Survivability evaluation for networks carrying complex traffic flows
Jamali, Amin, Berenjkoub, Mehdi, Saidi, Hossein, Ghahfarokhi, Behrouz Shahgholi
Published in Digital communications and networks (01.04.2023)
Published in Digital communications and networks (01.04.2023)
Get full text
Journal Article
A High Throughput Device-to-Device Wireless Communication System
JAMALI, Amin, HEMAMI, Seyed Mostafa SAFAVI, BERENJKOUB, Mehdi, SAIDI, Hossein, ABEDINI, Masih
Published in IEICE Transactions on Information and Systems (01.01.2019)
Published in IEICE Transactions on Information and Systems (01.01.2019)
Get full text
Journal Article
An adaptive MAC protocol for wireless LANs
Jamali, Amin, Hemami, Seyed Mostafa Safavi, Berenjkoub, Mehdi, Saidi, Hossein
Published in Journal of communications and networks (01.06.2014)
Published in Journal of communications and networks (01.06.2014)
Get full text
Journal Article
Universal designated verifier signature scheme with non-delegatability in the standard model
Rastegari, Parvin, Berenjkoub, Mehdi, Dakhilalian, Mohammad, Susilo, Willy
Published in Information sciences (01.04.2019)
Published in Information sciences (01.04.2019)
Get full text
Journal Article
A new mutual authentication protocol for GSM networks
Fanian, A., Berenjkoub, M., Gulliver, T.A.
Published in 2009 Canadian Conference on Electrical and Computer Engineering (01.05.2009)
Published in 2009 Canadian Conference on Electrical and Computer Engineering (01.05.2009)
Get full text
Conference Proceeding
A Taxonomy for Network Vulnerabilities
Sara Hajian, Faramarz Hendessi, Mehdi Berenjkoub
Published in International Journal of Information and Communication Technology Research (Tehran.Print) (01.03.2010)
Get full text
Published in International Journal of Information and Communication Technology Research (Tehran.Print) (01.03.2010)
Journal Article
An improved certificateless signcryption scheme
Rastegari, Parvin, Berenjkoub, Mehdi
Published in 2016 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC) (01.09.2016)
Published in 2016 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC) (01.09.2016)
Get full text
Conference Proceeding
A Symmetric Polynomial Based Mutual Authentication Protocol for GSM Networks
Fanian, Ali, Berenjkoub, Mehdi, Gulliver, T Aaron
Published in 2010 IEEE Wireless Communication and Networking Conference (01.04.2010)
Published in 2010 IEEE Wireless Communication and Networking Conference (01.04.2010)
Get full text
Conference Proceeding
An Efficient Authentication and Key Management Protocol for Hierarchical Ad Hoc Sensor Networks
Fanian, A., Berenjkoub, M., Gulliver, T.A.
Published in 2009 IEEE Wireless Communications and Networking Conference (01.04.2009)
Published in 2009 IEEE Wireless Communications and Networking Conference (01.04.2009)
Get full text
Conference Proceeding