Zobrazeno 1 - 10
of 19
pro vyhledávání: '"Jafari Siavoshani, Mahdi"'
Publikováno v:
In Journal of Information Security and Applications August 2023 76
Autor:
Jafari Siavoshani, Mahdi, Khajehpour, Amirhossein, Bideh, Amirmohammad Ziaei, Gatmiri, Amirali, Taheri, Ali
Publikováno v:
Soft Computing - A Fusion of Foundations, Methodologies & Applications; Jun2023, Vol. 27 Issue 11, p7191-7208, 18p
Autor:
Lotfollahi, Mohammad, Jafari Siavoshani, Mahdi, Shirali Hossein Zade, Ramin, Saberian, Mohammdsadegh
Publikováno v:
Soft Computing - A Fusion of Foundations, Methodologies & Applications; Feb2020, Vol. 24 Issue 3, p1999-2012, 14p
Autor:
Keller Lorenzo, Jafari Siavoshani Mahdi, Fragouli Christina, Argyraki Katerina, Diggavi Suhas N.
Publikováno v:
IEEE Journal on Selected Areas in Communications
In a significant class of sensor network applications the identities of the reporting sensors constitute the bulk of the communicated data whereas the message itself can be as small as a single bit for instance in many cases sensors are used to detec
Autor:
Jafari Siavoshani, Mahdi
The demand for higher throughput and better efficiency are two important challenges for future communication networks. During the past decades, a lot of research studies have been devoted to investigating and proposing near optimal and efficient sche
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f97b806e5cd6dae9d4a485e4c43fb114
We consider a group of m trusted nodes that aim to create a shared secret key K using a state dependent wireless broadcast channel that exists from one of the honest nodes to the rest of the nodes including a passive eavesdropper Eve. All of the trus
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=snsf_p3_pubs::bca2d057e5131e69b63d7a7b9ad6d105
We consider a group of m trusted nodes that aim to create a shared secret key K over a wireless channel in the presence an eavesdropper Eve. We assume an erasure broadcast channel from one of the honest nodes to the rest of them including Eve. All of
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=snsf_p3_pubs::962c1fcb22f588c209bf74b6848f05eb
Publikováno v:
IEEE Transactions on Information Forensics & Security; Feb2017, Vol. 12 Issue 2, p323-337, 15p
Publikováno v:
2015 International Workshop on Computational Electronics (IWCE); 2015, p220-229, 10p
Publikováno v:
IEEE Transactions on Information Theory. May2012, Vol. 58 Issue 5, p2599-2619. 21p.