Majid Naderi
According to our database1,
Majid Naderi
authored at least 44 papers
between 2007 and 2016.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2016
Wirel. Commun. Mob. Comput., 2016
2015
IEEE Trans. Parallel Distributed Syst., 2015
Evaluation of Single Dimensional Sensor Network Implemented Using Slave-Slave Bridging in IEEE 802.15.4 Technology.
Ad Hoc Sens. Wirel. Networks, 2015
2014
Neural Comput. Appl., 2014
Int. J. Medical Informatics, 2014
2013
Increasing Lifetime of a Two-Dimensional Wireless Sensor Network Using Radio Range Adjustments.
IEICE Trans. Inf. Syst., 2013
Proceedings of the 78th IEEE Vehicular Technology Conference, 2013
Interaction of clustering period and event sensing reliability in IEEE 802.15.4 based WSNs.
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013
2012
J. Medical Syst., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, 2012
Proceedings of the Radio Frequency Identification. Security and Privacy Issues, 2012
2011
Heavy-tail and voice over internet protocol traffic: queueing analysis for performance evaluation.
IET Commun., 2011
Cryptanalysis of Cho <i>et al.</i>'s Protocol, A Hash-Based Mutual Authentication Protocol for RFID Systems.
IACR Cryptol. ePrint Arch., 2011
Cryptanalysis of improved Yeh <i>et al.</i>'s authentication Protocol: An EPC Class-1 Generation-2 standard compliant protocol.
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
Cryptanalysis of AZUMI: an EPC Class-1 Generation-2 Standard Compliant RFID Authentication Protocol.
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011
On the Security of Mutual Authentication Protocols for RFID Systems: The Case of Wei et al.'s Protocol.
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011
Proceedings of the Sixth International Conference on Availability, 2011
2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010
Proceedings of the Cryptology and Network Security - 9th International Conference, 2010
2009
IET Inf. Secur., 2009
IET Commun., 2009
IET Commun., 2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
2008
IEEE Trans. Biomed. Eng., 2008
Genetic algorithm quality of service design in resilient dense wavelength division multiplexing optical networks.
IET Commun., 2008
Optical Communications Survivable wavelength-routed optical network design using genetic algorithms.
Eur. Trans. Telecommun., 2008
Multi-Collisions Attack in Ring Hash Structure.
Proceedings of the SECRYPT 2008, 2008
Proceedings of the 2008 International Conference on Telecommunications, 2008
Proceedings of the Advances in Computer Science and Engineering, 2008
2007
A New Position-Based Routing Algorithm for the Reduction of Overhead in Ad-hoc Networks.
Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), 2007