Mohammad Hesam Tadayon
Orcid: 0000-0002-0865-7993Affiliations:
- Tarbiat Modares University, Tehran, Iran
According to our database1,
Mohammad Hesam Tadayon
authored at least 27 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Future Gener. Comput. Syst., January, 2024
Corrigendum to "IoT-friendly, pre-computed and outsourced attribute based encryption" [Future Generation Computer Systems (FGCS) volume 150 (2024) 115-126/ FGCS-D-23-00424].
Future Gener. Comput. Syst., 2024
2023
Digit. Commun. Networks, June, 2023
2022
An intelligent cryptographic key management model for secure communications in distributed industrial intelligent systems.
Int. J. Intell. Syst., December, 2022
A Quantitative Comparative Study of Data-oriented Trust Management Schemes in Internet of Things.
ACM Trans. Manag. Inf. Syst., 2022
IEEE J. Biomed. Health Informatics, 2022
Twin Sudoku Puzzles and Triplet Solid Sudoku Cubes From Strongly Mutually Distinct Twin Sudoku Tables.
IEEE Trans. Games, 2022
2021
A Secure Ticket-Based Authentication Mechanism for Proxy Mobile IPv6 Networks in Volunteer Computing.
ACM Trans. Internet Techn., 2021
Layered Architecture for Internet of Things-based Healthcare System: A Systematic Literature Review.
Informatica (Slovenia), 2021
2020
Intelligent robust control for cyber-physical systems of rotary gantry type under denial of service attack.
J. Supercomput., 2020
Construction of Strongly Mutually Distinct Sudoku Tables and Solid Sudoku Cubes by Cyclotomic Cosets.
IEEE Trans. Games, 2020
2018
A Novel Identity-Based Key Establishment Method for Advanced Metering Infrastructure in Smart Grid.
IEEE Trans. Smart Grid, 2018
Efficient Search of Compact QC-LDPC and SC-LDPC Convolutional Codes With Large Girth.
IEEE Commun. Lett., 2018
Compact QC-LDPC Block and SC-LDPC Convolutional Codes for Low-Latency Communications.
Proceedings of the 29th IEEE Annual International Symposium on Personal, 2018
2017
Comments and improvements of "HOTA: Handover optimized ticket-based authentication in network-based mobility management".
Proceedings of the 20th Conference on Innovations in Clouds, Internet and Networks, 2017
2016
Neural Comput., 2016
Proceedings of the 8th International Symposium on Telecommunications, 2016
Welcome to Binder: A kernel level attack model for the Binder in Android operating system.
Proceedings of the 8th International Symposium on Telecommunications, 2016
Automated analysis method for forensic investigation of cloud applications on Android.
Proceedings of the 8th International Symposium on Telecommunications, 2016
2015
Dynamic and verifiable multi-secret sharing scheme based on Hermite interpolation and bilinear maps.
IET Inf. Secur., 2015
Proceedings of the 14th IEEE Canadian Workshop on Information Theory, 2015
2011
2009
IEEE Trans. Commun., 2009
An Optimization Theoretic Framework for Video Transmission with Minimal Total Distortion over Wireless Networks.
EURASIP J. Wirel. Commun. Netw., 2009
2008
A novel approach to generating long low-density parity-check codes using two configurations.
IET Commun., 2008