default search action
Mahdi R. Alagheband
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j14]Zahra Hatefi, Majid Bayat, Mahdi R. Alaghband, Negin Hamian, Seyed Morteza Pournaghi:
A conditional privacy-preserving fair electronic payment scheme based on blockchain without trusted third party. J. Ambient Intell. Humaniz. Comput. 14(8): 10089-10102 (2023) - [j13]Mahdi R. Alagheband, Atefeh Mashatan:
Formal unlinkability analysis of message authentication protocols based on authentic channels. J. Supercomput. 79(7): 8097-8123 (2023) - 2022
- [j12]Mahdi R. Alagheband, Atefeh Mashatan:
Advanced digital signatures for preserving privacy and trust management in hierarchical heterogeneous IoT: Taxonomy, capabilities, and objectives. Internet Things 18: 100492 (2022) - [j11]Mahdi R. Alagheband, Atefeh Mashatan:
Advanced encryption schemes in multi-tier heterogeneous internet of things: taxonomy, capabilities, and objectives. J. Supercomput. 78(17): 18777-18824 (2022) - 2021
- [j10]Amirhossein Asari, Mahdi R. Alagheband, Majid Bayat, Maryam Rajabzadeh Asaar:
A new provable hierarchical anonymous certificateless authentication protocol with aggregate verification in ADS-B systems. Comput. Networks 185: 107599 (2021) - [j9]Somayeh Hashemi, Mohammad Ali Pourmina, Saleh Mobayen, Mahdi R. Alagheband:
Multiuser wireless speech encryption using synchronized chaotic systems. Int. J. Speech Technol. 24(3): 651-663 (2021) - 2020
- [j8]Somayeh Hashemi, Mohammad Ali Pourmina, Saleh Mobayen, Mahdi R. Alagheband:
Design of a secure communication system between base transmitter station and mobile equipment based on finite-time chaos synchronisation. Int. J. Syst. Sci. 51(11): 1969-1986 (2020) - [j7]Mahdi R. Alagheband, Atefeh Mashatan, Morteza Zihayat:
Time-based Gap Analysis of Cybersecurity Trends in Academic and Digital Media. ACM Trans. Manag. Inf. Syst. 11(4): 20:1-20:20 (2020) - [j6]Vali Gholami, Mahdi R. Alagheband:
Provably privacy analysis and improvements of the lightweight RFID authentication protocols. Wirel. Networks 26(3): 2153-2169 (2020)
2010 – 2019
- 2018
- [j5]Saeed Banaeian Far, Mahdi R. Alagheband:
Provable analysis and improvement of smart card-based anonymous authentication protocols. Int. J. Commun. Syst. 31(10) (2018) - [j4]Azadeh Imani Rad, Mahdi R. Alagheband, Saeed Banaeian Far:
Performing and mitigating force and terrorist fraud attacks against two RFID distance-bounding protocols. J. Inf. Secur. Appl. 42: 87-94 (2018) - [c5]Saeed Banaeian Far, Mahdi R. Alagheband:
Analysis and Improvement of a Lightweight Anonymous Authentication Protocol for Mobile Pay-TV Systems. IST 2018: 466-473 - [i3]Saeed Banaeian Far, Mahdi R. Alagheband:
Analysis and Improvement of a Lightweight Anonymous Authentication Protocol for Mobile Pay-TV Systems (Full text). CoRR abs/1808.09493 (2018) - 2016
- [c4]S. Mohammad Paknahad, S. Abolfazl Hosseini, Mahdi R. Alagheband:
User-friendly visual secret sharing for color images based on random grids. CSNDSP 2016: 1-6 - 2014
- [j3]Mahdi R. Alagheband, Mohammad Reza Aref:
Simulation-Based Traceability Analysis of RFID Authentication Protocols. Wirel. Pers. Commun. 77(2): 1019-1038 (2014) - 2013
- [j2]Mahdi R. Alagheband, Mohammad Reza Aref:
Unified privacy analysis of new-found RFID authentication protocols. Secur. Commun. Networks 6(8): 999-1009 (2013) - [c3]Zahra Sohrabi-Bonab, Mahdi R. Alagheband, Mohammad Reza Aref:
Traceability analysis of quadratic residue-based RFID authentication protocols. PST 2013: 61-68 - 2012
- [j1]Mahdi R. Alaghband, Mohammad Reza Aref:
Dynamic and secure key management model for hierarchical heterogeneous sensor networks. IET Inf. Secur. 6(4): 271-280 (2012) - 2011
- [c2]Mahdi R. Alaghband, Mohammad Reza Aref:
A Secure Key Management Framework for Heterogeneous Wireless Sensor Networks. Communications and Multimedia Security 2011: 18-31 - [c1]Mohammad Hassan Habibi, Mahdi R. Alaghband, Mohammad Reza Aref:
Attacks on a Lightweight Mutual Authentication Protocol under EPC C-1 G-2 Standard. WISTP 2011: 254-263 - [i2]Mohammad Hassan Habibi, Mahmoud Gardeshi, Mahdi R. Alaghband:
Practical Attacks on a RFID Authentication Protocol Conforming to EPC C-1 G-2 Standard. CoRR abs/1102.0763 (2011) - [i1]Mohammad Hassan Habibi, Mahmoud Gardeshi, Mahdi R. Alaghband:
Cryptanalysis of two mutual authentication protocols for low-cost RFID. CoRR abs/1102.0858 (2011)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:18 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint