Mohammad Reza Aref
#175,254
Most Influential Person Now
Mohammad Reza Aref's AcademicInfluence.com Rankings
Mohammad Reza Arefengineering Degrees
Engineering
#8027
World Rank
#9494
Historical Rank
Electrical Engineering
#2520
World Rank
#2641
Historical Rank
Applied Physics
#2837
World Rank
#2893
Historical Rank

Download Badge
Engineering
Mohammad Reza Aref's Degrees
- PhD Electrical Engineering Stanford University
- Masters Electrical Engineering Stanford University
- Bachelors Electrical Engineering Sharif University of Technology
Why Is Mohammad Reza Aref Influential?
(Suggest an Edit or Addition)Mohammad Reza Aref's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- The capacity of the semideterministic relay channel (1982) (233)
- A secure authentication scheme for VANETs with batch verification (2015) (191)
- Achievability Proof via Output Statistics of Random Binning (2012) (133)
- A technique for deriving one-shot achievability results in network information theory (2013) (84)
- Impossible differential attack on seven-round AES-128 (2008) (80)
- Desynchronization attack on RAPP ultralightweight authentication protocol (2013) (80)
- Statistical Performance Analysis of MDL Source Enumeration in Array Processing (2009) (67)
- Dynamic and secure key management model for hierarchical heterogeneous sensor networks (2012) (65)
- Multiple Access Wiretap channels with strong secrecy (2010) (63)
- Channel Simulation via Interactive Communications (2012) (61)
- Mobility modeling and analytical solution for spatial traffic distribution in wireless multimedia networks (2003) (61)
- Information flow in relay networks (1981) (59)
- Signal activity detection of phase-shift keying signals (2006) (52)
- Efficient secure channel coding based on quasi-cyclic low-density parity-check codes (2009) (48)
- Slepian–Wolf Coding Over Cooperative Relay Networks (2009) (48)
- Adaptive detection algorithm for radar signals in autoregressive interference (1998) (47)
- A secure ECC-based privacy preserving data aggregation scheme for smart grids (2017) (45)
- Adaptive secure channel coding based on punctured turbo codes (2006) (41)
- Cryptanalysis of SIMON Variants with Connections (2014) (41)
- Improved Linear Cryptanalysis of Reduced-Round SIMON-32 and SIMON-48 (2015) (40)
- Squaring attacks on McEliece public-key cryptosystems using quasi-cyclic codes of even dimension (2016) (39)
- Compress-and-forward strategy for the relay channel with non-causal State Information (2009) (38)
- A Fast Multiple-Source Detection and Localization Array Signal Processing Algorithm Using the Spatial Filtering and ML Approach (2007) (35)
- A fuzzy fully distributed trust management system in wireless sensor networks (2016) (35)
- Recursive Linear and Differential Cryptanalysis of Ultralightweight Authentication Protocols (2013) (34)
- Detection of coherent radar signals with unknown Doppler shift (1996) (33)
- Traceability Analysis of Recent RFID Authentication Protocols (2015) (32)
- Improved Linear Cryptanalysis of Round Reduced SIMON (2014) (30)
- Simulation-Based Traceability Analysis of RFID Authentication Protocols (2014) (29)
- Generalized compress-and-forward strategy for relay networks (2008) (29)
- Attacks on a Lightweight Mutual Authentication Protocol under EPC C-1 G-2 Standard (2011) (28)
- Compress-and-forward strategy for relay channel with causal and non-causal channel state information (2010) (27)
- Coordination via a relay (2012) (26)
- Automated Dynamic Cube Attack on Block Ciphers: Cryptanalysis of SIMON and KATAN (2015) (26)
- Biclique cryptanalysis of the full-round KLEIN block cipher (2015) (26)
- Unified privacy analysis of new-found RFID authentication protocols (2013) (25)
- A novel secret sharing scheme from audio perspective (2008) (25)
- Low-Data Complexity Biclique Cryptanalysis of Block Ciphers With Application to Piccolo and HIGHT (2014) (24)
- Non-asymptotic output statistics of Random Binning and its applications (2013) (24)
- Reducing the key length of mceliece cryptosystem using polar codes (2014) (23)
- Unified approach to the capacity evaluation of the relay channel (2009) (23)
- Efficient multistage secret sharing scheme using bilinear map (2014) (21)
- Simulation of a Channel With Another Channel (2013) (21)
