Mohammad Reza Aref
Orcid: 0000-0002-4321-0345Affiliations:
- Sharif University of Technology, Department of Electrical Engineering, Tehran, Iran
  According to our database1,
  Mohammad Reza Aref
  authored at least 322 papers
  between 1982 and 2025.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
- 
    on zbmath.org
- 
    on twitter.com
- 
    on orcid.org
On csauthors.net:
Bibliography
  2025
Spotting and Mitigating DDoS Attacks Using Deep Learning for Online Traffic Analysis.
    
  
    ISC Int. J. Inf. Secur., July, 2025
    
  
    ISC Int. J. Inf. Secur., July, 2025
    
  
A Lightweight Online Intrusion Detection and Localization Framework for Industrial Control Systems.
    
  
    ISC Int. J. Inf. Secur., July, 2025
    
  
    ISC Int. J. Inf. Secur., July, 2025
    
  
    ISC Int. J. Inf. Secur., July, 2025
    
  
Over-the-Air Federated Adaptive Data Analysis: Preserving Accuracy via Opportunistic Differential Privacy.
    
  
    ISC Int. J. Inf. Secur., July, 2025
    
  
Fundamental limits of distributed covariance matrix estimation via a conditional strong data processing inequality.
    
  
    CoRR, July, 2025
    
  
    Int. J. Inf. Sec., February, 2025
    
  
    Proceedings of the 13th Iran Workshop on Communication and Information Theory, 2025
    
  
GenAtt NIDS Attack: A Practical Generative Adversarial Attack Against Network Intrusion Detection Systems.
    
  
    Proceedings of the 29th International Computer Conference, Computer Society of Iran, 2025
    
  
  2024
Lightweight Image Encryption Using a Novel Chaotic Technique for the Safe Internet of Things.
    
  
    Int. J. Comput. Intell. Syst., December, 2024
    
  
    ISC Int. J. Inf. Secur., July, 2024
    
  
    J. Cryptogr. Eng., June, 2024
    
  
On the Capacity of M-ary ASK Two-Hop Channel With Finite Battery Energy Harvesting Relay.
    
  
    IEEE Trans. Green Commun. Netw., March, 2024
    
  
    IEEE Internet Things J., March, 2024
    
  
HUAP: Practical Attribute-Based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices.
    
  
    ISC Int. J. Inf. Secur., January, 2024
    
  
    Neurocomputing, January, 2024
    
  
    IACR Cryptol. ePrint Arch., 2024
    
  
Beyond Yao's Millionaires: Secure Multi-Party Computation of Non-Polynomial Functions.
    
  
    CoRR, 2024
    
  
    CoRR, 2024
    
  
A Scalable Multi-Layered Blockchain Architecture for Enhanced EHR Sharing and Drug Supply Chain Management.
    
  
    CoRR, 2024
    
  
    Proceedings of the IEEE Information Theory Workshop, 2024
    
  
Fundamental Limits of Distributed Covariance Matrix Estimation Under Communication Constraints.
    
  
    Proceedings of the Forty-first International Conference on Machine Learning, 2024
    
  
  2023
    ISC Int. J. Inf. Secur., October, 2023
    
  
Strategies for Optimal Transmission and Delay Reduction in Dynamic Index Coding Problem.
    
  
    IEEE Trans. Commun., August, 2023
    
  
    CoRR, 2023
    
  
  2022
    IEEE Trans. Serv. Comput., 2022
    
  
A Lightweight Auditing Service for Shared Data with Secure User Revocation in Cloud Storage.
    
  
    IEEE Trans. Serv. Comput., 2022
    
  
Location Privacy Preservation for Secondary Users in a Database-Driven Cognitive Radio Network.
    
  
    ISC Int. J. Inf. Secur., 2022
    
  
    Int. J. Internet Protoc. Technol., 2022
    
  
A Bit-Vector Differential Model for the Modular Addition by a Constant and its Applications to Differential and Impossible-Differential Cryptanalysis.
    
