Mahdi R. Alagheband

Orcid: 0000-0002-2581-3273

According to our database1, Mahdi R. Alagheband authored at least 22 papers between 2011 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Formal unlinkability analysis of message authentication protocols based on authentic channels.
J. Supercomput., May, 2023

A conditional privacy-preserving fair electronic payment scheme based on blockchain without trusted third party.
J. Ambient Intell. Humaniz. Comput., 2023

2022
Advanced encryption schemes in multi-tier heterogeneous internet of things: taxonomy, capabilities, and objectives.
J. Supercomput., 2022

Advanced digital signatures for preserving privacy and trust management in hierarchical heterogeneous IoT: Taxonomy, capabilities, and objectives.
Internet Things, 2022

2021
Multiuser wireless speech encryption using synchronized chaotic systems.
Int. J. Speech Technol., 2021

A new provable hierarchical anonymous certificateless authentication protocol with aggregate verification in ADS-B systems.
Comput. Networks, 2021

2020
Provably privacy analysis and improvements of the lightweight RFID authentication protocols.
Wirel. Networks, 2020

Time-based Gap Analysis of Cybersecurity Trends in Academic and Digital Media.
ACM Trans. Manag. Inf. Syst., 2020

Design of a secure communication system between base transmitter station and mobile equipment based on finite-time chaos synchronisation.
Int. J. Syst. Sci., 2020

2018
Performing and mitigating force and terrorist fraud attacks against two RFID distance-bounding protocols.
J. Inf. Secur. Appl., 2018

Provable analysis and improvement of smart card-based anonymous authentication protocols.
Int. J. Commun. Syst., 2018

Analysis and Improvement of a Lightweight Anonymous Authentication Protocol for Mobile Pay-TV Systems (Full text).
CoRR, 2018

Analysis and Improvement of a Lightweight Anonymous Authentication Protocol for Mobile Pay-TV Systems.
Proceedings of the 9th International Symposium on Telecommunications, 2018

2016
User-friendly visual secret sharing for color images based on random grids.
Proceedings of the 10th International Symposium on Communication Systems, 2016

2014
Simulation-Based Traceability Analysis of RFID Authentication Protocols.
Wirel. Pers. Commun., 2014

2013
Unified privacy analysis of new-found RFID authentication protocols.
Secur. Commun. Networks, 2013

Traceability analysis of quadratic residue-based RFID authentication protocols.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

2012
Dynamic and secure key management model for hierarchical heterogeneous sensor networks.
IET Inf. Secur., 2012

2011
Cryptanalysis of two mutual authentication protocols for low-cost RFID
CoRR, 2011

Practical Attacks on a RFID Authentication Protocol Conforming to EPC C-1 G-2 Standard
CoRR, 2011

Attacks on a Lightweight Mutual Authentication Protocol under EPC C-1 G-2 Standard.
Proceedings of the Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, 2011

A Secure Key Management Framework for Heterogeneous Wireless Sensor Networks.
Proceedings of the Communications and Multimedia Security, 2011


  Loading...