- A new and efficient authentication scheme for vehicular ad hoc networks (2020) (20)
- Perfectly Secure Index Coding (2015) (20)
- Empirical coordination in a triangular multiterminal network (2013) (20)
- Game-theoretic approach to mitigate packet dropping in wireless Ad-hoc networks (2011) (19)
- Improving the Rao-Nam secret key cryptosystem using regular EDF-QC-LDPC codes (2012) (19)
- An identity-based online/offline secure cloud storage auditing scheme (2019) (18)
- Compress-and-forward strategy for the relay channel with causal state information (2009) (18)
- Dynamic cube attack on Grain-v1 (2016) (18)
- On the Capacity of Interference Channel With Causal and Noncausal Generalized Feedback at the Cognitive Transmitter (2012) (18)
- Secret Key Cryptosystem Based on Non-systematic Polar Codes (2013) (18)
- Impossible differential cryptanalysis of Piccolo lightweight block cipher (2014) (18)
- Addressing Flaws in RFID Authentication Protocols (2011) (18)
- Total Break of Zorro using Linear and Differential Attacks (2014) (18)
- The Capacity Region of p -Transmitter/ q -Receiver Multiple-Access Channels With Common Information (2011) (18)
- Analytical power allocation for a full-duplex decodeand- forward relay channel (2013) (17)
- Cryptanalysis of McEliece cryptosystem variants based on quasi-cyclic low-density parity check codes (2016) (17)
- Direction-of-Arrival Estimation for Temporally Correlated Narrowband Signals (2009) (16)
- Cognitive interference channel with two confidential messages (2010) (16)
- One-Receiver Two-Eavesdropper Broadcast Channel With Degraded Message Sets (2013) (15)
- A New Achievable Rate and the Capacity of a Class of Semi-Deterministic Relay Networks (2007) (15)
- Key Agreement Over Multiple Access Channel (2011) (15)
- Traceability analysis of quadratic residue-based RFID authentication protocols (2013) (15)
- Energy Harvesting Systems With Continuous Energy and Data Arrivals: The Optimal Offline and Heuristic Online Algorithms (2015) (15)
- The capacity region of fading Multiple Access Channels with cooperative encoders and partial CSIT (2010) (15)
- Rate regions of secret key sharing in a new source model (2010) (14)
- Blind Interference Alignment for the $K$ -User SISO Interference Channel Using Reconfigurable Antennas (2018) (14)
- Likelihood ratio tests for PSK modulation classification in unknown noise environment (2005) (14)
- Learning under Distribution Mismatch and Model Misspecification (2021) (13)
- Attacks and improvements on two new-found RFID authentication protocols (2014) (13)
- On the capacity region of the degraded Z channel (2010) (13)
- A lightweight hierarchical authentication scheme for internet of things (2018) (13)
- An efficient and secure data sharing in Smart Grid: Ciphertext-policy attribute-based signcryption (2017) (12)
- Outage Performance in Secure Cooperative NOMA (2019) (12)
- Efficient secure channel coding scheme based on low-density Lattice codes (2016) (12)
- Physical layer encryption scheme using finite-length polar codes (2015) (12)
- A New Achievable Rate and the Capacity of Some Classes of Multilevel Relay Network (2008) (12)
- Cooperative relay-broadcast channels with causal Channel State Information (2009) (12)
- On Körner-Marton's sum modulo two problem (2015) (12)
- A Lightweight Auditing Service for Shared Data with Secure User Revocation in Cloud Storage (2019) (11)
- Simultaneous partial and backward decoding approach for two-level relay networks (2009) (11)
- Key Agreement over a Generalized Multiple Access Channel Using Noiseless and Noisy Feedback (2013) (11)
- Secret key cryptosystem based on polar codes over Binary Erasure Channel (2013) (11)
- Analytical power allocation for a full duplex decode-and-forward relay channel (2013) (11)
- A Multi-stage Secret Sharing Scheme Using All-or-Nothing Transform Approach (2009) (11)
- Comments on a lightweight cloud auditing scheme: Security analysis and improvement (2019) (11)
- A new achievable rate for relay networks based on parallel relaying (2008) (11)
- Cube and dynamic cube attacks on SIMON32/64 (2014) (10)
- Efficient Polar Code-Based Physical Layer Encryption Scheme (2017) (10)
- Capacity of a more general glass of relay channels (2008) (10)
- A lattice-based threshold secret sharing scheme (2014) (10)
- A new method for variable elimination in systems of inequations (2011) (10)
