Hoda Jannati

Orcid: 0000-0001-5741-4843

According to our database1, Hoda Jannati authored at least 24 papers between 2008 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Location Privacy Preservation for Secondary Users in a Database-Driven Cognitive Radio Network.
ISC Int. J. Inf. Secur., 2022

2021
Privacy in Cross-User Data Deduplication.
Mob. Networks Appl., 2021

2019
On the security of one-round meeting location determination protocol.
Inf. Process. Lett., 2019

2017
A Location Privacy-Preserving Method for Spectrum Sharing in Database-Driven Cognitive Radio Networks.
Wirel. Pers. Commun., 2017

An Oblivious Transfer Protocol Based on Elgamal Encryption for Preserving Location Privacy.
Wirel. Pers. Commun., 2017

An improved authentication protocol for distributed mobile cloud computing services.
Int. J. Crit. Infrastructure Prot., 2017

Analysis of a Distance Bounding Protocol for Verifying the Proximity of Two-Hop Neighbors.
Proceedings of the 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2017

2016
Detecting relay attacks on RFID communication systems using quantum bits.
Quantum Inf. Process., 2016

Security analysis of an RFID tag search protocol.
Inf. Process. Lett., 2016

Distance bounding-based RFID binding proof protocol to protect inpatient medication safety against relay attack.
Int. J. Ad Hoc Ubiquitous Comput., 2016

2015
An RFID Search Protocol Secured Against Relay Attack Based on Distance Bounding Approach.
Wirel. Pers. Commun., 2015

Achieving an appropriate security level for distance bounding protocols over a noisy channel.
Telecommun. Syst., 2015

Analysis of false-reject probability in distance bounding protocols with mixed challenges over RFID noisy communication channel.
Inf. Process. Lett., 2015

Analysis of relay, terrorist fraud and distance fraud attacks on RFID systems.
Int. J. Crit. Infrastructure Prot., 2015

An efficient mutual distance bounding protocol over a binary symmetric noisy communication channel.
Int. J. Ad Hoc Ubiquitous Comput., 2015

Security Analysis of Niu et al. Authentication and Ownership Management Protocol.
IACR Cryptol. ePrint Arch., 2015

All-or-nothing approach to protect a distance bounding protocol against terrorist fraud attack for low-cost devices.
Electron. Commer. Res., 2015

2014
Mutual Distance Bounding Protocol with Its Implementability Over a Noisy Channel and Its Utilization for Key Agreement in Peer-to-Peer Wireless Networks.
Wirel. Pers. Commun., 2014

2013
Introducing proxy zero-knowledge proof and utilization in anonymous credential systems.
Secur. Commun. Networks, 2013

2012
Security enhanced user authentication scheme for wireless sensor network.
Int. J. Electron. Secur. Digit. Forensics, 2012

Cryptanalysis and enhancement of two low cost rfid authentication protocols
CoRR, 2012

2011
Cryptanalysis and Enhancement of a Secure Group Ownership Transfer Protocol for RFID Tags.
Proceedings of the Global Security, Safety and Sustainability & e-Democracy, 2011

2010
A Proxy Signature Scheme Based on Coding Theory.
Proceedings of the Global Security, Safety, and Sustainability, 2010

2008
New Proxy Signature, Proxy Blind Signature and Blind Proxy Signature Based on the Okamoto Signature.
Proceedings of the 2008 International Conference on Security & Management, 2008


  Loading...