Dynamic and secure key management model for hierarchical heterogeneous sensor networks MR Alagheband, MR Aref IET Information Security 6 (4), 271-280, 2012 | 69 | 2012 |
Design of a secure communication system between base transmitter station and mobile equipment based on finite-time chaos synchronisation S Hashemi, MA Pourmina, S Mobayen, MR Alagheband International Journal of Systems Science 51 (11), 1969-1986, 2020 | 38 | 2020 |
Practical attacks on a RFID authentication protocol conforming to EPC C-1 G-2 standard MH Habibi, M Gardeshi, MR Alaghband arXiv preprint arXiv:1102.0763, 2011 | 37 | 2011 |
Simulation-based traceability analysis of RFID authentication protocols MR Alagheband, MR Aref Wireless Personal Communications 77, 1019-1038, 2014 | 36 | 2014 |
A new provable hierarchical anonymous certificateless authentication protocol with aggregate verification in ADS-B systems A Asari, MR Alagheband, M Bayat, MR Asaar Computer Networks 185, 107599, 2021 | 30 | 2021 |
Attacks on a lightweight mutual authentication protocol under EPC C-1 G-2 standard MH Habibi, MR Alagheband, MR Aref Information Security Theory and Practice. Security and Privacy of Mobile …, 2011 | 30 | 2011 |
Unified privacy analysis of new‐found RFID authentication protocols MR Alagheband, MR Aref Security and Communication Networks 6 (8), 999-1009, 2013 | 26 | 2013 |
Advanced digital signatures for preserving privacy and trust management in hierarchical heterogeneous IoT: Taxonomy, capabilities, and objectives MR Alagheband, A Mashatan Internet of Things 18, 100492, 2022 | 23 | 2022 |
Time-based gap analysis of cybersecurity trends in academic and digital media MR Alagheband, A Mashatan, M Zihayat ACM Transactions on Management Information Systems (TMIS) 11 (4), 1-20, 2020 | 22 | 2020 |
Traceability analysis of quadratic residue-based RFID authentication protocols Z Sohrabi-Bonab, MR Alagheband, MR Aref 2013 Eleventh Annual Conference on Privacy, Security and Trust, 61-68, 2013 | 15 | 2013 |
A conditional privacy-preserving fair electronic payment scheme based on blockchain without trusted third party Z Hatefi, M Bayat, MR Alaghband, N Hamian, SM Pournaghi Journal of Ambient Intelligence and Humanized Computing 14 (8), 10089-10102, 2023 | 11 | 2023 |
Multiuser wireless speech encryption using synchronized chaotic systems S Hashemi, MA Pourmina, S Mobayen, MR Alagheband International Journal of Speech Technology 24, 651-663, 2021 | 11 | 2021 |
Communications and multimedia security B De Decker, J Lapon, V Naessens, A Uhl Springer, 2011 | 11* | 2011 |
Provably privacy analysis and improvements of the lightweight RFID authentication protocols M Gholami, V. - R. Alagheband Wireless Networks, https://doi.org/10.1007/s11276-019-02037-z, 2019 | 10* | 2019 |
Cryptanalysis of two mutual authentication protocols for low-cost RFID MH Habibi, M Gardeshi, MR Alaghband arXiv preprint arXiv:1102.0858, 2011 | 10 | 2011 |
A secure key management framework for heterogeneous wireless sensor networks MR Alagheband, MR Aref Communications and Multimedia Security: 12th IFIP TC 6/TC 11 International …, 2011 | 10 | 2011 |
Formal cryptanalysis of a CRC-based RFID authentication protocol Z Sohrabi-Bonab, MR Alagheband, MR Aref 2014 22nd Iranian Conference on Electrical Engineering (ICEE), 1642-1647, 2014 | 9 | 2014 |
Advanced encryption schemes in multi-tier heterogeneous internet of things: taxonomy, capabilities, and objectives MR Alagheband, A Mashatan The Journal of Supercomputing 78 (17), 18777-18824, 2022 | 6 | 2022 |
User-friendly visual secret sharing for color images based on random grids SM Paknahad, SA Hosseini, MR Alagheband 2016 10th International Symposium on Communication Systems, Networks and …, 2016 | 6 | 2016 |
Blockchain-based User Re-enrollment for Biometric Authentication Systems N Hamian, M Bayat, MR Alaghband, Z Hatefi, SM Pournaghi International Journal of Electronics and Information Engineering 14 (01), 18-38, 2022 | 5 | 2022 |