Mohammad Reza Aref
Orcid: 0009-0007-9748-3828Affiliations:
- Sharif University of Technology, Department of Electrical Engineering, Tehran, Iran
According to our database1,
Mohammad Reza Aref
authored at least 311 papers
between 1982 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on twitter.com
-
on orcid.org
On csauthors.net:
Bibliography
2024
Lightweight Image Encryption Using a Novel Chaotic Technique for the Safe Internet of Things.
Int. J. Comput. Intell. Syst., December, 2024
ISC Int. J. Inf. Secur., July, 2024
J. Cryptogr. Eng., June, 2024
On the Capacity of M-ary ASK Two-Hop Channel With Finite Battery Energy Harvesting Relay.
IEEE Trans. Green Commun. Netw., March, 2024
IEEE Internet Things J., March, 2024
HUAP: Practical Attribute-Based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices.
ISC Int. J. Inf. Secur., January, 2024
Neurocomputing, January, 2024
IACR Cryptol. ePrint Arch., 2024
CoRR, 2024
A Scalable Multi-Layered Blockchain Architecture for Enhanced EHR Sharing and Drug Supply Chain Management.
CoRR, 2024
Fundamental Limits of Distributed Covariance Matrix Estimation Under Communication Constraints.
Proceedings of the Forty-first International Conference on Machine Learning, 2024
2023
ISC Int. J. Inf. Secur., October, 2023
Strategies for Optimal Transmission and Delay Reduction in Dynamic Index Coding Problem.
IEEE Trans. Commun., August, 2023
CoRR, 2023
2022
IEEE Trans. Serv. Comput., 2022
A Lightweight Auditing Service for Shared Data with Secure User Revocation in Cloud Storage.
IEEE Trans. Serv. Comput., 2022
Location Privacy Preservation for Secondary Users in a Database-Driven Cognitive Radio Network.
ISC Int. J. Inf. Secur., 2022
Int. J. Internet Protoc. Technol., 2022
A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis.
Des. Codes Cryptogr., 2022
Proceedings of the 10th Iran Workshop on Communication and Information Theory, 2022
Information Theoretically Private and Secure Distributed Voting Without a Trusted Authority.
Proceedings of the IEEE Information Theory Workshop, 2022
Proceedings of the 2022 Workshop on Attacks and Solutions in Hardware Security, 2022
2021
Inf. Sci., 2021
IACR Cryptol. ePrint Arch., 2021
Achievable Rates for Binary Two-hop Channel with Energy Harvesting Relay With Finite Battery.
CoRR, 2021
Enhanced cache attack on AES applicable on ARM-based devices with new operating systems.
Comput. Networks, 2021
Leveled Design of Cryptography Algorithms Using Cybernetic Methods for Using in Telemedicine Applications.
Comput. Intell. Neurosci., 2021
Proceedings of the Iran Workshop on Communication and Information Theory, 2021
Proceedings of the IEEE International Symposium on Information Theory, 2021
Proceedings of the 18th International ISC Conference on Information Security and Cryptology, 2021
2020
IEEE Trans. Inf. Theory, 2020
J. Intell. Transp. Syst., 2020
A lightweight identity-based provable data possession supporting users' identity privacy and traceability.
J. Inf. Secur. Appl., 2020
Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants.
ISC Int. J. Inf. Secur., 2020
Internet Things, 2020
IET Commun., 2020
IACR Cryptol. ePrint Arch., 2020
Clust. Comput., 2020
Generalized Meet in the Middle Cryptanalysis of Block Ciphers With an Automated Search Algorithm.
IEEE Access, 2020
Secrecy Performance of Friendly Jammer Assisted Cooperative NOMA Systems with Internal Eavesdroppers.
Proceedings of the 31st IEEE Annual International Symposium on Personal, 2020
Proceedings of the Iran Workshop on Communication and Information Theory, 2020
2019
Wirel. Networks, 2019
IEEE Trans. Inf. Theory, 2019
IEEE Trans. Inf. Theory, 2019
J. Netw. Comput. Appl., 2019
J. Ambient Intell. Humaniz. Comput., 2019
A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications.
