Content delivery networks: State of the art, trends, and future roadmap B Zolfaghari, G Srivastava, S Roy, HR Nemati, F Afghah, T Koshiba, ... ACM Computing Surveys (CSUR) 53 (2), 1-34, 2020 | 82 | 2020 |
Recursive relations for the number of spanning trees MHS Haghighi, K Bibak Applied Mathematical Sciences 3 (46), 2263-2269, 2009 | 32 | 2009 |
Restricted linear congruences K Bibak, BM Kapron, V Srinivasan, R Tauraso, L Tóth Journal of Number Theory 171, 128-144, 2017 | 27 | 2017 |
The odyssey of entropy: cryptography B Zolfaghari, K Bibak, T Koshiba Entropy 24 (2), 266, 2022 | 22 | 2022 |
On an almost-universal hash function family with applications to authentication and secrecy codes K Bibak, BM Kapron, V Srinivasan, L Tóth International Journal of Foundations of Computer Science 29 (03), 357-375, 2018 | 22 | 2018 |
The dichotomy of cloud and iot: Cloud-assisted iot from a security perspective B Zolfaghari, A Yazdinejad, A Dehghantanha, J Krzciok, K Bibak arXiv preprint arXiv:2207.01590, 2022 | 21 | 2022 |
MMH* with arbitrary modulus is always almost-universal K Bibak, BM Kapron, V Srinivasan Information Processing Letters 116 (7), 481–483, 2016 | 20 | 2016 |
Cancer Prognosis and Diagnosis Methods Based on Ensemble Learning B Zolfaghari, L Mirsadeghi, K Bibak, K Kavousi ACM Computing Surveys 55, 262:1-262:34, 2023 | 17 | 2023 |
Everlasting security of quantum key distribution with 1K-DWCDM and quadratic hash. K Bibak, R Ritchie, B Zolfaghari Quantum Inf. Comput. 21 (3&4), 181-202, 2021 | 17 | 2021 |
Additive combinatorics with a view towards computer science and cryptography—An Exposition K Bibak Number Theory and Related Fields: In Memory of Alf van der Poorten 43, 99-128, 2013 | 17 | 2013 |
Quantum key distribution with PRF (Hash, Nonce) achieves everlasting security K Bibak, R Ritchie Quantum Information Processing 20 (7), 228, 2021 | 16 | 2021 |
Cryptography in hierarchical coded caching: System model and cost analysis B Zolfaghari, V Singh, BK Rai, K Bibak, T Koshiba Entropy 23 (11), 1459, 2021 | 14 | 2021 |
Statistical trend analysis of physically unclonable functions: An approach via text mining B Zolfaghari, K Bibak, T Koshiba, HR Nemati, P Mitra CRC Press, 2021 | 14 | 2021 |
The Cayley graphs associated with some quasi-perfect Lee codes are Ramanujan graphs K Bibak, BM Kapron, V Srinivasan IEEE Transactions on Information Theory, 2016 | 14 | 2016 |
Some trigonometric identities involving Fibonacci and Lucas numbers K Bibak, MHS Haghighi Journal of Integer Sequences 12 (2), 3, 2009 | 14 | 2009 |
Unweighted linear congruences with distinct coordinates and the Varshamov–Tenengolts codes K Bibak, BM Kapron, V Srinivasan Designs, Codes and Cryptography 86, 1893–1904, 2018 | 13 | 2018 |
Weight enumerators of some classes of deletion correcting codes K Bibak, O Milenkovic 2018 IEEE International Symposium on Information Theory (ISIT), 431-435, 2018 | 12 | 2018 |
Counting surface-kernel epimorphisms from a co-compact Fuchsian group to a cyclic group with motivations from string theory and QFT K Bibak, BM Kapron, V Srinivasan Nuclear Physics B 910, 712-723, 2016 | 12 | 2016 |
On a restricted linear congruence K Bibak, BM Kapron, V Srinivasan International Journal of Number Theory 12 (08), 2167-2171, 2016 | 11 | 2016 |
The number of spanning trees in some classes of graphs MHS Haghighi, K Bibak The Rocky Mountain Journal of Mathematics, 1183-1195, 2012 | 11 | 2012 |