default search action
Mohammad Hesam Tadayon
Person information
- affiliation: Tarbiat Modares University, Tehran, Iran
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Mahdi Mahdavi, Mohammad Hesam Tadayon, Mohammad Sayad Haghighi, Zahra Ahmadian:
IoT-friendly, pre-computed and outsourced attribute based encryption. Future Gener. Comput. Syst. 150: 115-126 (2024) - [j20]Mahdi Mahdavi, Mohammad Hesam Tadayon, Mohammad Sayad Haghighi, Zahra Ahmadian:
Corrigendum to "IoT-friendly, pre-computed and outsourced attribute based encryption" [Future Generation Computer Systems (FGCS) volume 150 (2024) 115-126/ FGCS-D-23-00424]. Future Gener. Comput. Syst. 154: 396 (2024) - 2023
- [j19]Mojtaba Alizadeh, Mohammad Hesam Tadayon, Alireza Jolfaei:
Secure ticket-based authentication method for IoT applications. Digit. Commun. Networks 9(3): 710-716 (2023) - 2022
- [j18]Saman Shojae Chaeikar, Mojtaba Alizadeh, Mohammad Hesam Tadayon, Alireza Jolfaei:
An intelligent cryptographic key management model for secure communications in distributed industrial intelligent systems. Int. J. Intell. Syst. 37(12): 10158-10171 (2022) - [j17]Mehrab Najafian, Morteza Esmaeili, T. Aaron Gulliver, Mohammad Hesam Tadayon:
Twin Sudoku Puzzles and Triplet Solid Sudoku Cubes From Strongly Mutually Distinct Twin Sudoku Tables. IEEE Trans. Games 14(4): 632-643 (2022) - [j16]Maryam Ebrahimi, Mohammad Sayad Haghighi, Alireza Jolfaei, Nasrin Shamaeian, Mohammad Hesam Tadayon:
A Secure and Decentralized Trust Management Scheme for Smart Health Systems. IEEE J. Biomed. Health Informatics 26(5): 1961-1968 (2022) - [j15]Maryam Ebrahimi, Mohammad Hesam Tadayon, Mohammad Sayad Haghighi, Alireza Jolfaei:
A Quantitative Comparative Study of Data-oriented Trust Management Schemes in Internet of Things. ACM Trans. Manag. Inf. Syst. 13(3): 24:1-24:30 (2022) - 2021
- [j14]Somayeh Nasiri, Farahnaz Sadoughi, Afsaneh Dehnad, Mohammad Hesam Tadayon, Hossein Ahmadi:
Layered Architecture for Internet of Things-based Healthcare System: A Systematic Literature Review. Informatica (Slovenia) 45(4) (2021) - [j13]Mojtaba Alizadeh, Mohammad Hesam Tadayon, Kouichi Sakurai, Hiroaki Anada, Alireza Jolfaei:
A Secure Ticket-Based Authentication Mechanism for Proxy Mobile IPv6 Networks in Volunteer Computing. ACM Trans. Internet Techn. 21(4): 82:1-82:16 (2021) - 2020
- [j12]Mehrab Najafian, Mohammad Hesam Tadayon, Morteza Esmaeili:
Construction of Strongly Mutually Distinct Sudoku Tables and Solid Sudoku Cubes by Cyclotomic Cosets. IEEE Trans. Games 12(1): 54-62 (2020) - [j11]Mohammad Sayad Haghighi, Faezeh Farivar, Alireza Jolfaei, Mohammad Hesam Tadayon:
Intelligent robust control for cyber-physical systems of rotary gantry type under denial of service attack. J. Supercomput. 76(4): 3063-3085 (2020)
2010 – 2019
- 2018
- [j10]Zahra Ferdosi, Farhad Rahmati, Mohammad Hesam Tadayon:
On the Stopping Distance of SA-LDPC Codes by Transversal Designs. IEEE Access 6: 40979-40989 (2018) - [j9]Mohammad Hesam Tadayon, Alireza Tasdighi, Massimo Battaglioni, Marco Baldi, Franco Chiaraluce:
Efficient Search of Compact QC-LDPC and SC-LDPC Convolutional Codes With Large Girth. IEEE Commun. Lett. 22(6): 1156-1159 (2018) - [j8]Amin Mohammadali, Mohammad Sayad Haghighi, Mohammad Hesam Tadayon, Alireza Mohammadi-Nodooshan:
