M. Hossain Heydari
Title
Cited by
Cited by
Year
Combinatorial optimization of group key management
M Eltoweissy, MH Heydari, L Morales, IH Sudborough
Journal of Network and Systems Management 12 (1), 33-50, 2004
2232004
Content based file type detection algorithms
M McDaniel, MH Heydari
36th Annual Hawaii International Conference on System Sciences, 2003 …, 2003
1952003
On the diameter of the pancake network
MH Heydari, IH Sudborough
Journal of Algorithms 25 (1), 67-94, 1997
1631997
Techniques for finding ring covers in survivable networks
LM Gardner, M Heydari, J Shah, IH Sudborough, IG Tollis, C Xia
1994 IEEE GLOBECOM. Communications: The Global Bridge 3, 1862-1866, 1994
721994
A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security
MS Farash, SA Chaudhry, M Heydari, SM Sajad Sadough, S Kumari, ...
International Journal of Communication Systems 30 (4), e3019, 2017
662017
On sorting by prefix reversals and the diameter of pancake networks
MH Heydari, IH Sudborough
Heinz Nixdorf Symposium at the University of Paderborn, 218-227, 1992
401992
Improving the security of wireless sensor networks in an IoT environmental monitoring system
M Tellez, S El-Tawab, HM Heydari
2016 IEEE systems and information engineering design symposium (SIEDS), 72-77, 2016
362016
Efficacy of education on knowledge, attitude & practice of Type II diabetic patients in relation to correct nutrition
GH Heydari, S Moslemi, F Montazerifar, M Heydari
ZAHEDAN JOURNAL OF RESEARCH IN MEDICAL SCIENCES (TABIB-E-SHARGH) 4 (4), 207-213, 2003
292003
Combinatorial optimization of multicast key management
L Morales, IH Sudborough, M Eltoweissy, MH Heydari
36th Annual Hawaii International Conference on System Sciences, 2003 …, 2003
262003
Efficient algorithms for batch re-keying operations in secure multicast
MH Heydari, L Morales, IH Sudborough
Proceedings of the 39th Annual Hawaii International Conference on System …, 2006
232006
IoT security attacks using reverse engineering methods on WSN applications
M Tellez, S El-Tawab, MH Heydari
2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), 182-187, 2016
192016
An efficient password-based authenticated key exchange protocol with provable security for mobile client–client networks
M Heydari, SMS Sadough, MS Farash, SA Chaudhry, K Mahmood
Wireless Personal Communications 88 (2), 337-356, 2016
162016
Computing cross associations for attack graphs and other applications
MH Heydari, L Morales, CO Shields, IH Sudborough
2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007
162007
An intrusion-tolerant password authentication system
X Wang, MH Heydari, H Lin
19th Annual Computer Security Applications Conference, 2003. Proceedings …, 2003
162003
Security measurement on a cloud-based cyber-physical system used for intelligent transportation
K Evers, R Oram, S El-Tawab, MH Heydari, BB Park
2017 IEEE International Conference on Vehicular Electronics and Safety …, 2017
122017
The pancake problem
MH Heydari
University of Texas at Dallas, 1993
101993
Security analysis of an IoT system used for indoor localization in healthcare facilities
C Bradley, S El-Tawab, MH Heydari
2018 Systems and Information Engineering Design Symposium (SIEDS), 147-152, 2018
92018
Localization of health center assets through an iot environment (locate)
TD McAllister, S El-Tawab, MH Heydari
2017 Systems and Information Engineering Design Symposium (SIEDS), 132-137, 2017
92017
Sorting by prefix reversals is NP-complete
MH Heydari, IH Sudborough
To be submitted 66, 1993
91993
Data analysis and information security of an Internet of Things (IoT) intelligent transit system
Z Yorio, R Oram, S El-Tawab, A Salman, MH Heydari, BB Park
2018 Systems and Information Engineering Design Symposium (SIEDS), 24-29, 2018
72018
The system can't perform the operation now. Try again later.
Articles 1–20