Somayeh Salimi

According to our database1, Somayeh Salimi authored at least 37 papers between 2009 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Towards Scalable Security in Interference Channels With Arbitrary Number of Users.
CoRR, 2020

Scalable Security in Interference Channels With Arbitrary Number of Users.
Proceedings of the International Symposium on Information Theory and Its Applications, 2020

2019
Sequential Detection of Deception Attacks in Networked Control Systems with Watermarking.
Proceedings of the 17th European Control Conference, 2019

2017
Optimal secure partial-repair in distributed storage systems.
Proceedings of the 51st Annual Conference on Information Sciences and Systems, 2017

Preserving confidentiality in the Gaussian broadcast channel using compute-and-forward.
Proceedings of the 51st Annual Conference on Information Sciences and Systems, 2017

2016
Strong Secrecy in Pairwise Key Agreement over a Generalized Multiple Access Channel.
CoRR, 2016

Security in the Gaussian interference channel: Weak and moderately weak interference regimes.
Proceedings of the IEEE International Symposium on Information Theory, 2016

2015
The CEO Problem With Secrecy Constraints.
IEEE Trans. Inf. Forensics Secur., 2015

Pairwise Secret Key Agreement based on Location-derived Common Randomness.
CoRR, 2015

Compute-and-forward can buy secrecy cheap.
Proceedings of the IEEE International Symposium on Information Theory, 2015

Key agreement over an interference channel with noiseless feedback: Achievable region & distributed allocation.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Secure partial repair in wireless caching networks with broadcast channels.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Finite-SNR regime analysis of the Gaussian wiretap multiple-access channel.
Proceedings of the 53rd Annual Allerton Conference on Communication, 2015

2014
On transmission of a remote source with secrecy constraints over noisy channels.
Proceedings of the 2014 IEEE Global Conference on Signal and Information Processing, 2014

2013
Key Agreement over a Generalized Multiple Access Channel Using Noiseless and Noisy Feedback.
IEEE J. Sel. Areas Commun., 2013

High SNR performance of amplify-and-forward relaying in Rayleigh fading wiretap channels.
Proceedings of the Iran Workshop on Communication and Information Theory, 2013

Pairwise Key Agreement over a Generalized Multiple Access Channel: Capacity Bounds and Game-Theoretic Analysis.
Proceedings of the ISWCS 2013, 2013

The Lossless CEO Problem with Security Constraints.
Proceedings of the ISWCS 2013, 2013

2012
Simultaneously generating multiple keys in a four-terminal network.
IET Inf. Secur., 2012

Secret key agreement using correlated sources over the generalized multiple access channel.
Proceedings of the 2012 IEEE Information Theory Workshop, 2012

Pairwise secret key agreement using the source common randomness.
Proceedings of the 2012 International Symposium on Wireless Communication Systems (ISWCS), 2012

Layered LDPC convolutional codes for compression of correlated sources under adversarial attacks.
Proceedings of the International Symposium on Information Theory and its Applications, 2012

2011
Key Agreement Over Multiple Access Channel.
IEEE Trans. Inf. Forensics Secur., 2011

Rate regions of secret key sharing in a new source model.
IET Commun., 2011

Private Identification, Authentication and Key Agreement Protocol with Security Mode Setup.
IACR Cryptol. ePrint Arch., 2011

A New Secret key Agreement Scheme in a Four-Terminal Network
CoRR, 2011

Key agreement over multiple access channel using feedback channel.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

Analysis of an adjacent 3G network corruption influence on WLAN/3G interworking access.
Proceedings of the International Conference on Computational Aspects of Social Networks, 2011

2010
Anonymous roaming in universal mobile telecommunication system mobile networks.
IET Inf. Secur., 2010

Generalised secure distributed source coding with side information.
IET Commun., 2010

Generalized Secure Distributed Source Coding with Side Information
CoRR, 2010

Security enhancements against UMTS-GSM interworking attacks.
Comput. Networks, 2010

Generalized multiple-access relay channel with confidential messages.
Proceedings of the International Symposium on Information Theory and its Applications, 2010

Secret key rate region of multiple access channel model.
Proceedings of the International Symposium on Information Theory and its Applications, 2010

Cognitive interference channel with two confidential messages.
Proceedings of the International Symposium on Information Theory and its Applications, 2010

2009
New attacks on UMTS network access.
Proceedings of the 2009 Wireless Telecommunications Symposium, 2009

An Extended Authentication and Key Agreement Protocol of UMTS.
Proceedings of the Information Security Practice and Experience, 2009


  Loading...