Folgen
Hoda Jannati
Hoda Jannati
Postdoctoral Researcher at IPM
Bestätigte E-Mail-Adresse bei ipm.ir
Titel
Zitiert von
Zitiert von
Jahr
An oblivious transfer protocol based on elgamal encryption for preserving location privacy
H Jannati, B Bahrak
Wireless Personal Communications 97, 3113-3123, 2017
312017
Cryptanalysis and enhancement of a secure group ownership transfer protocol for RFID tags
H Jannati, A Falahati
International Conference on e-Democracy, 186-193, 2011
262011
Security analysis of an RFID tag search protocol
H Jannati, B Bahrak
Information Processing Letters 116 (10), 618-622, 2016
172016
Analysis of relay, terrorist fraud and distance fraud attacks on RFID systems
H Jannati
International Journal of Critical Infrastructure Protection 11, 51-61, 2015
172015
Mutual implementation of predefined and random challenges over RFID distance bounding protocol
H Jannati, A Falahati
2012 9th International ISC Conference on Information Security and Cryptology …, 2012
152012
Application of distance bounding protocols with random challenges over RFID noisy communication systems
A Falahati, H Jannati
Wireless Sensor Systems (WSS 2012), IET Conference on, 1-5, 2012
142012
An improved authentication protocol for distributed mobile cloud computing services
H Jannati, B Bahrak
International Journal of Critical Infrastructure Protection 19, 59-67, 2017
132017
Detecting relay attacks on RFID communication systems using quantum bits
H Jannati, E Ardeshir-Larijani
Quantum Information Processing 15, 4759-4771, 2016
112016
All-or-nothing approach to protect a distance bounding protocol against terrorist fraud attack for low-cost devices
A Falahati, H Jannati
Electronic Commerce Research 15 (1), 75-95, 2015
112015
Mutual distance bounding protocol with its implementability over a noisy channel and its utilization for key agreement in peer-to-peer wireless networks
H Jannati, A Falahati
Wireless Personal Communications 77 (1), 127-149, 2014
102014
Cryptanalysis and enhancement of two low cost RFID authentication protocols
H Jannati, A Falahati
arXiv preprint arXiv:1202.1971, 2012
102012
An RFID Search Protocol Secured Against Relay Attack Based on Distance Bounding Approach
H Jannati, A Falahati
Wireless Personal Communications 85 (3), 711-726, 2015
92015
Security analysis of Niu et al. authentication and ownership management protocol
N Bagheri, M Safkhani, H Jannati
Cryptology ePrint Archive, 2015
82015
Achieving an appropriate security level for distance bounding protocols over a noisy channel
H Jannati, A Falahati
Telecommunication Systems 58 (3), 219-231, 2015
82015
A location privacy-preserving method for spectrum sharing in database-driven cognitive radio networks
Z Salami, M Ahmadian-Attari, H Jannati, MR Aref
Wireless Personal Communications 95, 3687-3711, 2017
62017
An Efficient Mutual Distance Bounding Protocol Over a Noisy Channel
H Jannati, A Falahati
International Journal of Ad Hoc and Ubiquitous Computing 20 (1), 1-16, 2015
62015
Introducing proxy zero‐knowledge proof and utilization in anonymous credential systems
H Jannati, M Salmasizadeh, J Mohajeri, A Moradi
Security and Communication Networks 6 (2), 161-172, 2013
62013
A proxy signature scheme based on coding theory
H Jannati, A Falahati
Global Security, Safety, and Sustainability: 6th International Conference …, 2010
52010
Distance bounding-based RFID binding proof protocol to protect inpatient medication safety against relay attack
A Falahati, H Jannati
International Journal of Ad Hoc and Ubiquitous Computing 22 (2), 71-83, 2016
42016
Analysis of false-reject probability in distance bounding protocols with mixed challenges over RFID noisy communication channel
H Jannati, A Falahati
Information Processing Letters 115 (6), 623-629, 2015
32015
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20