- Provably secure strong designated verifier signature scheme based on coding theory (2017) (10)
- Joint source-channel coding using finite state integer arithmetic codes (2009) (9)
- Analysis and Improvement of the securing RFID systems conforming to EPC Class 1 Generation 2 standard (2013) (9)
- When is it possible to simulate a DMC channel from another? (2013) (9)
- 2D Hash Chain robust Random Key Distribution scheme (2016) (8)
- Guess and Determine Attack on Trivium Family (2010) (8)
- PKC-PC: A Variant of the McEliece Public Key Cryptosystem based on Polar Codes (2017) (8)
- Polar code-based secure channel coding scheme with small key size (2017) (8)
- Attacks on Recent RFID Authentication Protocols (2015) (8)
- Comprehensive partial decoding approach for two-level relay networks (2009) (8)
- Three-user cognitive interference channel: capacity region with strong interference (2012) (8)
- Efficient method for simplifying and approximating the s-boxes based on power functions (2009) (8)
- Secure channel simulation (2012) (8)
- Optimal Transmission Policies for Multi-Hop Energy Harvesting Systems (2016) (8)
- A Secure and Efficient Chaotic Maps Based Authenticated Key-Exchange Protocol for Smart Grid (2017) (8)
- Security and Privacy Analysis of Song–Mitchell RFID Authentication Protocol (2013) (8)
- Achievable rate regions for Dirty Tape Channels and “joint writing on Dirty paper and Dirty Tape” (2010) (8)
- A Secure Key Management Framework for Heterogeneous Wireless Sensor Networks (2011) (8)
- A secure and privacy-preserving protocol for holding double auctions in smart grid (2021) (8)
- A lightweight identity-based provable data possession supporting users' identity privacy and traceability (2020) (8)
- Cryptanalysis of two EPC-based RFID security schemes (2015) (8)
- A Secure and efficient elliptic curve based authentication and key agreement protocol suitable for WSN (2013) (8)
- Game-Based Privacy Analysis of RFID Security Schemes for Confident Authentication in IoT (2017) (8)
- Editorial (2018) (8)
- Enhancing privacy of recent authentication schemes for low-cost RFID systems (2016) (8)
- Cryptanalysis and Improvement of a User Authentication Scheme for Internet of Things Using Elliptic Curve Cryptography (2019) (8)
- Capacity regions for some classes of Causal Cognitive Interference Channels with delay (2010) (7)
- Impossible differential cryptanalysis of reduced-round TEA and XTEA (2015) (7)
- Privacy analysis and improvements of two recent RFID authentication protocols (2014) (7)
- Partial cognitive relay channel (2009) (7)
- Symmetric Relaying Strategy for Two-Relay Networks (2008) (7)
- Compound Multiple Access Channel with confidential messages (2014) (7)
- A Correlation Measure Based on Vector-Valued Lp Norms (2018) (7)
- Multiple access channel with common message and secrecy constraint (2014) (7)
- On the transmission of correlated sources over relay channels (2011) (7)
- Locally Multipath Adaptive Routing Protocol Resilient to Selfishness and Wormholes (2010) (7)
- From source model to quantum key distillation: An improved upper bound (2014) (7)
- Capacity bounds for the three-user Cognitive Z-Interference Channel (2011) (7)
- An Efficient Precoder Size for Interference Alignment of the $K$ -User Interference Channel (2017) (7)
- Multiple access channel with correlated channel states and cooperating encoders (2011) (7)
- A new soft-handoff management algorithm with two decision boundaries (2001) (7)
- Imperfect and Perfect Secrecy in Compound Multiple Access Channel With Confidential Message (2016) (7)
- On the devroye-mitran-tarokh rate region for the cognitive radio channel (2009) (6)
- An ID-Based Privacy-Preserving Integrity Verification of Shared Data Over Untrusted Cloud (2020) (6)
- Key agreement over multiple access channel using feedback channel (2011) (6)
- Code-based Strong Designated Verifier Signatures: Security Analysis and a New Construction (2016) (6)
- Secret key sharing in a new source model: Rate regions (2010) (6)
- Risk of attack coefficient effect on availability of Ad-hoc networks (2011) (6)
- A flexible dynamic traffic model for reverse link CDMA cellular networks (2004) (6)
- Improved impossible differential and biclique cryptanalysis of HIGHT (2018) (6)
