Muhammad Reza Z'aba

Orcid: 0000-0003-4908-7816

According to our database1, Muhammad Reza Z'aba authored at least 23 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Sponge-Based Parallel Authenticated Encryption With Variable Tag Length and Side-Channel Protection.
IEEE Access, 2023

2022
Parallel Sponge-Based Authenticated Encryption With Side-Channel Protection and Adversary-Invisible Nonces.
IEEE Access, 2022

Authenticated Encryption Schemes: A Systematic Review.
IEEE Access, 2022

2021
Wireless backhaul network's capacity optimization using time series forecasting approach.
J. Ambient Intell. Humaniz. Comput., 2021

Spectrum sensing challenges & their solutions in cognitive radio based vehicular networks.
Int. J. Commun. Syst., 2021

Multi-Objective Harris Hawks Optimization Algorithm Based 2-Hop Routing Algorithm for CR-VANET.
IEEE Access, 2021

2020
Adapted stream region for packet marking based on DDoS attack detection in vehicular ad hoc networks.
J. Supercomput., 2020

A Cooperative Heterogeneous Vehicular Clustering Mechanism for Road Traffic Management.
Int. J. Parallel Program., 2020

Assessing the cyber-security of the IEC 60870-5-104 protocol in SCADA system.
Int. J. Crit. Infrastructures, 2020

Capacity and Frequency Optimization of Wireless Backhaul Network Using Traffic Forecasting.
IEEE Access, 2020

Comprehensive Survey of Machine Learning Approaches in Cognitive Radio-Based Vehicular Ad Hoc Networks.
IEEE Access, 2020

2019
LTE efficiency when used in traffic information systems: A stable interest aware clustering.
Int. J. Commun. Syst., 2019

2018
A Multivariant Stream Analysis Approach to Detect and Mitigate DDoS Attacks in Vehicular Ad Hoc Networks.
Wirel. Commun. Mob. Comput., 2018

2017
Searchable Data Vault: Encrypted Queries in Secure Distributed Cloud Storage.
Algorithms, 2017

2016
Construction of Cryptographically Strong S-Boxes Inspired by Bee Waggle Dance.
New Gener. Comput., 2016

2013
S-box construction from non-permutation power functions.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

2012
Randomness analysis on LED block ciphers.
Proceedings of the 5th International Conference of Security of Information and Networks, 2012

Structured Encryption for Conceptual Graphs.
Proceedings of the Advances in Information and Computer Security, 2012

2011
On the security and practicality of a buyer seller watermarking protocol for DRM.
Proceedings of the 4th International Conference on Security of Information and Networks, 2011

AES: Current security and efficiency analysis of its alternatives.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

2009
Linearity within the SMS4 Block Cipher.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009

Algebraic Analysis of LEX.
Proceedings of the Seventh Australasian Information Security Conference, 2009

2008
Bit-Pattern Based Integral Attack.
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008


  Loading...