  
    IACR Cryptol. ePrint Arch., 2022
    
  
    Proceedings of the 10th Iran Workshop on Communication and Information Theory, 2022
    
  
Information Theoretically Private and Secure Distributed Voting Without a Trusted Authority.
    
  
    Proceedings of the IEEE Information Theory Workshop, 2022
    
  
    Proceedings of the 2022 Workshop on Attacks and Solutions in Hardware Security, 2022
    
  
  2021
    Inf. Sci., 2021
    
  
    IACR Cryptol. ePrint Arch., 2021
    
  
Achievable Rates for Binary Two-hop Channel with Energy Harvesting Relay With Finite Battery.
    
  
    CoRR, 2021
    
  
Enhanced cache attack on AES applicable on ARM-based devices with new operating systems.
    
  
    Comput. Networks, 2021
    
  
Leveled Design of Cryptography Algorithms Using Cybernetic Methods for Using in Telemedicine Applications.
    
  
    Comput. Intell. Neurosci., 2021
    
  
    Proceedings of the Iran Workshop on Communication and Information Theory, 2021
    
  
    Proceedings of the IEEE International Symposium on Information Theory, 2021
    
  
    Proceedings of the 18th International ISC Conference on Information Security and Cryptology, 2021
    
  
  2020
    IEEE Trans. Inf. Theory, 2020
    
  
    J. Intell. Transp. Syst., 2020
    
  
A lightweight identity-based provable data possession supporting users' identity privacy and traceability.
    
  
    J. Inf. Secur. Appl., 2020
    
  
Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants.
    
  
    ISC Int. J. Inf. Secur., 2020
    
  
    Internet Things, 2020
    
  
    IET Commun., 2020
    
  
    Clust. Comput., 2020
    
  
Generalized Meet in the Middle Cryptanalysis of Block Ciphers With an Automated Search Algorithm.
    
  
    IEEE Access, 2020
    
  
Secrecy Performance of Friendly Jammer Assisted Cooperative NOMA Systems with Internal Eavesdroppers.
    
  
    Proceedings of the 31st IEEE Annual International Symposium on Personal, 2020
    
  
    Proceedings of the Iran Workshop on Communication and Information Theory, 2020
    
  
    Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020
    
  
  2019
    Wirel. Networks, 2019
    
  
    IEEE Trans. Inf. Theory, 2019
    
  
    IEEE Trans. Inf. Theory, 2019
    
  
    J. Netw. Comput. Appl., 2019
    
  
    J. Ambient Intell. Humaniz. Comput., 2019
    
  
A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications.
    
  
    ISC Int. J. Inf. Secur., 2019
    
  
Biclique Cryptanalysis of Block Ciphers LBlock and TWINE-80 with Practical Data Complexity.
    
  
    ISC Int. J. Inf. Secur., 2019
    
  
Cryptanalysis and Improvement of a User Authentication Scheme for Internet of Things Using Elliptic Curve Cryptography.
    
  
    Int. J. Netw. Secur., 2019
    
  
Effect of unitary transformation on Bayesian information criterion for source numbering in array processing.
    
  
    IET Signal Process., 2019
    
  
On the Secrecy Performance of NOMA Systems with both External and Internal Eavesdroppers.
    
  
    CoRR, 2019
    
  
    Proceedings of the 2019 Iran Workshop on Communication and Information Theory, 2019
    
  
    Proceedings of the 2019 Iran Workshop on Communication and Information Theory, 2019
    
  
    Proceedings of the 2019 IEEE Information Theory Workshop, 2019
    
  
    Proceedings of the IEEE International Symposium on Information Theory, 2019
    
  
    Proceedings of the 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2019
    
  
    Proceedings of the 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2019
    
  
An Anonymous Attribute-based Access Control System Supporting Access Structure Update.
    