- SER of M-PSK modulation in incremental-selective decode-and-forward cooperative communications over Rayleigh fading channels (2011) (6)
- Key splitting: making random key distribution schemes resistant against node capture (2015) (6)
- State-Dependent Relay Channel with Private Messages with partial causal and non-causal Channel State Information (2010) (6)
- A novel and low-energy PKC-based key agreement protocol for WSNs (2013) (6)
- Untraceable RFID authentication protocols for EPC compliant tags (2015) (6)
- An achievable rate region for a class of Broadcast-Relay Networks (2010) (6)
- Key management system for WSNs based on hash functions and elliptic curve cryptography (2017) (6)
- A Correlation Measure Based on Vector-Valued $L_p$ -Norms (2018) (6)
- A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis (2022) (6)
- Interference Alignment for the K-user Interference Channel with Imperfect CSI (2015) (6)
- JHAE: An Authenticated Encryption Mode Based on JH (2014) (5)
- A new capacity upper bound for “Relay-With-Delay” channel (2009) (5)
- A revocable attribute based data sharing scheme resilient to DoS attacks in smart grid (2015) (5)
- Cooperative relay cognitive interference channel (2010) (5)
- Sharing secret using lattice construction (2014) (5)
- Two RFID Privacy Models in Front of a Court (2011) (5)
- On the Intelligent Eavesdropping of Differential Frequency Hopping (2006) (5)
- A practical approach for coherent signal surveillance and blind parameter assessment in asynchoronous DS-CDMA systems in multipath channel (2010) (5)
- Generalized Secure Distributed Source Coding with Side Information (2010) (5)
- Formal cryptanalysis of a CRC-based RFID authentication protocol (2014) (5)
- Coded Secure Multi-Party Computation for Massive Matrices with Adversarial Nodes (2020) (5)
- Impossible Differential Cryptanalysis of Safer++ (2008) (5)
- BIA for the K-User Interference Channel Using Reconfigurable Antenna at Receivers (2020) (5)
- Lattice coding for multiple access channels with common message and additive interference (2012) (5)
- AN ADAPTIVE SECURE CHANNEL CODING SCHEME FOR DATA TRANSMISSION OVER LEO SATELLITE CHANNELS (2006) (5)
- On the secrecy of the cognitive interference channel with partial channel states (2015) (5)
- An Improved Authentication Scheme for Electronic Payment Systems in Global Mobility Networks (2015) (5)
- Slepian-Wolf coding over cooperative networks (2009) (4)
- A provably secure code-based concurrent signature scheme (2017) (4)
- Mitigating Node Capture Attack in Random Key Distribution Schemes through Key Deletion (2017) (4)
- Multiple-access channel with correlated states and cooperating encoders (2012) (4)
- On achievable rates for relay networks based on partial decode-and-forward (2010) (4)
- Public Key Cryptosystem Based on Low Density Lattice Codes (2017) (4)
- On the Capacity of Causal Cognitive Interference Channel With Delay (2010) (4)
- Sum Degrees of Freedom for the K-user Interference Channel Using Antenna Switching (2017) (4)
- New achievable rate and a certain capacity result for a stochastic two relay network with no interference (2009) (4)
- Improving GGH Public Key Scheme Using Low Density Lattice Codes (2015) (4)
- A Verifiable Delegated Set Intersection without pairing (2017) (4)
- A Secure Channel Coding Scheme for Efficient Transmission of Remote Sensing Data over the LEO Satellite Channels (2007) (4)
- On the achievable rate region of a new Gaussian wiretap channel with side information (2012) (4)
- An achievable rate for relay networks based on compress-and-forward strategy (2010) (4)
- PERFORMANCE COMPARISON OF THE NEYMAN-PEARSON FUSION RULE WITH COUNTING RULES FOR SPECTRUM SENSING IN COGNITIVE RADIO (2012) (4)
- On the achievable rate region of a state-dependent MAC with cooperating encoders (2012) (4)
- Activity detection of a PSK in unknown white gaussian noise: optimal and suboptimal invariant detectors (2005) (4)
- Achievable rate region for multiple-access-relay-networks (2010) (4)
- Multi-dimensional correlation steganalysis (2011) (4)
- The capacity region of a class of 3-receiver broadcast channels with two eavesdroppers (2011) (4)
- Secrecy Performance of Friendly Jammer Assisted Cooperative NOMA Systems with Internal Eavesdroppers (2020) (3)
- An Efficient Cooperative Message Authentication Scheme in Vehicular Ad-hoc Networks (2017) (3)
- Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher (2017) (3)
- An achievable rate region for Broadcast-Relay Networks with partial cooperation between relays (2010) (3)
- An Improved Truncated Differential Cryptanalysis of Klein (2016) (3)
- JHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH (2016) (3)
- Securing key exchange and key agreement security schemes for RFID passive tags (2016) (3)
- The Capacity of a Class of Linear Deterministic Networks (2010) (3)
- Some new issues on secret sharing schemes (2008) (3)
- Achievable rate region for broadcast-relay networks with two cooperative relays (2010) (3)
- Reliable source transmission over relay networks with Side Information (2009) (3)
- Power Allocation and Performance Analysis for Incremental-Selective Decode-and-Forward Cooperative Communications over Nakagami-m Fading Channels (2013) (3)
- Cooperative relay cognitive interference channels with causal channel state information (2010) (3)
- A new secret key agreement scheme in a four-terminal network (2011) (3)
- Generalized Meet in the Middle Cryptanalysis of Block Ciphers With an Automated Search Algorithm (2020) (3)
- Symmetric Semideterministic Relay Networks With No Interference at the Relays (2011) (3)
- An attribute‐based tripartite key agreement protocol (2015) (3)
- Security and privacy-preserving in e-health: A new framework for patient (2020) (3)
- RAPP: An efficient revocation scheme with authentication and privacy preserving for vehicular ad-hoc networks (2017) (3)
- On source transmission over some classes of relay channels (2012) (3)
- Distinguishing Attack on Bivium (2010) (3)
- Power allocation for Incremental-Selective Decode-and-Forward cooperative communications over Rician fading channels (2011) (3)
- Eigenvalues-based LSB steganalysis (2012) (3)
- Physical layer security for some classes of three-receiver broadcast channels (2014) (3)
- Pairwise secret key agreement using the source common randomness (2012) (3)
- Simultaneously generating multiple keys in a four-terminal network (2012) (3)
- Key splitting for random key distribution schemes (2012) (3)
- Joint transfer of energy and information in a two-hop relay channel (2017) (3)
- Adaptive random puncturing based secure block turbo coding (2010) (3)
- Symmetric relaying based on partial decoding and the capacity of a class of relay networks (2009) (3)
- Using Blockchain to Achieve Decentralized Privacy In IoT Healthcare (2021) (3)
- An Optimal Transmission Policy for Energy Harvesting Systems with Continuous Energy and Data Arrivals (2015) (2)
- On the Security of O-PSI a Delegated Private Set Intersection on Outsourced Datasets (2017) (2)
- Designing a Multiple Access Differential Frequency Hopping System with Variable Frequency Transition Function (2006) (2)
- Biclique cryptanalysis of LBlock with modified key schedule (2015) (2)
- An identity-based online/offline secure cloud storage auditing scheme (2019) (2)
- Secrecy capacity in large cooperative networks in presence of eavesdroppers with unknown locations (2016) (2)
- Analytical evaluation of a new MAC algorithm for underwater wireless sensor networks (2012) (2)
- On Optimal Online Algorithms for Energy Harvesting Systems With Continuous Energy and Data Arrivals (2017) (2)
- A Lightweight Anonymous Authentication Protocol For IoT Wireless Sensor Networks (2019) (2)
- Optimum Decoder for Multiplicative Spread Spectrum Image Watermarking with Laplacian Modeling (2016) (2)
- Toward an energy efficient PKC-based key management system for wireless sensor networks (2014) (2)
- Multiple Relay Channels with Delays: With and without Side Information (2009) (2)
- Limitations of the Gaussian model for radar signals (1997) (2)
- A novel approach for providing QoS with network coding (2008) (2)
- Capacity bounds for multiple access-cognitive interference channel (2011) (2)
- An outer bound on the capacity region of Broadcast-Relay-Channel (2010) (2)
- Biclique cryptanalysis of Twine-128 (2016) (2)
- Degrees of freedom in a three-user cognitive interference channel (2013) (2)
- A Multi-Layer Encoding and Decoding Strategy for Binary Erasure Channel (2019) (2)
- An Efficient and Secure Attribute-Based Signcryption Scheme for Smart Grid Applications (2018) (2)
- A successful attack against the DES (1993) (2)
