Mohammad Peyravian

According to our database1, Mohammad Peyravian authored at least 34 papers between 1992 and 2007.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2007
Microarchitecture and implementation of the synergistic processor in 65-nm and 90-nm SOI.
IBM J. Res. Dev., 2007

2006
The microarchitecture of the synergistic processor for a cell processor.
IEEE J. Solid State Circuits, 2006

Secure remote user access over insecure networks.
Comput. Commun., 2006

2004
Non-PKI methods for public key distribution.
Comput. Secur., 2004

2003
Search engine implications for network processor efficiency.
IEEE Netw., 2003

IBM PowerNP network processor: Hardware, software, and applications.
IBM J. Res. Dev., 2003

Methods for preventing unauthorized software distribution.
Comput. Secur., 2003

Fundamental architectural considerations for network processors.
Comput. Networks, 2003

2001
Alternative Method for Unique RSA Primes Generation.
Comput. Secur., 2001

2000
Methods for Protecting Password Transmission.
Comput. Secur., 2000

Ticket and Challenge-Based Protocols for Timestamping.
Comput. Secur., 2000

Multiparty Biometric-Based Authentication.
Comput. Secur., 2000

Generation of RSA Keys That Are Guaranteed to be Unique for Each User.
Comput. Secur., 2000

IBM Comments.
Proceedings of the Third Advanced Encryption Standard Candidate Conference, 2000

1999
Hash-based encryption system.
Comput. Secur., 1999

Generating user-based cryptographic keys and random numbers.
Comput. Secur., 1999

A structured symmetric-key block cipher.
Comput. Secur., 1999

Decentralized group key management for secure multicast communications.
Comput. Commun., 1999

1998
On probabilities of hash value matches.
Comput. Secur., 1998

Reversible data mixing procedure for efficient public-key encryption.
Comput. Secur., 1998

Decentralized Network Connection Preemption Algorithms.
Comput. Networks, 1998

1997
ATM cell encryption and key update synchronization.
Telecommun. Syst., 1997

Asynchronous transfer mode security.
IEEE Netw., 1997

Two-phase cryptographic key recovery system.
Comput. Secur., 1997

Network path caching: : Issues, algorithms and a simulation study.
Comput. Commun., 1997

Algorithm for efficient generation of link-state updates in ATM networks.
Comput. Networks ISDN Syst., 1997

Connection Preemption: Issues, Algorithms, and a Simulation Study.
Proceedings of the Proceedings IEEE INFOCOM '97, 1997

1996
Bandwidth efficiency of the networking broadband services architecture: A case study.
Telecommun. Syst., 1996

Enabling ATM networks.
Comput. Commun., 1996

Deriving Deadlock and Unspecified Reception Free Protocol Converters from Message Mapping Sets.
Comput. Networks ISDN Syst., 1996

1995
Efficient Transport and Distribution of Network Control Information in NBBS.
IBM Syst. J., 1995

1994
An Improved Selective Repeat Protocol and Its Performance in High-Speed Environments.
Comput. Networks ISDN Syst., 1994

1993
Construction of protocol converters using formal methods.
Comput. Commun., 1993

1992
An Algorithmic Method for Protocol Conversion.
Proceedings of the 12th International Conference on Distributed Computing Systems, 1992


  Loading...