ISC Int. J. Inf. Secur., 2019
Biclique Cryptanalysis of Block Ciphers LBlock and TWINE-80 with Practical Data Complexity.
ISC Int. J. Inf. Secur., 2019
Cryptanalysis and Improvement of a User Authentication Scheme for Internet of Things Using Elliptic Curve Cryptography.
Int. J. Netw. Secur., 2019
Effect of unitary transformation on Bayesian information criterion for source numbering in array processing.
IET Signal Process., 2019
On the Secrecy Performance of NOMA Systems with both External and Internal Eavesdroppers.
CoRR, 2019
Proceedings of the 2019 Iran Workshop on Communication and Information Theory, 2019
Proceedings of the 2019 Iran Workshop on Communication and Information Theory, 2019
Proceedings of the 2019 IEEE Information Theory Workshop, 2019
Proceedings of the IEEE International Symposium on Information Theory, 2019
Proceedings of the 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2019
Proceedings of the 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2019
An Anonymous Attribute-based Access Control System Supporting Access Structure Update.
Proceedings of the 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2019
2018
IEEE Trans. Green Commun. Netw., 2018
Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher (Extended Version).
ISC Int. J. Inf. Secur., 2018
On the Security of O-PSI: A Delegated Private Set Intersection on Outsourced Datasets (Extended Version).
ISC Int. J. Inf. Secur., 2018
Int. J. Commun. Syst., 2018
Int. J. Commun. Syst., 2018
Blind Interference Alignment for the K-User SISO Interference Channel Using Reconfigurable Antennas.
IEEE Commun. Lett., 2018
Proceedings of the Iran Workshop on Communication and Information Theory, 2018
Proceedings of the 9th International Symposium on Telecommunications, 2018
2017
A Location Privacy-Preserving Method for Spectrum Sharing in Database-Driven Cognitive Radio Networks.
Wirel. Pers. Commun., 2017
Wirel. Pers. Commun., 2017
A Secure and Efficient Chaotic Maps Based Authenticated Key-Exchange Protocol for Smart Grid.
Wirel. Pers. Commun., 2017
Game-Based Privacy Analysis of RFID Security Schemes for Confident Authentication in IoT.
Wirel. Pers. Commun., 2017
On Optimal Online Algorithms for Energy Harvesting Systems With Continuous Energy and Data Arrivals.
IEEE Wirel. Commun. Lett., 2017
IEEE Wirel. Commun. Lett., 2017
Int. J. Commun. Syst., 2017
An Efficient Precoder Size for Interference Alignment of the K-User Interference Channel.
IEEE Commun. Lett., 2017
Key management system for WSNs based on hash functions and elliptic curve cryptography.
CoRR, 2017
CoRR, 2017
Comput. Networks, 2017
Proceedings of the WSA 2017, 2017
Proceedings of the Iran Workshop on Communication and Information Theory, 2017
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017
Proceedings of the 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2017
Proceedings of the 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2017
Proceedings of the 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2017
On the Security of O-PSI a Delegated Private Set Intersection on Outsourced Datasets.
Proceedings of the 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2017
Proceedings of the 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2017
Proceedings of the 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2017
Proceedings of the 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2017
2016
Imperfect and Perfect Secrecy in Compound Multiple Access Channel With Confidential Message.
IEEE Trans. Inf. Forensics Secur., 2016
Energy Harvesting Systems With Continuous Energy and Data Arrivals: The Optimal Offline and Heuristic Online Algorithms.
IEEE J. Sel. Areas Commun., 2016
Optimum decoder for multiplicative spread spectrum image watermarking with Laplacian modeling.
ISC Int. J. Inf. Secur., 2016
ISC Int. J. Inf. Secur., 2016
Int. J. Internet Protoc. Technol., 2016
Cryptanalysis of McEliece cryptosystem variants based on quasi-cyclic low-density parity check codes.