- Artemia: a family of provably secure authenticated encryption schemes (2015) (2)
- A New Approach for Coherent Radar Detection in K-Distributed Interference (1998) (2)
- Breaking anonymity of some recent lightweight RFID authentication protocols (2019) (2)
- Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher (Extended Version) (2018) (2)
- On The Achievable Rate Region of a New Wiretap Channel With Side Information (2012) (2)
- On the equivalency of reliability and security metrics for wireline networks (2016) (2)
- Designated Verifier Threshold Proxy Signature Scheme without Random Oracles (2012) (2)
- Compress-and-Forward Strategy for Cognitive Interference Channel with Unlimited Look-Ahead (2011) (2)
- Joint source-channel coding for Multiple-Access Wiretap Channels (2013) (2)
- Detection of a sinusoid signal with unknown parameters using wavelets (2004) (2)
- A Misbehavior-Tolerant Multipath Routing Protocol for Wireless Ad hoc Networks (2013) (2)
- On The Positive Definiteness of Polarity Coincidence Correlation Coefficient Matrix (2008) (2)
- Zero correlation linear attack on reduced round Piccolo-80 (2016) (2)
- Achievable rate regions for Relay Channel with Private Messages with states known at the source (2010) (2)
- An Achievable Rate Region for a Two-Relay Network with Receiver-Transmitter Feedback (2011) (2)
- Effect of unitary transformation on Bayesian information criterion for source numbering in array processing (2019) (2)
- QoSNC: A novel approach to QoS-based network coding for fixed networks (2010) (2)
- Capacity of the State-Dependent Wiretap Channel: Secure Writing on Dirty Paper (2016) (2)
- A statistical distributed multipath routing protocol in wireless sensor networks (2016) (1)
- QoS network coding (2008) (1)
- CoRPA: A Novel Efficient Shared Data Auditing Protocol in Cloud Storage (2017) (1)
- Three-user interference channel with common information: a rate splitting-based achievability scheme (2014) (1)
- An Improved Truncated Di fferential Cryptanalysis of KLEIN (2014) (1)
- Analysis and Enhancement of Desynchronization Attack on an Ultralightweight RFID Authentication Protocol (2015) (1)
- Compress-and-forward strategy for Causal Cognitive Interference Channel (2010) (1)
- Secret key rate region of multiple access channel model (2010) (1)
- The asymmetric Gaussian parallel relay network (2010) (1)
- Generalized Secure Distributed Source Coding (2009) (1)
- Improved Fixed Point Attack on Gost2 (2017) (1)
- Guess and Determine Attack on Bivium (2011) (1)
- Capacity of channel with energy harvesting transmitter (2015) (1)
- Security analysis of CLEFIA-128 (2014) (1)
- Analysis of an RFID Authentication Protocol in Accordance with EPC Standards (2014) (1)
- Analysis of Xiao et al.'s authentication protocol conforming to EPC C1 G2 standard (2016) (1)
- Achievable Rate Regions for the Causal Cognitive Interference Channel With Delay (2010) (1)
- An Ultra-Lightweight RFID Mutual Authentication Protocol (2019) (1)
- Dynamic index coding gain over a complete bi-directional side information graph (2016) (1)
- A Hybrid DOS-Tolerant PKC-Based Key Management System for WSNs (2017) (1)
- Capacity of a class of symmetric relay networks with orthogonal components (2010) (1)
- A Joint Encryption-Encoding Scheme Using QC-LDPC Codes Based on Finite Geometry (2017) (1)
- A NEW STATISTICAL TEST BASED ON LINEAR COMPLEXITY PROFILE (LCP) (2000) (1)
- Practical Implementation of a New Flush + Reload Side Channel Attack on AES (2019) (1)
- Leveled Design of Cryptography Algorithms Using Cybernetic Methods for Using in Telemedicine Applications (2021) (1)
- Lossy transmission of correlated sources over multiple-access wiretap channels (2015) (1)
- An optimal transmission policy for energy harvesting systems with continuous curves (2015) (1)
- Comprehensive Comparison of Security Measurement Models (2022) (1)
- The capacity region of the parallel partially cooperative relay broadcast channel with unmatched degraded subchannels (2009) (1)
- An Anonymous Attribute-based Access Control System Supporting Access Structure Update (2019) (1)
- A Location Privacy-Preserving Method for Spectrum Sharing in Database-Driven Cognitive Radio Networks (2017) (1)
- State-dependent multiple access relay channel with cooperating transmitters (2018) (1)
