Majid Naderi

According to our database1, Majid Naderi authored at least 44 papers between 2007 and 2016.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 




Adaptive low-energy clustering in slotted beacon-enabled IEEE 802.15.4 networks.
Wirel. Commun. Mob. Comput., 2016

Energy-Efficient Cluster-Head Rotation in Beacon-Enabled IEEE 802.15.4 Networks.
IEEE Trans. Parallel Distributed Syst., 2015

Evaluation of Single Dimensional Sensor Network Implemented Using Slave-Slave Bridging in IEEE 802.15.4 Technology.
Ad Hoc Sens. Wirel. Networks, 2015

Cryptanalysis of a new EPC class-1 generation-2 standard compliant RFID protocol.
Neural Comput. Appl., 2014

A note on the security of IS-RFID, an inpatient medication safety.
Int. J. Medical Informatics, 2014

Strengthening the Security of EPC C-1 G-2 RFID Standard.
Wirel. Pers. Commun., 2013

Increasing Lifetime of a Two-Dimensional Wireless Sensor Network Using Radio Range Adjustments.
IEICE Trans. Inf. Syst., 2013

Lifetime Properties in Cluster-Based IEEE 802.15.4WSNs.
Proceedings of the 78th IEEE Vehicular Technology Conference, 2013

Interaction of clustering period and event sensing reliability in IEEE 802.15.4 based WSNs.
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013

Energy-Efficient Clustering in IEEE 802.15.4 Wireless Sensor Networks.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013

On the Designing of a Tamper Resistant Prescription RFID Access Control System.
J. Medical Syst., 2012

On the Traceability of Tags in SUAP RFID Authentication Protocols.
IACR Cryptol. ePrint Arch., 2012

How a Cryptographer Can Get Rich?
IACR Cryptol. ePrint Arch., 2012

Image Encryption Using a Lightweight Stream Encryption Algorithm.
Adv. Multim., 2012

Another Fallen Hash-Based RFID Authentication Protocol.
Proceedings of the Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, 2012

On the Security of Tan et al. Serverless RFID Authentication and Search Protocols.
Proceedings of the Radio Frequency Identification. Security and Privacy Issues, 2012

Heavy-tail and voice over internet protocol traffic: queueing analysis for performance evaluation.
IET Commun., 2011

Cryptanalysis of Cho <i>et al.</i>'s Protocol, A Hash-Based Mutual Authentication Protocol for RFID Systems.
IACR Cryptol. ePrint Arch., 2011

Cryptanalysis of Some Protocols for RFID Systems.
IACR Cryptol. ePrint Arch., 2011

Cryptanalysis of improved Yeh <i>et al.</i>'s authentication Protocol: An EPC Class-1 Generation-2 standard compliant protocol.
IACR Cryptol. ePrint Arch., 2011

Security Analysis of a PUF based RFID Authentication Protocol.
IACR Cryptol. ePrint Arch., 2011

On the Security of RFID Anti Cloning Security Protocol(ACSP).
IACR Cryptol. ePrint Arch., 2011

Cryptanalysis of AZUMI: an EPC Class-1 Generation-2 Standard Compliant RFID Authentication Protocol.
IACR Cryptol. ePrint Arch., 2011

Cryptanalysis of Chen <i>et al.</i>'s RFID Access Control Protocol.
IACR Cryptol. ePrint Arch., 2011

Security Analysis of LMAP<sup>++</sup>, an RFID Authentication Protocol.
IACR Cryptol. ePrint Arch., 2011

Vulnerabilities in a new RFID access control protocol.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

On the Security of Mutual Authentication Protocols for RFID Systems: The Case of Wei et al.'s Protocol.
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011

Tag Impersonation Attack on Two RFID Mutual Authentication Protocols.
Proceedings of the Sixth International Conference on Availability, 2011

EPC: A Provably Secure Permutation Based Compression Function.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

Cryptanalysis of AFMAP.
IEICE Electron. Express, 2010

Cryptanalysis of Tav-128 Hash Function.
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010

On the Collision and Preimage Resistance of Certain Two-Call Hash Functions.
Proceedings of the Cryptology and Network Security - 9th International Conference, 2010

Cryptanalysis of an iterated halving-based hash function: CRUSH.
IET Inf. Secur., 2009

Wireless mesh networks channel reservation: modelling and delay analysis.
IET Commun., 2009

MAC-layer channel utilisation enhancements for wireless mesh networks.
IET Commun., 2009

Hash Functions and Information Theoretic Security.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Gravimetric Method for <i>in Vitro</i> Calibration of Skin Hydration Measurements.
IEEE Trans. Biomed. Eng., 2008

Genetic algorithm quality of service design in resilient dense wavelength division multiplexing optical networks.
IET Commun., 2008

Cryptanalysis of CRUSH hash structure.
IACR Cryptol. ePrint Arch., 2008

Optical Communications Survivable wavelength-routed optical network design using genetic algorithms.
Eur. Trans. Telecommun., 2008

Multi-Collisions Attack in Ring Hash Structure.
Proceedings of the SECRYPT 2008, 2008

Performance evaluation of the MESH-DQDC protocol.
Proceedings of the 2008 International Conference on Telecommunications, 2008

The Impact of Hidden Terminal on WMNet Performance.
Proceedings of the Advances in Computer Science and Engineering, 2008

A New Position-Based Routing Algorithm for the Reduction of Overhead in Ad-hoc Networks.
Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), 2007