  
    Proceedings of the 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2019
    
  
  2018
    IEEE Trans. Green Commun. Netw., 2018
    
  
Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher (Extended Version).
    
  
    ISC Int. J. Inf. Secur., 2018
    
  
On the Security of O-PSI: A Delegated Private Set Intersection on Outsourced Datasets (Extended Version).
    
  
    ISC Int. J. Inf. Secur., 2018
    
  
    Int. J. Commun. Syst., 2018
    
  
    Int. J. Commun. Syst., 2018
    
  
Blind Interference Alignment for the K-User SISO Interference Channel Using Reconfigurable Antennas.
    
  
    IEEE Commun. Lett., 2018
    
  
    Proceedings of the Iran Workshop on Communication and Information Theory, 2018
    
  
    Proceedings of the 9th International Symposium on Telecommunications, 2018
    
  
  2017
A Location Privacy-Preserving Method for Spectrum Sharing in Database-Driven Cognitive Radio Networks.
    
  
    Wirel. Pers. Commun., 2017
    
  
    Wirel. Pers. Commun., 2017
    
  
A Secure and Efficient Chaotic Maps Based Authenticated Key-Exchange Protocol for Smart Grid.
    
  
    Wirel. Pers. Commun., 2017
    
  
Game-Based Privacy Analysis of RFID Security Schemes for Confident Authentication in IoT.
    
  
    Wirel. Pers. Commun., 2017
    
  
On Optimal Online Algorithms for Energy Harvesting Systems With Continuous Energy and Data Arrivals.
    
  
    IEEE Wirel. Commun. Lett., 2017
    
  
    IEEE Wirel. Commun. Lett., 2017
    
  
    Int. J. Commun. Syst., 2017
    
  
An Efficient Precoder Size for Interference Alignment of the K-User Interference Channel.
    
  
    IEEE Commun. Lett., 2017
    
  
Key management system for WSNs based on hash functions and elliptic curve cryptography.
    
  
    CoRR, 2017
    
  
    CoRR, 2017
    
  
    Comput. Networks, 2017
    
  
    Proceedings of the WSA 2017, 2017
    
  
    Proceedings of the Iran Workshop on Communication and Information Theory, 2017
    
  
    Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017
    
  
    Proceedings of the 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2017
    
  
    Proceedings of the 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2017
    
  
    Proceedings of the 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2017
    
  
On the Security of O-PSI a Delegated Private Set Intersection on Outsourced Datasets.
    
  
    Proceedings of the 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2017
    
  
    Proceedings of the 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2017
    
  
    Proceedings of the 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2017
    
  
    Proceedings of the 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2017
    
  
  2016
Imperfect and Perfect Secrecy in Compound Multiple Access Channel With Confidential Message.
    
  
    IEEE Trans. Inf. Forensics Secur., 2016
    
  
Energy Harvesting Systems With Continuous Energy and Data Arrivals: The Optimal Offline and Heuristic Online Algorithms.
    
  
    IEEE J. Sel. Areas Commun., 2016
    
  
Optimum decoder for multiplicative spread spectrum image watermarking with Laplacian modeling.
    
  
    ISC Int. J. Inf. Secur., 2016
    
  
    ISC Int. J. Inf. Secur., 2016
    
  
    Int. J. Internet Protoc. Technol., 2016
    
  
Cryptanalysis of McEliece cryptosystem variants based on quasi-cyclic low-density parity check codes.
    
  
    IET Inf. Secur., 2016
    
  
    IET Commun., 2016
    
  
    IET Commun., 2016
    
  
Code-based Strong Designated Verifier Signatures: Security Analysis and a New Construction.
    
  
    IACR Cryptol. ePrint Arch., 2016
    
  
    IACR Cryptol. ePrint Arch., 2016
    
  
Game-Based Privacy Analysis of RFID Security Schemes for Confident Au-thentication in IoT.
    