- An LWE-based verifiable threshold secret sharing scheme (2019) (1)
- On the Secrecy Performance of NOMA Systems with both External and Internal Eavesdroppers (2019) (1)
- On the capacity region of a class of Z Channels with cooperation (2010) (1)
- Improved Related-Key Impossible Differential Attacks on 8-Round AES-256 (2010) (1)
- The capacity of a class of linear deterministic relay networks (2010) (1)
- Achievable Rates for a Two-Relay Network with Relays-Transmitter Feedbacks (2011) (1)
- The capacity region of a class of Relay-Broadcast Channels and relay channels with three parallel unmatched subchannels (2010) (1)
- An online transmission policy for energy harvesting systems with data traffic arrival (2016) (1)
- On the capacity region of semi-deterministic Multiple-Access-Relay-Networks (2010) (1)
- Multi-layer Gelfand-Pinsker strategies for the generalized multiple-access channel (2013) (1)
- A Secure Error-Resilient Lossless Source Coding Scheme Based on Punctured Turbo Codes (2006) (1)
- An Efficient Multistage Secret Sharing Scheme Using Linear One-way Functions and Bilinear Maps (2012) (1)
- A new method for Visual Secret Sharing (2008) (1)
- HUAP: Practical Attribute-based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices (2021) (1)
- A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications (2019) (1)
- Biclique Cryptanalysis of Block Ciphers LBlock and TWINE-80 with Practical Data Complexity (2019) (1)
- Private Authentication: Optimal Information Theoretic Schemes (2019) (1)
- A New (t, n) Multi-Secret Sharing Scheme Based on Linear Algebra (2006) (0)
- GLR Detector for Coded Signals in Noise and Interference (2008) (0)
- An efficient multi-stage secret sharing using bilinear map (2013) (0)
- Game-Based Privacy Analysis of RFID Security Schemes for Confident Authentication in IoT (2017) (0)
- A Provably Secure Short Signature Scheme from Coding Theory (2015) (0)
- Presidential Candidates: A Look at ICT Policy Rhetoric (2017) (0)
- Location Privacy Preservation for Secondary Users in a Database-Driven Cognitive Radio Network (2022) (0)
- JHAE : ANovel Permutation-BasedAuthenticated Encryption Mode Based on theHashMode JH (2016) (0)
- Secret Key Agreement Using Conferencing in State- Dependent Multiple Access Channels with An Eavesdropper (2013) (0)
- Editorial (2016) (0)
- Editorial (2019) (0)
- Editorial (2009) (0)
- NewFixed Point Attacks onGOST2Block Cipher withMemory Complexity Improvements (2019) (0)
- Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants (2020) (0)
- Successive Secret Key Agreement over Generalized Multiple Access and Broadcast Channels (2012) (0)
- Multiple Access Wire-tap Channel with Common Message (2014) (0)
- DETECTION OF A BAND-LIMITED SIGNAL USING AN ORTHONORMAL, FULLY-DECIMATED FILTER-BANK (2007) (0)
- COMPARISON OF THE NEYMAN-PEARSON FUSION RULE WITH COUNTING RULES FOR SPECTRUM SENSING IN COGNITIVE RADIO (2012) (0)
- Improving the Rao-NamSecret KeyCryptosystemUsingRegular EDF-QC-LDPCCodes (2011) (0)
- Key agreement over a 3-receiver broadcast channel (2013) (0)
- Information Theoretically Private and Secure Distributed Voting Without a Trusted Authority (2022) (0)
- Optimum Power Allocations for Fading Decode-and-Forward Relay Channel (2012) (0)
- Achievable Rates for Binary Two-hop Channel with Energy Harvesting Relay With Finite Battery (2020) (0)
- Physical Layer Security in AF and CF Relay Networks with RF-Energy Harvesting (2017) (0)
- New Techniques for Localization Based Information Theoretic Secret Key Agreement (2017) (0)
- Comparison of Managed Decode-and-Forward Scheme and Common Decode-and-Forward Scheme in Cooperative Communication Systems (2015) (0)
- Editorial (2019) (0)
- A provably secure code‐based short signature scheme and its nontransferable variant (2018) (0)
- Secrecy Rate Region in the Interference Channel with Common Information (2010) (0)
- The Linear Complexity of the Universal logic Sequences (1995) (0)
- A New Approach to Key Schedule Designing (2017) (0)
- OptimumDecoder forMultiplicative Spread Spectrum Image Watermarking with LaplacianModeling (2017) (0)
- A jamming resilient rendezvous protocol for Cognitive Radio Ad-Hoc Networks (2014) (0)
- An achievable scheme for the one-receiver, two-eavesdropper broadcast channel (2014) (0)
- Editorial (2017) (0)
- Security and Privacy Analysis of Song–Mitchell RFID Authentication Protocol (2012) (0)
- Statistics of Random Binning Based on Tsallis Divergence (2023) (0)
- A novel approach to radio direction finding and detecting the number of sources simultaneously: DMSAE algorithm (2004) (0)
- Context-Aware Ontology-based Security Measurement Model (2022) (0)
- On the secrecy capacity of 3-receiver Broadcast Channel with causal states and conferencing (2012) (0)
- Time-Sharing Improves Dynamic Index Coding Delay (2019) (0)
- Editorial (2017) (0)
- Strong interference conditions for Multiple Access-Cognitive Interference Channel (2011) (0)
- Editorial (2016) (0)
- New Fixed Point Attacks on GOST2 Block Cipher (2019) (0)
- OPTIMAL DESIGN OF MULTIBIT DETECTION NETWORKS (2002) (0)
- Cooperative relay broadcast channels with partial causal channel state information (2011) (0)
- Cryptanalysis of some first round CAESAR candidates (2016) (0)
- Secure noisy network coding (2013) (0)
- On the reliable transmission of correlated sources over two-relay network (2013) (0)
- An Efficient Secure Scheme for Lossy and Lossless Data Aggregation in Smart Grid (2018) (0)
- IMPROVING THE EFFICIENCY OF DATA TRANSMIT SYSTEM FOR LEO REMOTE SENSING SATELLITES BASED ON TRANSMISSION RATE AND POWER CONTROL (2005) (0)
- Anonymous Mutual Authentication: An Information Theoretic Framework (2021) (0)
- Analysis of design goals of cryptography algorithms based on different components (2021) (0)
- On the design and security of a lattice-based threshold secret sharing scheme (2015) (0)
- Security enhancement of an auditing scheme for shared cloud data (2022) (0)
- Attacks on Recent RFID Authentication Protocols (2013) (0)
- A New Fast Data Encryption Algorithm (FDE) (1992) (0)
- Smooth Projective Hash Function From Codes and its Applications (2021) (0)
- Smart Grid Conference 2014 (2014) (0)
- Achievable rate regions for interference channel with two relays (2010) (0)
- Sum Degrees of Freedom of the $K$-user Interference Channel with Blind CSI (2016) (0)
- CAPACITY ANALYSIS OF A CDMA CELLULAR SYSTEM WITH MIXED CELL SIZES AND IMPERFECT POWER CONTROL (2004) (0)
- PolarSig: An efficient digital signature based on polar codes (2020) (0)
- The generalized MAC with partial state and message cooperation (2014) (0)
- Breaking anonymity of some recent lightweight RFID authentication protocols (2018) (0)
- On theDesign and Security of a Lattice-Based Threshold Secret Sharing Scheme (2017) (0)
- THE KRYPTOKNIGHT FAMILY OF PROTOCOLS: EVALUATION AND ENHANCEMENT (2000) (0)
- Modeling gene regulatory networks: Classical models, optimal perturbation for identification of network (2020) (0)
- Key agreement over a state-dependent 3-receiver broadcast channel (2013) (0)
- On the Security of a Lightweight Cloud Data Auditing Scheme (2017) (0)
- Robust network coding using information flow decomposition (2008) (0)
- Modified Cache Template Attack on AES (2020) (0)
- A Location Privacy-Preserving Method for Spectrum Sharing in Database-Driven Cognitive Radio Networks (2017) (0)
- On the Security of O-PSI: A Delegated Private Set Intersection on Outsourced Datasets (Extended Version) (2018) (0)
- Analysis and Improvement of the SPACF Scheme in Vehicular Ad-hoc Networks (2021) (0)
- Adjustable Privacy using Autoencoder-based Learning Structure (2023) (0)
- Editorial (2019) (0)
- A NEW APPROACH FOR COHERENT RADAR DETECTION IN PSEUDO- GAUSSIAN INTERFERENCE (2007) (0)
- Capacity theorems for the relay network with partial feedback (1991) (0)
- Editorial (2018) (0)
- Simulation-Based Traceability Analysis of RFID Authentication Protocols (2013) (0)
- Token Assignment for Collision Free ( TACF ) MAC Protocol to Allocate resource in Multimedia Wireless Network (0)
- PERFORMANCE COMPARISON OF ADMISSION CONTROL POLICIES FOR NEW CALLS IN SOFT-HANDOFF REGIONS FOR CDMA CELLULAR NETWORKS (2004) (0)
- Degrees of Freedom Rate Region of the $K$-user Interference Channel with Blind CSIT Using Staggered Antenna Switching (2016) (0)
- Random coding bound for E-capacity region of the relay channel with confidential messages (2014) (0)
- A novel approach to direction finding using UMPI tests (2004) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Mohammad Reza Aref?
Mohammad Reza Aref is affiliated with the following schools: