Mahmoud Ahmadian-Attari
According to our database1,
Mahmoud Ahmadian-Attari
authored at least 71 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Deep Gaussian Process for Channel Estimation in LIS-Assisted mm-Wave Massive MIMO Systems.
IEEE Trans. Veh. Technol., December, 2024
An Attack on a Proposed Construction of Small-State Stream Ciphers and Proposals for New Constructions.
Comput. J., January, 2024
A BFF-Based Attention Mechanism for Trajectory Estimation in mmWave MIMO Communications.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2024
2023
2022
A Lightweight Auditing Service for Shared Data with Secure User Revocation in Cloud Storage.
IEEE Trans. Serv. Comput., 2022
Location Privacy Preservation for Secondary Users in a Database-Driven Cognitive Radio Network.
ISC Int. J. Inf. Secur., 2022
Int. J. Internet Protoc. Technol., 2022
2020
A lightweight identity-based provable data possession supporting users' identity privacy and traceability.
J. Inf. Secur. Appl., 2020
Clust. Comput., 2020
2019
Real-Time Cooperative Adaptive Robust Relay Beamforming Based on Kalman Filtering Channel Estimation.
IEEE Trans. Wirel. Commun., 2019
IEEE Trans. Commun., 2019
J. Netw. Comput. Appl., 2019
Worst-Case Jamming Attack and Optimum Defense Strategy in Cooperative Relay Networks.
IEEE Control. Syst. Lett., 2019
2018
IEEE Trans. Commun., 2018
IET Commun., 2018
2017
A Location Privacy-Preserving Method for Spectrum Sharing in Database-Driven Cognitive Radio Networks.
Wirel. Pers. Commun., 2017
Bidirectional AF Relaying With Underlay Spectrum Sharing in Cognitive Radio Networks.
IEEE Trans. Veh. Technol., 2017
Network-Coded Two-Way Relaying in Spectrum-Sharing Systems With Quality-of-Service Requirements.
IEEE Trans. Veh. Technol., 2017
Int. J. Commun. Syst., 2017
Cryptanalysis and improvement of a three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps.
Int. J. Commun. Syst., 2017
2016
Wirel. Pers. Commun., 2016
Imperfect and Perfect Secrecy in Compound Multiple Access Channel With Confidential Message.
IEEE Trans. Inf. Forensics Secur., 2016
IEEE Trans. Commun., 2016
A provably secure and efficient authentication scheme for access control in mobile pay-TV systems.
Multim. Tools Appl., 2016
A new detector for contourlet domain multiplicative image watermarking using Bessel K form distribution.
J. Vis. Commun. Image Represent., 2016
An anonymous and untraceable password-based authentication scheme for session initiation protocol using smart cards.
Int. J. Commun. Syst., 2016
Cryptanalysis of McEliece cryptosystem variants based on quasi-cyclic low-density parity check codes.
IET Inf. Secur., 2016
IET Commun., 2016
IET Commun., 2016
An Efficient Algorithm to Improve the Success Threshold of Node-Based Verification-Based Algorithms in Compressed Sensing.
IEEE Commun. Lett., 2016
Squaring attacks on McEliece public-key cryptosystems using quasi-cyclic codes of even dimension.
Des. Codes Cryptogr., 2016
2015
Wirel. Pers. Commun., 2015
IEEE Trans. Commun., 2015
Key splitting: making random key distribution schemes resistant against node capture.
Secur. Commun. Networks, 2015
Low-complexity robust relay optimisation for multiple peer-to-peer beamforming: a safe tractable approximation approach.
IET Commun., 2015
2014
An efficient client-client password-based authentication scheme with provable security.
J. Supercomput., 2014
A secure and efficient identity-based authenticated key exchange protocol for mobile client-server networks.
J. Supercomput., 2014
An Enhanced and Secure Three-Party Password-based Authenticated Key Exchange Protocol without Using Server's Public-Keys and Symmetric Cryptosystems.
Inf. Technol. Control., 2014
Int. J. Netw. Secur., 2014
Performance analysis of two-way decode-and-forward relaying in the presence of co-channel interferences.
IET Commun., 2014
Proceedings of the IEEE International Conference on Communications, 2014
2013
Inf. Technol. Control., 2013
Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC.
ISC Int. J. Inf. Secur., 2013
Comput. Electr. Eng., 2013
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013
Proceedings of the 2013 IEEE Information Theory Workshop, 2013
2012
LLR Approximation for Wireless Channels Based on Taylor Series and its Application to BICM With LDPC Codes.
IEEE Trans. Commun., 2012
Design of Finite-Length Irregular Protograph Codes with Low Error Floors over the Binary-Input AWGN Channel Using Cyclic Liftings.
IEEE Trans. Commun., 2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Cooperative spectrum sensing by improved energy detector for heterogeneous environments in cognitive radio networks.
Proceedings of the 6th International Symposium on Telecommunications, 2012
Proceedings of the 20th IEEE International Conference on Network Protocols, 2012
2011
IEEE Trans. Inf. Theory, 2011
IACR Cryptol. ePrint Arch., 2011
CoRR, 2011
CoRR, 2011
Proceedings of the 2011 IEEE Information Theory Workshop, 2011
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011
Proceedings of the 49th Annual Allerton Conference on Communication, 2011
2010
Proceedings of the Global Communications Conference, 2010
2008
Proceedings of the 6th International Symposium on Modeling and Optimization in Mobile, 2008
2000
Proceedings of the 11th IEEE International Symposium on Personal, 2000