  
    IACR Cryptol. ePrint Arch., 2016
    
  
    Trans. Emerg. Telecommun. Technol., 2016
    
  
Squaring attacks on McEliece public-key cryptosystems using quasi-cyclic codes of even dimension.
    
  
    Des. Codes Cryptogr., 2016
    
  
    CoRR, 2016
    
  
Degrees of Freedom Rate Region of the $K$-user Interference Channel with Blind CSIT Using Staggered Antenna Switching.
    
  
    CoRR, 2016
    
  
    CoRR, 2016
    
  
An online transmission policy for energy harvesting systems with data traffic arrival.
    
  
    Proceedings of the Iran Workshop on Communication and Information Theory, 2016
    
  
    Proceedings of the Iran Workshop on Communication and Information Theory, 2016
    
  
Secrecy capacity in large cooperative networks in presence of eavesdroppers with unknown locations.
    
  
    Proceedings of the Iran Workshop on Communication and Information Theory, 2016
    
  
    Proceedings of the 8th International Symposium on Telecommunications, 2016
    
  
    Proceedings of the 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology, 2016
    
  
    Proceedings of the 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology, 2016
    
  
  2015
    Wirel. Pers. Commun., 2015
    
  
    Wirel. Pers. Commun., 2015
    
  
    Wirel. Networks, 2015
    
  
A revocable attribute based data sharing scheme resilient to DoS attacks in smart grid.
    
  
    Wirel. Networks, 2015
    
  
Key splitting: making random key distribution schemes resistant against node capture.
    
  
    Secur. Commun. Networks, 2015
    
  
An Improved Authentication Scheme for Electronic Payment Systems in Global Mobility Networks.
    
  
    Inf. Technol. Control., 2015
    
  
    ISC Int. J. Inf. Secur., 2015
    
  
    IET Commun., 2015
    
  
Analysis and Enhancement of Desynchronization Attack on an Ultralightweight RFID Authentication Protocol.
    
  
    IACR Cryptol. ePrint Arch., 2015
    
  
    IACR Cryptol. ePrint Arch., 2015
    
  
    IACR Cryptol. ePrint Arch., 2015
    
  
    IACR Cryptol. ePrint Arch., 2015
    
  
    IACR Cryptol. ePrint Arch., 2015
    
  
An Optimal Transmission Policy for Energy Harvesting Systems with Continuous Energy and Data Arrivals.
    
  
    CoRR, 2015
    
  
    CoRR, 2015
    
  
    Proceedings of the Iran Workshop on Communication and Information Theory, 2015
    
  
    Proceedings of the 2015 International Symposium on Wireless Communication Systems (ISWCS), 2015
    
  
    Proceedings of the IEEE International Symposium on Information Theory, 2015
    
  
    Proceedings of the Progress in Cryptology - INDOCRYPT 2015, 2015
    
  
  2014
    Wirel. Pers. Commun., 2014
    
  
Low-Data Complexity Biclique Cryptanalysis of Block Ciphers With Application to Piccolo and HIGHT.
    
  
    IEEE Trans. Inf. Forensics Secur., 2014
    
  
    ISC Int. J. Inf. Secur., 2014
    
  
Toward an energy efficient PKC-based key management system for wireless sensor networks.
    
  
    ISC Int. J. Inf. Secur., 2014
    
  
    ISC Int. J. Inf. Secur., 2014
    
  
    IET Commun., 2014
    
  
    IET Commun., 2014
    
  
Three-user interference channel with common information: a rate splitting-based achievability scheme.
    
  
    IET Commun., 2014
    
  
    IACR Cryptol. ePrint Arch., 2014
    
  
    IACR Cryptol. ePrint Arch., 2014
    
  
    Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2014
    
  
    Proceedings of the Iran Workshop on Communication and Information Theory, 2014
    
  
    Proceedings of the Iran Workshop on Communication and Information Theory, 2014
    
  
    Proceedings of the Iran Workshop on Communication and Information Theory, 2014
    
  
Random coding bound for E-capacity region of the relay channel with confidential messages.
    