IET Inf. Secur., 2016
IET Commun., 2016
IET Commun., 2016
Code-based Strong Designated Verifier Signatures: Security Analysis and a New Construction.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Game-Based Privacy Analysis of RFID Security Schemes for Confident Au-thentication in IoT.
IACR Cryptol. ePrint Arch., 2016
Trans. Emerg. Telecommun. Technol., 2016
Squaring attacks on McEliece public-key cryptosystems using quasi-cyclic codes of even dimension.
Des. Codes Cryptogr., 2016
CoRR, 2016
Degrees of Freedom Rate Region of the $K$-user Interference Channel with Blind CSIT Using Staggered Antenna Switching.
CoRR, 2016
CoRR, 2016
An online transmission policy for energy harvesting systems with data traffic arrival.
Proceedings of the Iran Workshop on Communication and Information Theory, 2016
Proceedings of the Iran Workshop on Communication and Information Theory, 2016
Secrecy capacity in large cooperative networks in presence of eavesdroppers with unknown locations.
Proceedings of the Iran Workshop on Communication and Information Theory, 2016
Proceedings of the 8th International Symposium on Telecommunications, 2016
Proceedings of the 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology, 2016
Proceedings of the 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology, 2016
2015
Wirel. Pers. Commun., 2015
Wirel. Pers. Commun., 2015
Wirel. Networks, 2015
A revocable attribute based data sharing scheme resilient to DoS attacks in smart grid.
Wirel. Networks, 2015
Key splitting: making random key distribution schemes resistant against node capture.
Secur. Commun. Networks, 2015
An Improved Authentication Scheme for Electronic Payment Systems in Global Mobility Networks.
Inf. Technol. Control., 2015
ISC Int. J. Inf. Secur., 2015
IET Commun., 2015
Analysis and Enhancement of Desynchronization Attack on an Ultralightweight RFID Authentication Protocol.
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
An Optimal Transmission Policy for Energy Harvesting Systems with Continuous Energy and Data Arrivals.
CoRR, 2015
CoRR, 2015
Proceedings of the Iran Workshop on Communication and Information Theory, 2015
Proceedings of the 2015 International Symposium on Wireless Communication Systems (ISWCS), 2015
2014
Wirel. Pers. Commun., 2014
IEEE Trans. Inf. Theory, 2014
Low-Data Complexity Biclique Cryptanalysis of Block Ciphers With Application to Piccolo and HIGHT.
IEEE Trans. Inf. Forensics Secur., 2014
ISC Int. J. Inf. Secur., 2014
Toward an energy efficient PKC-based key management system for wireless sensor networks.
ISC Int. J. Inf. Secur., 2014
ISC Int. J. Inf. Secur., 2014
IET Commun., 2014
IET Commun., 2014
Three-user interference channel with common information: a rate splitting-based achievability scheme.
IET Commun., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2014
Proceedings of the Iran Workshop on Communication and Information Theory, 2014
Proceedings of the Iran Workshop on Communication and Information Theory, 2014
Proceedings of the Iran Workshop on Communication and Information Theory, 2014
Random coding bound for E-capacity region of the relay channel with confidential messages.
Proceedings of the Iran Workshop on Communication and Information Theory, 2014
Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014
Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014
Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014
Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014
Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014
Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014
Proceedings of the IEEE International Conference on Communications, 2014
2013
Wirel. Pers. Commun., 2013
IEEE Trans. Inf. Forensics Secur., 2013
Recursive Linear and Differential Cryptanalysis of Ultralightweight Authentication Protocols.
IEEE Trans. Inf. Forensics Secur., 2013
Secur. Commun. Networks, 2013
Key Agreement over a Generalized Multiple Access Channel Using Noiseless and Noisy Feedback.
IEEE J. Sel. Areas Commun., 2013
Inf. Process. Lett., 2013
IET Commun., 2013
Power Allocation and Performance Analysis for Incremental-Selective Decode-and-Forward Cooperative Communications over Nakagami-<i>m</i> Fading Channels.
IEICE Trans. Commun., 2013
Analysis and Improvement of the securing RFID systems conforming to EPC Class 1 Generation 2 standard.
