default search action
Hoda Jannati
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2022
- [j18]Zeinab Salami, Mahmoud Ahmadian-Attari, Mohammad Reza Aref, Hoda Jannati:
Location Privacy Preservation for Secondary Users in a Database-Driven Cognitive Radio Network. ISC Int. J. Inf. Secur. 14(2): 215-227 (2022) - 2021
- [j17]Hoda Jannati, Ebrahim Ardeshir-Larijani, Behnam Bahrak:
Privacy in Cross-User Data Deduplication. Mob. Networks Appl. 26(6): 2567-2579 (2021) - 2019
- [j16]Hoda Jannati, Ramtin Khosravi:
On the security of one-round meeting location determination protocol. Inf. Process. Lett. 146: 35-38 (2019) - 2017
- [j15]Hoda Jannati, Behnam Bahrak:
An improved authentication protocol for distributed mobile cloud computing services. Int. J. Crit. Infrastructure Prot. 19: 59-67 (2017) - [j14]Zeinab Salami, Mahmoud Ahmadian-Attari, Hoda Jannati, Mohammad Reza Aref:
A Location Privacy-Preserving Method for Spectrum Sharing in Database-Driven Cognitive Radio Networks. Wirel. Pers. Commun. 95(4): 3687-3711 (2017) - [j13]Hoda Jannati, Behnam Bahrak:
An Oblivious Transfer Protocol Based on Elgamal Encryption for Preserving Location Privacy. Wirel. Pers. Commun. 97(2): 3113-3123 (2017) - 2016
- [j12]Abolfazl Falahati, Hoda Jannati:
Distance bounding-based RFID binding proof protocol to protect inpatient medication safety against relay attack. Int. J. Ad Hoc Ubiquitous Comput. 22(2): 71-83 (2016) - [j11]Hoda Jannati, Behnam Bahrak:
Security analysis of an RFID tag search protocol. Inf. Process. Lett. 116(10): 618-622 (2016) - [j10]Hoda Jannati, Ebrahim Ardeshir-Larijani:
Detecting relay attacks on RFID communication systems using quantum bits. Quantum Inf. Process. 15(11): 4759-4771 (2016) - 2015
- [j9]Abolfazl Falahati, Hoda Jannati:
All-or-nothing approach to protect a distance bounding protocol against terrorist fraud attack for low-cost devices. Electron. Commer. Res. 15(1): 75-95 (2015) - [j8]Hoda Jannati, Abolfazl Falahati:
An efficient mutual distance bounding protocol over a binary symmetric noisy communication channel. Int. J. Ad Hoc Ubiquitous Comput. 20(1): 1-16 (2015) - [j7]Hoda Jannati:
Analysis of relay, terrorist fraud and distance fraud attacks on RFID systems. Int. J. Crit. Infrastructure Prot. 11: 51-61 (2015) - [j6]Hoda Jannati, Abolfazl Falahati:
Analysis of false-reject probability in distance bounding protocols with mixed challenges over RFID noisy communication channel. Inf. Process. Lett. 115(6-8): 623-629 (2015) - [j5]Hoda Jannati, Abolfazl Falahati:
Achieving an appropriate security level for distance bounding protocols over a noisy channel. Telecommun. Syst. 58(3): 219-231 (2015) - [j4]Hoda Jannati, Abolfazl Falahati:
An RFID Search Protocol Secured Against Relay Attack Based on Distance Bounding Approach. Wirel. Pers. Commun. 85(3): 711-726 (2015) - 2014
- [j3]Hoda Jannati, Abolfazl Falahati:
Mutual Distance Bounding Protocol with Its Implementability Over a Noisy Channel and Its Utilization for Key Agreement in Peer-to-Peer Wireless Networks. Wirel. Pers. Commun. 77(1): 127-149 (2014) - 2013
- [j2]Hoda Jannati, Mahmoud Salmasizadeh, Javad Mohajeri, Amir Moradi:
Introducing proxy zero-knowledge proof and utilization in anonymous credential systems. Secur. Commun. Networks 6(2): 161-172 (2013) - 2012
- [j1]Hoda Jannati, Abolfazl Falahati:
Security enhanced user authentication scheme for wireless sensor network. Int. J. Electron. Secur. Digit. Forensics 4(4): 215-228 (2012)
Conference and Workshop Papers
- 2017
- [c5]Hoda Jannati, Nasour Bagheri, Masoumeh Safkhani:
Analysis of a Distance Bounding Protocol for Verifying the Proximity of Two-Hop Neighbors. ISCISC 2017: 31-36 - 2016
- [c4]Masoumeh Safkhani, Hoda Jannati, Nasour Bagheri:
Security Analysis of Niu et al. Authentication and Ownership Management Protocol. RFIDSec 2016: 3-16 - 2011
- [c3]Hoda Jannati, Abolfazl Falahati:
Cryptanalysis and Enhancement of a Secure Group Ownership Transfer Protocol for RFID Tags. ICGS3/e-Democracy 2011: 186-193 - 2010
- [c2]Hoda Jannati, Abolfazl Falahati:
A Proxy Signature Scheme Based on Coding Theory. ICGS3 2010: 282-290 - 2008
- [c1]Hoda Jannati, Javad Mohajeri, Mahmoud Salmasizadeh:
New Proxy Signature, Proxy Blind Signature and Blind Proxy Signature Based on the Okamoto Signature. Security and Management 2008: 238-242
Informal and Other Publications
- 2015
- [i2]Nasour Bagheri, Masoumeh Safkhani, Hoda Jannati:
Security Analysis of Niu et al. Authentication and Ownership Management Protocol. IACR Cryptol. ePrint Arch. 2015: 615 (2015) - 2012
- [i1]Hoda Jannati, Abolfazl Falahati:
Cryptanalysis and enhancement of two low cost rfid authentication protocols. CoRR abs/1202.1971 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:04 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint