Mahdi R. Alagheband
Orcid: 0000-0002-2581-3273
According to our database1,
Mahdi R. Alagheband
authored at least 22 papers
between 2011 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Formal unlinkability analysis of message authentication protocols based on authentic channels.
J. Supercomput., May, 2023
A conditional privacy-preserving fair electronic payment scheme based on blockchain without trusted third party.
J. Ambient Intell. Humaniz. Comput., 2023
2022
Advanced encryption schemes in multi-tier heterogeneous internet of things: taxonomy, capabilities, and objectives.
J. Supercomput., 2022
Advanced digital signatures for preserving privacy and trust management in hierarchical heterogeneous IoT: Taxonomy, capabilities, and objectives.
Internet Things, 2022
2021
Int. J. Speech Technol., 2021
A new provable hierarchical anonymous certificateless authentication protocol with aggregate verification in ADS-B systems.
Comput. Networks, 2021
2020
Provably privacy analysis and improvements of the lightweight RFID authentication protocols.
Wirel. Networks, 2020
ACM Trans. Manag. Inf. Syst., 2020
Design of a secure communication system between base transmitter station and mobile equipment based on finite-time chaos synchronisation.
Int. J. Syst. Sci., 2020
2018
Performing and mitigating force and terrorist fraud attacks against two RFID distance-bounding protocols.
J. Inf. Secur. Appl., 2018
Provable analysis and improvement of smart card-based anonymous authentication protocols.
Int. J. Commun. Syst., 2018
Analysis and Improvement of a Lightweight Anonymous Authentication Protocol for Mobile Pay-TV Systems (Full text).
CoRR, 2018
Analysis and Improvement of a Lightweight Anonymous Authentication Protocol for Mobile Pay-TV Systems.
Proceedings of the 9th International Symposium on Telecommunications, 2018
2016
Proceedings of the 10th International Symposium on Communication Systems, 2016
2014
Wirel. Pers. Commun., 2014
2013
Secur. Commun. Networks, 2013
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013
2012
Dynamic and secure key management model for hierarchical heterogeneous sensor networks.
IET Inf. Secur., 2012
2011
Practical Attacks on a RFID Authentication Protocol Conforming to EPC C-1 G-2 Standard
CoRR, 2011
Proceedings of the Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, 2011
Proceedings of the Communications and Multimedia Security, 2011