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
A Secure and efficient elliptic curve based authentication and key agreement protocol suitable for WSN.
IACR Cryptol. ePrint Arch., 2013
Secret Key Agreement Using Conferencing in State- Dependent Multiple Access Channels with An Eavesdropper
CoRR, 2013
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013
Proceedings of the Iran Workshop on Communication and Information Theory, 2013
Proceedings of the Iran Workshop on Communication and Information Theory, 2013
Proceedings of the Iran Workshop on Communication and Information Theory, 2013
Proceedings of the Iran Workshop on Communication and Information Theory, 2013
Proceedings of the Iran Workshop on Communication and Information Theory, 2013
Proceedings of the 2013 IEEE Information Theory Workshop, 2013
Proceedings of the 2013 IEEE Information Theory Workshop, 2013
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013
A technique for deriving one-shot achievability results in network information theory.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013
Proceedings of the 10th International ISC Conference on Information Security and Cryptology, 2013
2012
On the Capacity of Interference Channel With Causal and Noncausal Generalized Feedback at the Cognitive Transmitter.
IEEE Trans. Inf. Theory, 2012
ISC Int. J. Inf. Secur., 2012
IET Inf. Secur., 2012
Dynamic and secure key management model for hierarchical heterogeneous sensor networks.
IET Inf. Secur., 2012
IET Commun., 2012
IET Commun., 2012
An Efficient Multistage Secret Sharing Scheme Using Linear One-way Functions and Bilinear Maps.
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
CoRR, 2012
On the Capacity of Interference Channel with Causal and Non-causal Generalized Feedback at the Cognitive Transmitter
CoRR, 2012
Proceedings of the 2012 Swedish Communication Technologies Workshop, Swe-CTW 2012, Lund, 2012
Lattice coding for multiple access channels with common message and additive interference.
Proceedings of the 2012 IEEE Information Theory Workshop, 2012
Proceedings of the 2012 IEEE Information Theory Workshop, 2012
On the achievable rate region of a new Gaussian wiretap channel with side information.
Proceedings of the 2012 IEEE Information Theory Workshop, 2012
Proceedings of the 2012 International Symposium on Wireless Communication Systems (ISWCS), 2012
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012
On the secrecy capacity of 3-receiver Broadcast Channel with causal states and conferencing.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012
Analytical evaluation of a new MAC algorithm for underwater wireless sensor networks.
Proceedings of the 19th International Conference on Telecommunications, 2012
Proceedings of the 20th IEEE International Conference on Network Protocols, 2012
2011
The Capacity Region of p -Transmitter/ q -Receiver Multiple-Access Channels With Common Information.
IEEE Trans. Inf. Theory, 2011
IEEE Trans. Inf. Theory, 2011
IET Commun., 2011
Compress-and-Forward Strategy for Cognitive Interference Channel with Unlimited Look-Ahead.
IEEE Commun. Lett., 2011
EURASIP J. Wirel. Commun. Netw., 2011
CoRR, 2011
CoRR, 2011
Achievable Rate Region for Multiple Access Channel with Correlated Channel States and Cooperating Encoders
CoRR, 2011
Proceedings of the Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, 2011
Proceedings of the IEEE 13th International Workshop on Multimedia Signal Processing (MMSP 2011), 2011
Proceedings of the 2011 IEEE Information Theory Workshop, 2011
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011
The capacity region of a class of 3-receiver broadcast channels with two eavesdroppers.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011
Proceedings of the Communications and Multimedia Security, 2011
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011
2010
IEEE Trans. Signal Process., 2010
J. Commun. Networks, 2010
IET Commun., 2010
IET Commun., 2010
IET Commun., 2010
Compress-and-forward strategy for relay channel with causal and non-causal channel state information.
IET Commun., 2010
IEEE Commun. Lett., 2010
Proceedings of the 2010 IEEE Information Theory Workshop, 2010
Proceedings of the 2010 IEEE Information Theory Workshop, 2010
Capacity regions for some classes of Causal Cognitive Interference Channels with delay.
