Hoda Jannati
Orcid: 0000-0001-5741-4843
According to our database1,
Hoda Jannati
authored at least 24 papers
between 2008 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2022
Location Privacy Preservation for Secondary Users in a Database-Driven Cognitive Radio Network.
ISC Int. J. Inf. Secur., 2022
2021
2019
Inf. Process. Lett., 2019
2017
A Location Privacy-Preserving Method for Spectrum Sharing in Database-Driven Cognitive Radio Networks.
Wirel. Pers. Commun., 2017
An Oblivious Transfer Protocol Based on Elgamal Encryption for Preserving Location Privacy.
Wirel. Pers. Commun., 2017
Int. J. Crit. Infrastructure Prot., 2017
Analysis of a Distance Bounding Protocol for Verifying the Proximity of Two-Hop Neighbors.
Proceedings of the 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2017
2016
Quantum Inf. Process., 2016
Distance bounding-based RFID binding proof protocol to protect inpatient medication safety against relay attack.
Int. J. Ad Hoc Ubiquitous Comput., 2016
2015
An RFID Search Protocol Secured Against Relay Attack Based on Distance Bounding Approach.
Wirel. Pers. Commun., 2015
Achieving an appropriate security level for distance bounding protocols over a noisy channel.
Telecommun. Syst., 2015
Analysis of false-reject probability in distance bounding protocols with mixed challenges over RFID noisy communication channel.
Inf. Process. Lett., 2015
Int. J. Crit. Infrastructure Prot., 2015
An efficient mutual distance bounding protocol over a binary symmetric noisy communication channel.
Int. J. Ad Hoc Ubiquitous Comput., 2015
IACR Cryptol. ePrint Arch., 2015
All-or-nothing approach to protect a distance bounding protocol against terrorist fraud attack for low-cost devices.
Electron. Commer. Res., 2015
2014
Mutual Distance Bounding Protocol with Its Implementability Over a Noisy Channel and Its Utilization for Key Agreement in Peer-to-Peer Wireless Networks.
Wirel. Pers. Commun., 2014
2013
Introducing proxy zero-knowledge proof and utilization in anonymous credential systems.
Secur. Commun. Networks, 2013
2012
Int. J. Electron. Secur. Digit. Forensics, 2012
CoRR, 2012
2011
Cryptanalysis and Enhancement of a Secure Group Ownership Transfer Protocol for RFID Tags.
Proceedings of the Global Security, Safety and Sustainability & e-Democracy, 2011
2010
Proceedings of the Global Security, Safety, and Sustainability, 2010
2008
New Proxy Signature, Proxy Blind Signature and Blind Proxy Signature Based on the Okamoto Signature.
Proceedings of the 2008 International Conference on Security & Management, 2008