Samad Rostampour

Orcid: 0000-0003-0183-5993

According to our database1, Samad Rostampour authored at least 18 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
The Rise of Passive RFID RTLS Solutions in Industry 5.0.
Sensors, March, 2024

Correction to: Using a privacy‑enhanced authentication process to secure IoT‑based smart grid infrastructures.
J. Supercomput., January, 2024

Using a privacy-enhanced authentication process to secure IoT-based smart grid infrastructures.
J. Supercomput., January, 2024

Smart Grid Security: A PUF-Based Authentication and Key Agreement Protocol.
Future Internet, 2024

2022
Improving RFID/IoT-based generalized ultra-lightweight mutual authentication protocols.
J. Inf. Secur. Appl., 2022

An Authentication Protocol for Next Generation of Constrained IoT Systems.
IEEE Internet Things J., 2022

2020
ECCbAP: A secure ECC-based authentication protocol for IoT edge devices.
Pervasive Mob. Comput., 2020

IoT in medical & pharmaceutical: Designing lightweight RFID security protocols for ensuring supply chain integrity.
Comput. Networks, 2020

2019
On Designing Lightweight RFID Security Protocols for Medical IoT.
IACR Cryptol. ePrint Arch., 2019

Selecting the right IoT technologies to build a connected bus shelter for smart cities.
Proceedings of the 1st ACM International Workshop on Technology Enablers and Innovative Applications for Smart Cities and Communities, 2019

2018
A Scalable and Lightweight Grouping Proof Protocol for Internet of Things Applications.
J. Supercomput., 2018

An improved low-cost yoking proof protocol based on Kazahaya's flaws.
J. Supercomput., 2018

IoT Device Security: Challenging "A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function".
Sensors, 2018

2017
On the (Im)Possibility of Receiving Security Beyond 2 l Using an l-Bit PRNG.
Wirel. Pers. Commun., 2017

On the security of an RFID-based parking lot management system.
Int. J. Commun. Syst., 2017

2016
An authenticated encryption based grouping proof protocol for RFID systems.
Secur. Commun. Networks, 2016

2015
On the (im)possibility of receiving security beyond 2<sup>l</sup> using an l-bit PRNG: the case of Wang et. al. protocol.
IACR Cryptol. ePrint Arch., 2015

2011
A Numerical Solution for Throughput Improvement of On-chip Irregular Mesh Interconnection Network.
Proceedings of the UKSim 5th European Symposium on Computer Modeling and Simulation, 2011


  Loading...