For Better Performance Please Use Chrome or Firefox Web Browser

Publications

Journal Papers
sort ascending
A Symmetric Polynomial Based Mutual Authentication Protocol for GSM Networks June 2012
A high performance and intrinsically secure key establishment protocol for wireless sensor networks July 2011
A Taxonomy for Network Vulnerabilities November 2010
An Efficient Symmetric Polynomial-based Key Establishment Protocol for Wireless Sensor Networks July 2010
A TESLA- Based Efficient Mutual Authentication Protocol for GSM Networks January 2009
The KryptoKinight family of Protocols: Evaluation and Enhancement October 2000
Conference Papers
sort ascending
An Efficient End to End Key Establishment Protocol for Wireless Sensor Networks September 2012
A Secure Proactive Secret Sharing PPS Scheme in MANETs September 2012
An Anonymous Secure Routing Protocol for Mobile Ad hoc Networks February 2011
A Scalable and Efficient Key Establishment Protocol for Wireless Sensor Networks June 2010
A New Key Estabilishment Protocol for Limited Resource Wireless Sensor Networks June 2010
A Hybrid Key Establishment Protocol for Large Scale Wireless Sensor Networks May 2010
A Symmetric Polynomial Based Mutual Authentication Protocol for GSM Networks May 2010
An Efficient Authentication and Key Management Protocol for Hierarchical Ad hoc Sensor Networks April 2009
A New Mutual Authentication Protocol for GSM Networks May 2009
Securing Mobile IP Communications Using MOBIKE Protocol June 2008
A Distributed Certificate Authority and Key Establishment Protocol for Mobile Ad Hoc Networks February 2008
A Cluster-based Key Establishment Protocol for Wireless Mobile Ad Hoc Networks March 2008
Prevention of Tunneling Attack in endairA March 2008
A Modified Version of IKEv2 for Using in Client-Server Environments May 2008
Asymmetric Distribution of Computations in Internet Key Exchange Protocol May 2008
Resistant TIK-Based endairA Against the Tunneling Attack February 2008
Information Security Community: A Nationwide Examination November 2006
A Comparative Study on National Information Security Strategies in Finland, US and Iran November 2006
A New Protocol for Credit Card Transaction Systems September 2005
A Proposed Protocol for Internet Key Exchange IKE May 2004
A Proposed Protocol for Internet Key Exchange October 2003
Linear Analysis of Encryption Algorithm IES'80 May 2003
Efficient structure for tickets in KDC-based key Distribution Protocols October 2001
Security evaluation of two certified Electronic mail Protocols October 2001
Enhancement of IOLUS Protocol for secure Multicasting October 2001
Evaluation of Shieh-Yang s Key Distribution Protocol May 2000
Evaluation of the KryptoKnight Family of Key Distribution February 1999
Design of an Efficient KDC-Based Key Distribution Protocol May 1999
A Key Distribution Protocol Based on Commutative One-Way Function May 1998
A Voicing Classifier for Speech Based on Neural Network May 1996

تحت نظارت وف ایرانی