Segui
Hoda Jannati
Hoda Jannati
Postdoctoral Researcher at IPM
Email verificata su ipm.ir
Titolo
Citata da
Citata da
Anno
An oblivious transfer protocol based on elgamal encryption for preserving location privacy
H Jannati, B Bahrak
Wireless Personal Communications 97, 3113-3123, 2017
312017
Cryptanalysis and enhancement of a secure group ownership transfer protocol for RFID tags
H Jannati, A Falahati
International Conference on e-Democracy, 186-193, 2011
262011
Security analysis of an RFID tag search protocol
H Jannati, B Bahrak
Information Processing Letters 116 (10), 618-622, 2016
172016
Analysis of relay, terrorist fraud and distance fraud attacks on RFID systems
H Jannati
International Journal of Critical Infrastructure Protection 11, 51-61, 2015
172015
Mutual implementation of predefined and random challenges over RFID distance bounding protocol
H Jannati, A Falahati
2012 9th International ISC Conference on Information Security and Cryptology …, 2012
152012
An improved authentication protocol for distributed mobile cloud computing services
H Jannati, B Bahrak
International Journal of Critical Infrastructure Protection 19, 59-67, 2017
142017
Application of distance bounding protocols with random challenges over RFID noisy communication systems
A Falahati, H Jannati
Wireless Sensor Systems (WSS 2012), IET Conference on, 1-5, 2012
142012
Detecting relay attacks on RFID communication systems using quantum bits
H Jannati, E Ardeshir-Larijani
Quantum Information Processing 15, 4759-4771, 2016
112016
All-or-nothing approach to protect a distance bounding protocol against terrorist fraud attack for low-cost devices
A Falahati, H Jannati
Electronic Commerce Research 15 (1), 75-95, 2015
112015
Mutual distance bounding protocol with its implementability over a noisy channel and its utilization for key agreement in peer-to-peer wireless networks
H Jannati, A Falahati
Wireless Personal Communications 77 (1), 127-149, 2014
102014
Cryptanalysis and enhancement of two low cost RFID authentication protocols
H Jannati, A Falahati
arXiv preprint arXiv:1202.1971, 2012
102012
An RFID Search Protocol Secured Against Relay Attack Based on Distance Bounding Approach
H Jannati, A Falahati
Wireless Personal Communications 85 (3), 711-726, 2015
92015
Security analysis of Niu et al. authentication and ownership management protocol
N Bagheri, M Safkhani, H Jannati
Cryptology ePrint Archive, 2015
82015
Achieving an appropriate security level for distance bounding protocols over a noisy channel
H Jannati, A Falahati
Telecommunication Systems 58 (3), 219-231, 2015
82015
A location privacy-preserving method for spectrum sharing in database-driven cognitive radio networks
Z Salami, M Ahmadian-Attari, H Jannati, MR Aref
Wireless Personal Communications 95, 3687-3711, 2017
62017
An Efficient Mutual Distance Bounding Protocol Over a Noisy Channel
H Jannati, A Falahati
International Journal of Ad Hoc and Ubiquitous Computing 20 (1), 1-16, 2015
62015
Introducing proxy zero‐knowledge proof and utilization in anonymous credential systems
H Jannati, M Salmasizadeh, J Mohajeri, A Moradi
Security and Communication Networks 6 (2), 161-172, 2013
62013
A proxy signature scheme based on coding theory
H Jannati, A Falahati
Global Security, Safety, and Sustainability: 6th International Conference …, 2010
52010
Distance bounding-based RFID binding proof protocol to protect inpatient medication safety against relay attack
A Falahati, H Jannati
International Journal of Ad Hoc and Ubiquitous Computing 22 (2), 71-83, 2016
42016
Analysis of false-reject probability in distance bounding protocols with mixed challenges over RFID noisy communication channel
H Jannati, A Falahati
Information Processing Letters 115 (6), 623-629, 2015
32015
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20