  
    Proceedings of the Iran Workshop on Communication and Information Theory, 2014
    
  
    Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014
    
  
    Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014
    
  
    Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014
    
  
    Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014
    
  
    Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014
    
  
    Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014
    
  
    Proceedings of the IEEE International Conference on Communications, 2014
    
  
  2013
    Wirel. Pers. Commun., 2013
    
  
    IEEE Trans. Inf. Forensics Secur., 2013
    
  
Recursive Linear and Differential Cryptanalysis of Ultralightweight Authentication Protocols.
    
  
    IEEE Trans. Inf. Forensics Secur., 2013
    
  
    Secur. Commun. Networks, 2013
    
  
Key Agreement over a Generalized Multiple Access Channel Using Noiseless and Noisy Feedback.
    
  
    IEEE J. Sel. Areas Commun., 2013
    
  
    Inf. Process. Lett., 2013
    
  
    IET Commun., 2013
    
  
Power Allocation and Performance Analysis for Incremental-Selective Decode-and-Forward Cooperative Communications over Nakagami-<i>m</i> Fading Channels.
    
  
    IEICE Trans. Commun., 2013
    
  
Analysis and Improvement of the securing RFID systems conforming to EPC Class 1 Generation 2 standard.
    
  
    IACR Cryptol. ePrint Arch., 2013
    
  
A Secure and efficient elliptic curve based authentication and key agreement protocol suitable for WSN.
    
  
    IACR Cryptol. ePrint Arch., 2013
    
  
    IACR Cryptol. ePrint Arch., 2013
    
  
Secret Key Agreement Using Conferencing in State- Dependent Multiple Access Channels with An Eavesdropper
    
  
    CoRR, 2013
    
  
    Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013
    
  
    Proceedings of the Iran Workshop on Communication and Information Theory, 2013
    
  
    Proceedings of the Iran Workshop on Communication and Information Theory, 2013
    
  
    Proceedings of the Iran Workshop on Communication and Information Theory, 2013
    
  
    Proceedings of the Iran Workshop on Communication and Information Theory, 2013
    
  
    Proceedings of the Iran Workshop on Communication and Information Theory, 2013
    
  
    Proceedings of the 2013 IEEE Information Theory Workshop, 2013
    
  
    Proceedings of the 2013 IEEE Information Theory Workshop, 2013
    
  
    Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013
    
  
A technique for deriving one-shot achievability results in network information theory.
    
  
    Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013
    
  
    Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013
    
  
    Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013
    
  
    Proceedings of the 10th International ISC Conference on Information Security and Cryptology, 2013
    
  
    Proceedings of the 10th International ISC Conference on Information Security and Cryptology, 2013
    
  
  2012
On the Capacity of Interference Channel With Causal and Noncausal Generalized Feedback at the Cognitive Transmitter.
    
  
    IEEE Trans. Inf. Theory, 2012
    
  
    ISC Int. J. Inf. Secur., 2012
    
  
    IET Inf. Secur., 2012
    
  
Dynamic and secure key management model for hierarchical heterogeneous sensor networks.
    
  
    IET Inf. Secur., 2012
    
  
    IET Commun., 2012
    
  
    IET Commun., 2012
    
  
An Efficient Multistage Secret Sharing Scheme Using Linear One-way Functions and Bilinear Maps.
    
  
    IACR Cryptol. ePrint Arch., 2012
    
  
    IACR Cryptol. ePrint Arch., 2012
    
  
    CoRR, 2012
    
  
On the Capacity of Interference Channel with Causal and Non-causal Generalized Feedback at the Cognitive Transmitter
    
  
    CoRR, 2012
    
  
    Proceedings of the 2012 Swedish Communication Technologies Workshop, Swe-CTW 2012, Lund, 2012
    
  
Lattice coding for multiple access channels with common message and additive interference.
    
  
    Proceedings of the 2012 IEEE Information Theory Workshop, 2012
    
  
    Proceedings of the 2012 IEEE Information Theory Workshop, 2012
    
  
On the achievable rate region of a new Gaussian wiretap channel with side information.
    
  
    Proceedings of the 2012 IEEE Information Theory Workshop, 2012
    
  
    Proceedings of the 2012 International Symposium on Wireless Communication Systems (ISWCS), 2012
    
  
    Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012
    
  
    Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012
    
  
    Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012
    
  
On the secrecy capacity of 3-receiver Broadcast Channel with causal states and conferencing.
    
  
    Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012
    
  
    Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012
    
  
Analytical evaluation of a new MAC algorithm for underwater wireless sensor networks.
    
  
    Proceedings of the 19th International Conference on Telecommunications, 2012
    
  
    Proceedings of the 20th IEEE International Conference on Network Protocols, 2012
    
  
  2011
The Capacity Region of p -Transmitter/ q -Receiver Multiple-Access Channels With Common Information.
    
  
    IEEE Trans. Inf. Theory, 2011
    
  
    IEEE Trans. Inf. Theory, 2011
    
  
    IET Commun., 2011
    
  
Compress-and-Forward Strategy for Cognitive Interference Channel with Unlimited Look-Ahead.
    
  
    IEEE Commun. Lett., 2011
    
  
    EURASIP J. Wirel. Commun. Netw., 2011
    
  
    CoRR, 2011
    
  
    CoRR, 2011
    
  
Achievable Rate Region for Multiple Access Channel with Correlated Channel States and Cooperating Encoders
    
  
    CoRR, 2011
    
  
    Proceedings of the Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, 2011
    
  
    Proceedings of the IEEE 13th International Workshop on Multimedia Signal Processing (MMSP 2011), 2011
    
  
    Proceedings of the 2011 IEEE Information Theory Workshop, 2011
    
  
    Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011
    
  
    Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011
    
  
The capacity region of a class of 3-receiver broadcast channels with two eavesdroppers.
    
  
    Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011
    
  
    Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011
    
  
    Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011
    
  
    Proceedings of the Communications and Multimedia Security, 2011
    
  
    Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011
    
  
    Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011
    
  
  2010
    IEEE Trans. Signal Process., 2010
    
  
    J. Commun. Networks, 2010
    
  
    IET Commun., 2010
    
  
    IET Commun., 2010
    
  
    IET Commun., 2010
    
  
Compress-and-forward strategy for relay channel with causal and non-causal channel state information.
    
  
    IET Commun., 2010
    
  
    IEEE Commun. Lett., 2010
    
  
    Proceedings of the 2010 IEEE Information Theory Workshop, 2010
    
  
    Proceedings of the 2010 IEEE Information Theory Workshop, 2010
    
  
Capacity regions for some classes of Causal Cognitive Interference Channels with delay.
    
  
    Proceedings of the 2010 IEEE Information Theory Workshop, 2010
    
  
Achievable rate regions for Dirty Tape Channels and "joint writing on Dirty paper and Dirty Tape".
    
  
    Proceedings of the 2010 IEEE Information Theory Workshop, 2010
    
  
    Proceedings of the Information Security, 2010
    
  
    Proceedings of the International Symposium on Information Theory and its Applications, 2010
    
  
    Proceedings of the International Symposium on Information Theory and its Applications, 2010
    
  
    Proceedings of the International Symposium on Information Theory and its Applications, 2010
    
  
The capacity region of a class of Relay-Broadcast Channels and relay channels with three parallel unmatched subchannels.
    
  
    Proceedings of the International Symposium on Information Theory and its Applications, 2010
    
  
    Proceedings of the International Symposium on Information Theory and its Applications, 2010
    
  
    Proceedings of the International Symposium on Information Theory and its Applications, 2010
    
  
    Proceedings of the IEEE International Symposium on Information Theory, 2010
    
  
The capacity region of fading Multiple Access Channels with cooperative encoders and partial CSIT.
    
  
    Proceedings of the IEEE International Symposium on Information Theory, 2010
    
  
    Proceedings of the IEEE International Symposium on Information Theory, 2010
    
  
State-Dependent Relay Channel with Private Messages with partial causal and non-causal Channel State Information.
    
  
    Proceedings of the IEEE International Symposium on Information Theory, 2010
    
  
    Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010
    
  
    Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
    
  
  2009
    IEEE Trans. Wirel. Commun., 2009
    
  
    IEEE Trans. Signal Process., 2009
    
  
Efficient method for simplifying and approximating the s-boxes based on power functions.
    
  
    IET Inf. Secur., 2009
    
  
New achievable rate and a certain capacity result for a stochastic two relay network with no interference.
    
  
    IET Commun., 2009
    
  
    IET Commun., 2009
    
  
Symmetric relaying based on partial decoding and the capacity of a class of relay networks.
    
  
    IET Commun., 2009
    
  
Efficient secure channel coding based on quasi-cyclic low-density parity-check codes.
    
  
    IET Commun., 2009
    
  
    Proceedings of the 2009 IEEE Information Theory Workshop, 2009
    
  
    Proceedings of the IEEE International Symposium on Information Theory, 2009
    
  
    Proceedings of the IEEE International Symposium on Information Theory, 2009
    
  
    Proceedings of the IEEE International Symposium on Information Theory, 2009
    
  
The capacity region of the parallel partially cooperative relay broadcast channel with unmatched degraded subchannels.
    
  
    Proceedings of the IEEE International Symposium on Information Theory, 2009
    
  
    Proceedings of the IEEE International Symposium on Information Theory, 2009
    
  
    Proceedings of the IEEE International Symposium on Information Theory, 2009
    
  
Compress-and-forward strategy for the relay channel with non-causal State Information.
    
  
    Proceedings of the IEEE International Symposium on Information Theory, 2009
    
  
    Proceedings of the Information and Communications Security, 11th International Conference, 2009
    
  
    Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009
    
  
    Proceedings of the 2009 IEEE International Conference on Electro/Information Technology, 2009
    
  
  2008
    IEEE Signal Process. Lett., 2008
    
  
    EURASIP J. Wirel. Commun. Netw., 2008
    
  
    Proceedings of the 6th International Symposium on Modeling and Optimization in Mobile, 2008
    
  
    Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008
    
  
    Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008
    
  
    Proceedings of the 2008 International Conference on Telecommunications, 2008
    
  
Impossible Differential Cryptanalysis of Safer++.
  
    Proceedings of the 2008 International Conference on Security & Management, 2008
    
  
  2007
A Fast Multiple-Source Detection and Localization Array Signal Processing Algorithm Using the Spatial Filtering and ML Approach.
    
  
    IEEE Trans. Signal Process., 2007
    
  
A New Achievable Rate and the Capacity of a Class of Semi-Deterministic Relay Networks.
    
  
    Proceedings of the IEEE International Symposium on Information Theory, 2007
    
  
  2006
A New (t, n) Multi-Secret Sharing Scheme Based on Linear Algebra.
  
    Proceedings of the SECRYPT 2006, 2006
    
  
  2004
    IEEE Trans. Wirel. Commun., 2004
    
  
  2003
Mobility modeling and analytical solution for spatial traffic distribution in wireless multimedia networks.
    
  
    IEEE J. Sel. Areas Commun., 2003
    
  
  2002
    Proceedings of the 12th IEEE International Symposium on Personal, 2002
    
  
  1993
    Proceedings of the Information Theory and Applications, Third Canadian Workshop, Rockland, Ontario, Canada, May 30, 1993
    
  
  1982