A Novel Identity-Based Key Establishment Method for Advanced Metering Infrastructure in Smart Grid. IEEE Trans. Smart Grid 9(4): 2834-2842 (2018) - [c6]Massimo Battaglioni, Alireza Tasdighi, Marco Baldi, Mohammad Hesam Tadayon, Franco Chiaraluce:
Compact QC-LDPC Block and SC-LDPC Convolutional Codes for Low-Latency Communications. PIMRC 2018: 1-5 - [i2]Mohammad Hesam Tadayon, Alireza Tasdighi, Massimo Battaglioni, Marco Baldi, Franco Chiaraluce:
Efficient Search of Compact QC-LDPC and SC-LDPC Convolutional Codes with Large Girth. CoRR abs/1804.06454 (2018) - [i1]Massimo Battaglioni, Alireza Tasdighi, Marco Baldi, Mohammad Hesam Tadayon, Franco Chiaraluce:
Compact QC-LDPC Block and SC-LDPC Convolutional Codes for Low-Latency Communications. CoRR abs/1809.04662 (2018) - 2017
- [c5]Mojtaba Alizadeh, Mohammad Hesam Tadayon, Kouichi Sakurai, Sabariah Baharun, Hiroaki Anada, Mazdak Zamani, Akram M. Zeki, Shehzad Ashraf Chaudhry, Muhammad Khurram Khan:
Comments and improvements of "HOTA: Handover optimized ticket-based authentication in network-based mobility management". ICIN 2017: 112-116 - 2016
- [j7]Asieh Abolpour Mofrad, Matthew Geoffrey Parker, Zahra Ferdosi, Mohammad Hesam Tadayon:
Clique-Based Neural Associative Memories with Local Coding and Precoding. Neural Comput. 28(8): 1553-1573 (2016) - [c4]Mahdi Vajdi, Atefeh Torkaman, Marjan Bahrololum, Mohammad Hesam Tadayon, Afshin Salajegheh:
Proposed new features to improve Android malware detection. IST 2016: 100-104 - [c3]Farid Daryabar, Mohammad Hesam Tadayon, Ashkan Parsi, Hadi Sadjadi:
Automated analysis method for forensic investigation of cloud applications on Android. IST 2016: 145-150 - [c2]Majid Salehi, Farid Daryabar, Mohammad Hesam Tadayon:
Welcome to Binder: A kernel level attack model for the Binder in Android operating system. IST 2016: 156-161 - 2015
- [j6]Mohammad Hesam Tadayon, Hadi Khanmohammadi, Mohammad Sayad Haghighi:
Dynamic and verifiable multi-secret sharing scheme based on Hermite interpolation and bilinear maps. IET Inf. Secur. 9(4): 234-239 (2015) - [j5]Mohammad Hesam Tadayon, Asieh Abolpour Mofrad, Zahra Ferdosi:
On the Burst Erasure Efficiency of Array LDPC Codes. Wirel. Pers. Commun. 83(2): 1313-1329 (2015) - [c1]Asieh Abolpour Mofrad, Zahra Ferdosi, Matthew Geoffrey Parker, Mohammad Hesam Tadayon:
Neural network associative memories with local coding. CWIT 2015: 178-181 - 2011
- [j4]Morteza Esmaeili, Mohammad Hesam Tadayon, T. Aaron Gulliver:
More on the Stopping and Minimum Distances of Array Codes. IEEE Trans. Commun. 59(3): 750-757 (2011)
2000 – 2009
- 2009
- [j3]Pejman Goudarzi, Mohammad Hesam Tadayon, Mahmoud Mousavinejad:
An Optimization Theoretic Framework for Video Transmission with Minimal Total Distortion over Wireless Networks. EURASIP J. Wirel. Commun. Netw. 2009 (2009) - [j2]Morteza Esmaeili, Mohammad Hesam Tadayon:
A lattice-based systematic recursive construction of quasi-cyclic LDPC codes. IEEE Trans. Commun. 57(10): 2857-2863 (2009) - 2008
- [j1]Morteza Esmaeili, Mohammad Hesam Tadayon:
A novel approach to generating long low-density parity-check codes using two configurations. IET Commun. 2(4): 587-597 (2008)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:06 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint