Search

Your search keyword '"Bagheri, Nasour"' showing total 70 results

Search Constraints

Start Over You searched for: Author "Bagheri, Nasour" Remove constraint Author: "Bagheri, Nasour" Database Complementary Index Remove constraint Database: Complementary Index
70 results on '"Bagheri, Nasour"'

Search Results

1. Deep learning based bio-metric authentication system using a high temporal/frequency resolution transform.

2. Toward designing a lightweight RFID authentication protocol for constrained environments.

3. The Rise of Passive RFID RTLS Solutions in Industry 5.0.

5. Using a privacy-enhanced authentication process to secure IoT-based smart grid infrastructures.

6. Smart Grid Security: A PUF-Based Authentication and Key Agreement Protocol.

7. χperbp: a cloud-based lightweight mutual authentication protocol.

8. Exploiting statistical effective fault attack in a blind setting.

9. Toward Designing a Secure Authentication Protocol for IoT Environments.

10. ECG Identification Based on the Gramian Angular Field and Tested with Individuals in Resting and Activity States.

11. Improvement and Cryptanalysis of a Physically Unclonable Functions Based Authentication Scheme for Smart Grids.

12. Practical Differential Fault Analysis on CRAFT, a Lightweight Block Cipher.

13. Practical Differential Fault Analysis on SKINNY.

14. Defending Industry 4.0: An Enhanced Authentication Scheme for IoT Devices.

15. Statistical Effective Fault Attacks: The Other Side of the Coin.

16. Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECK.

17. Correction to: Using a privacy‑enhanced authentication process to secure IoT‑based smart grid infrastructures.

18. Cryptographic properties of cyclic binary matrices.

19. A Recurrent Temporal Model for Semantic Levels Categorization Based on Human Visual System.

20. MDSbSP: a search protocol based on MDS codes for RFID-based Internet of vehicle.

21. On the designing a secure biometric-based remote patient authentication scheme for mobile healthcare environments.

22. Modification and hardware implementation of cortex‐like object recognition model.

23. CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking.

24. Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants.

25. Practical fault resilient hardware implementations of AES.

26. High throughput fault‐resilient AES architecture.

27. Reliable S-Box Hardware Implementation by Gate-Level Fault Masking Enhancement.

28. Lightweight 4 x 4MDSMatrices for Hardware-Oriented Cryptographic Primitives.

29. An improved low-cost yoking proof protocol based on Kazahaya’s flaws.

30. A secure search protocol for lightweight and low-cost RFID systems.

31. A Scalable and Lightweight Grouping Proof Protocol for Internet of Things Applications.

32. Passive secret disclosure attack on an ultralightweight authentication protocol for Internet of Things.

35. On the (Im)Possibility of Receiving Security Beyond 2 Using an l-Bit PRNG.

36. A new anti-collision protocol based on information of collided tags in RFID systems.

37. An authenticated encryption based grouping proof protocol for RFID systems.

38. On the Security of Permutation Based Authentication Protocols for Internet of Things Applications: The Case of Huang et al.'s Protocol.

40. A Note on the Security of Two Improved RFID Protocols.

44. Building indifferentiable compression functions from the PGV compression functions.

45. Weaknesses of fingerprint-based mutual authentication protocol.

46. Cryptanalysis of Some First Round CAESAR Candidates.

Catalog

Books, media, physical & digital resources