A Secure Proactive Secret Sharing PPS Scheme in MANETs |
September |
2012 |
An Efficient End to End Key Establishment Protocol for Wireless Sensor Networks |
September |
2012 |
An Anonymous Secure Routing Protocol for Mobile Ad hoc Networks |
February |
2011 |
A Symmetric Polynomial Based Mutual Authentication Protocol for GSM Networks |
May |
2010 |
A Scalable and Efficient Key Establishment Protocol for Wireless Sensor Networks |
June |
2010 |
A New Key Estabilishment Protocol for Limited Resource Wireless Sensor Networks |
June |
2010 |
A Hybrid Key Establishment Protocol for Large Scale Wireless Sensor Networks |
May |
2010 |
An Efficient Authentication and Key Management Protocol for Hierarchical Ad hoc Sensor Networks |
April |
2009 |
A New Mutual Authentication Protocol for GSM Networks |
May |
2009 |
Asymmetric Distribution of Computations in Internet Key Exchange Protocol |
May |
2008 |
Resistant TIK-Based endairA Against the Tunneling Attack |
February |
2008 |
Securing Mobile IP Communications Using MOBIKE Protocol |
June |
2008 |
A Distributed Certificate Authority and Key Establishment Protocol for Mobile Ad Hoc Networks |
February |
2008 |
A Cluster-based Key Establishment Protocol for Wireless Mobile Ad Hoc Networks |
March |
2008 |
Prevention of Tunneling Attack in endairA |
March |
2008 |
A Modified Version of IKEv2 for Using in Client-Server Environments |
May |
2008 |
A Comparative Study on National Information Security Strategies in Finland, US and Iran |
November |
2006 |
Information Security Community: A Nationwide Examination |
November |
2006 |
A New Protocol for Credit Card Transaction Systems |
September |
2005 |
A Proposed Protocol for Internet Key Exchange IKE |
May |
2004 |
Linear Analysis of Encryption Algorithm IES'80 |
May |
2003 |
A Proposed Protocol for Internet Key Exchange |
October |
2003 |
Efficient structure for tickets in KDC-based key Distribution Protocols |
October |
2001 |
Security evaluation of two certified Electronic mail Protocols |
October |
2001 |
Enhancement of IOLUS Protocol for secure Multicasting |
October |
2001 |
Evaluation of Shieh-Yang s Key Distribution Protocol |
May |
2000 |
Design of an Efficient KDC-Based Key Distribution Protocol |
May |
1999 |
Evaluation of the KryptoKnight Family of Key Distribution |
February |
1999 |
A Key Distribution Protocol Based on Commutative One-Way Function |
May |
1998 |
A Voicing Classifier for Speech Based on Neural Network |
May |
1996 |