Mohammad Hesam Tadayon

Orcid: 0000-0002-0865-7993

Affiliations:
  • Tarbiat Modares University, Tehran, Iran


According to our database1, Mohammad Hesam Tadayon authored at least 27 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
IoT-friendly, pre-computed and outsourced attribute based encryption.
Future Gener. Comput. Syst., January, 2024

Corrigendum to "IoT-friendly, pre-computed and outsourced attribute based encryption" [Future Generation Computer Systems (FGCS) volume 150 (2024) 115-126/ FGCS-D-23-00424].
Future Gener. Comput. Syst., 2024

2023
Secure ticket-based authentication method for IoT applications.
Digit. Commun. Networks, June, 2023

2022
An intelligent cryptographic key management model for secure communications in distributed industrial intelligent systems.
Int. J. Intell. Syst., December, 2022

A Quantitative Comparative Study of Data-oriented Trust Management Schemes in Internet of Things.
ACM Trans. Manag. Inf. Syst., 2022

A Secure and Decentralized Trust Management Scheme for Smart Health Systems.
IEEE J. Biomed. Health Informatics, 2022

Twin Sudoku Puzzles and Triplet Solid Sudoku Cubes From Strongly Mutually Distinct Twin Sudoku Tables.
IEEE Trans. Games, 2022

2021
A Secure Ticket-Based Authentication Mechanism for Proxy Mobile IPv6 Networks in Volunteer Computing.
ACM Trans. Internet Techn., 2021

Layered Architecture for Internet of Things-based Healthcare System: A Systematic Literature Review.
Informatica (Slovenia), 2021

2020
Intelligent robust control for cyber-physical systems of rotary gantry type under denial of service attack.
J. Supercomput., 2020

Construction of Strongly Mutually Distinct Sudoku Tables and Solid Sudoku Cubes by Cyclotomic Cosets.
IEEE Trans. Games, 2020

2018
A Novel Identity-Based Key Establishment Method for Advanced Metering Infrastructure in Smart Grid.
IEEE Trans. Smart Grid, 2018

Efficient Search of Compact QC-LDPC and SC-LDPC Convolutional Codes With Large Girth.
IEEE Commun. Lett., 2018

On the Stopping Distance of SA-LDPC Codes by Transversal Designs.
IEEE Access, 2018

Compact QC-LDPC Block and SC-LDPC Convolutional Codes for Low-Latency Communications.
Proceedings of the 29th IEEE Annual International Symposium on Personal, 2018

2017
Comments and improvements of "HOTA: Handover optimized ticket-based authentication in network-based mobility management".
Proceedings of the 20th Conference on Innovations in Clouds, Internet and Networks, 2017

2016
Clique-Based Neural Associative Memories with Local Coding and Precoding.
Neural Comput., 2016

Proposed new features to improve Android malware detection.
Proceedings of the 8th International Symposium on Telecommunications, 2016

Welcome to Binder: A kernel level attack model for the Binder in Android operating system.
Proceedings of the 8th International Symposium on Telecommunications, 2016

Automated analysis method for forensic investigation of cloud applications on Android.
Proceedings of the 8th International Symposium on Telecommunications, 2016

2015
On the Burst Erasure Efficiency of Array LDPC Codes.
Wirel. Pers. Commun., 2015

Dynamic and verifiable multi-secret sharing scheme based on Hermite interpolation and bilinear maps.
IET Inf. Secur., 2015

Neural network associative memories with local coding.
Proceedings of the 14th IEEE Canadian Workshop on Information Theory, 2015

2011
More on the Stopping and Minimum Distances of Array Codes.
IEEE Trans. Commun., 2011

2009
A lattice-based systematic recursive construction of quasi-cyclic LDPC codes.
IEEE Trans. Commun., 2009

An Optimization Theoretic Framework for Video Transmission with Minimal Total Distortion over Wireless Networks.
EURASIP J. Wirel. Commun. Netw., 2009

2008
A novel approach to generating long low-density parity-check codes using two configurations.
IET Commun., 2008


  Loading...