Ehsan Meamari

According to our database1, Ehsan Meamari authored at least 13 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
zk-IoT: Securing the Internet of Things with Zero-Knowledge Proofs on Blockchain Platforms.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2024

2020
Collusion Attacks on Decentralized Attributed-Based Encryption: Analyses and a Solution.
CoRR, 2020

Profit from Two Bitcoin Mining Tactics: Towing and Shutdown.
CoRR, 2020

Attribute-based Multi-Signature and Encryption for EHR Management: A Blockchain-based Solution.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2020

Data User-Based Attribute Based Encryption.
Proceedings of the 54th Annual Conference on Information Sciences and Systems, 2020

2019
Defense against Lion Attack in Cognitive Radio Systems using the Markov Decision Process Approach.
CoRR, 2019

Multi-Authority Attribute-Based Access Control with Smart Contract.
Proceedings of the 2019 International Conference on Blockchain Technology, 2019

2018
Blockchain-inspired Event Recording System for Autonomous Vehicles.
CoRR, 2018

2016
C-trust: A trust management system to improve fairness on circular P2P networks.
Peer-to-Peer Netw. Appl., 2016

Game Theory-Based Analysis on Interactions Among Secondary and Malicious Users in Coordinated Jamming Attack in Cognitive Radio Systems.
J. Circuits Syst. Comput., 2016

Structural-based tunneling: preserving mutual anonymity for circular P2P networks.
Int. J. Commun. Syst., 2016

2014
BSRone: Binary Search with Routing of O(1); A Scalable Circular Design for Distributed Networks.
CoRR, 2014

2013
An analysis on interactions among secondary user and unknown jammer in cognitive radio systems by fictitious play.
Proceedings of the 10th International ISC Conference on Information Security and Cryptology, 2013


  Loading...