and Multimedia Security
BDDDW Chadwick
Springer, 2012
7*2012
Advanced encryption schemes in multi-tier heterogeneous internet of things: taxonomy, capabilities, and objectives
MR Alagheband, A Mashatan
The Journal of Supercomputing 78 (17), 18777-18824, 2022
52022
Attacks and improvements to a new RFID Authentication protocol
MH Habibi, M Gardeshi, MR Alagheband
Radio Frequency Identification System Security, 66-80, 2011
52011
The system can't perform the operation now. Try again later.
Articles 1–20