Search

Your search keyword '"Bagheri, Nasour"' showing total 31 results

Search Constraints

Start Over You searched for: Author "Bagheri, Nasour" Remove constraint Author: "Bagheri, Nasour" Publisher springer nature Remove constraint Publisher: springer nature
31 results on '"Bagheri, Nasour"'

Search Results

2. Using a privacy-enhanced authentication process to secure IoT-based smart grid infrastructures.

3. χperbp: a cloud-based lightweight mutual authentication protocol.

4. Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECK.

5. Correction to: Using a privacy‑enhanced authentication process to secure IoT‑based smart grid infrastructures.

6. MDSbSP: a search protocol based on MDS codes for RFID-based Internet of vehicle.

7. On the designing a secure biometric-based remote patient authentication scheme for mobile healthcare environments.

8. Reliable S-Box Hardware Implementation by Gate-Level Fault Masking Enhancement.

9. An improved low-cost yoking proof protocol based on Kazahaya’s flaws.

10. A secure search protocol for lightweight and low-cost RFID systems.

11. A Scalable and Lightweight Grouping Proof Protocol for Internet of Things Applications.

12. Passive secret disclosure attack on an ultralightweight authentication protocol for Internet of Things.

15. On the (Im)Possibility of Receiving Security Beyond 2 Using an l-Bit PRNG.

19. Building indifferentiable compression functions from the PGV compression functions.

26. On the Collision and Preimage Resistance of Certain Two-Call Hash Functions.

27. Cryptanalysis of a new EPC class-1 generation-2 standard compliant RFID protocol.

28. Two RFID Standard-based Security Protocols for Healthcare Environments.

29. Strengthening the Security of EPC C-1 G-2 RFID Standard.

31. The suffix-free-prefix-free hash function construction and its indifferentiability security analysis.

Catalog

Books, media, physical & digital resources