Proceedings of the 2010 IEEE Information Theory Workshop, 2010
Achievable rate regions for Dirty Tape Channels and "joint writing on Dirty paper and Dirty Tape".
Proceedings of the 2010 IEEE Information Theory Workshop, 2010
Proceedings of the Information Security, 2010
Proceedings of the International Symposium on Information Theory and its Applications, 2010
Proceedings of the International Symposium on Information Theory and its Applications, 2010
Proceedings of the International Symposium on Information Theory and its Applications, 2010
The capacity region of a class of Relay-Broadcast Channels and relay channels with three parallel unmatched subchannels.
Proceedings of the International Symposium on Information Theory and its Applications, 2010
Proceedings of the International Symposium on Information Theory and its Applications, 2010
Proceedings of the International Symposium on Information Theory and its Applications, 2010
Proceedings of the IEEE International Symposium on Information Theory, 2010
The capacity region of fading Multiple Access Channels with cooperative encoders and partial CSIT.
Proceedings of the IEEE International Symposium on Information Theory, 2010
Proceedings of the IEEE International Symposium on Information Theory, 2010
State-Dependent Relay Channel with Private Messages with partial causal and non-causal Channel State Information.
Proceedings of the IEEE International Symposium on Information Theory, 2010
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
2009
IEEE Trans. Wirel. Commun., 2009
IEEE Trans. Signal Process., 2009
Efficient method for simplifying and approximating the s-boxes based on power functions.
IET Inf. Secur., 2009
New achievable rate and a certain capacity result for a stochastic two relay network with no interference.
IET Commun., 2009
IET Commun., 2009
Symmetric relaying based on partial decoding and the capacity of a class of relay networks.
IET Commun., 2009
Efficient secure channel coding based on quasi-cyclic low-density parity-check codes.
IET Commun., 2009
Proceedings of the 2009 IEEE Information Theory Workshop, 2009
Proceedings of the IEEE International Symposium on Information Theory, 2009
Proceedings of the IEEE International Symposium on Information Theory, 2009
Proceedings of the IEEE International Symposium on Information Theory, 2009
The capacity region of the parallel partially cooperative relay broadcast channel with unmatched degraded subchannels.
Proceedings of the IEEE International Symposium on Information Theory, 2009
Proceedings of the IEEE International Symposium on Information Theory, 2009
Proceedings of the IEEE International Symposium on Information Theory, 2009
Compress-and-forward strategy for the relay channel with non-causal State Information.
Proceedings of the IEEE International Symposium on Information Theory, 2009
Proceedings of the Information and Communications Security, 11th International Conference, 2009
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009
Proceedings of the 2009 IEEE International Conference on Electro/Information Technology, 2009
2008
IEEE Signal Process. Lett., 2008
EURASIP J. Wirel. Commun. Netw., 2008
Proceedings of the 6th International Symposium on Modeling and Optimization in Mobile, 2008
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008
Proceedings of the 2008 International Conference on Telecommunications, 2008
Impossible Differential Cryptanalysis of Safer++.
Proceedings of the 2008 International Conference on Security & Management, 2008
2007
A Fast Multiple-Source Detection and Localization Array Signal Processing Algorithm Using the Spatial Filtering and ML Approach.
IEEE Trans. Signal Process., 2007
A New Achievable Rate and the Capacity of a Class of Semi-Deterministic Relay Networks.
Proceedings of the IEEE International Symposium on Information Theory, 2007
2006
A New (t, n) Multi-Secret Sharing Scheme Based on Linear Algebra.
Proceedings of the SECRYPT 2006, 2006
2004
IEEE Trans. Wirel. Commun., 2004
2003
Mobility modeling and analytical solution for spatial traffic distribution in wireless multimedia networks.
IEEE J. Sel. Areas Commun., 2003
2002
Proceedings of the 12th IEEE International Symposium on Personal, 2002
1993
Proceedings of the Information Theory and Applications, Third Canadian Workshop, Rockland, Ontario, Canada, May 30, 1993
1982