An oblivious transfer protocol based on elgamal encryption for preserving location privacy H Jannati, B Bahrak Wireless Personal Communications 97, 3113-3123, 2017 | 32 | 2017 |
Cryptanalysis and enhancement of a secure group ownership transfer protocol for RFID tags H Jannati, A Falahati International Conference on e-Democracy, 186-193, 2011 | 26 | 2011 |
Security analysis of an RFID tag search protocol H Jannati, B Bahrak Information Processing Letters 116 (10), 618-622, 2016 | 16 | 2016 |
Analysis of relay, terrorist fraud and distance fraud attacks on RFID systems H Jannati International Journal of Critical Infrastructure Protection 11, 51-61, 2015 | 16 | 2015 |
Mutual implementation of predefined and random challenges over RFID distance bounding protocol H Jannati, A Falahati 2012 9th International ISC Conference on Information Security and Cryptology …, 2012 | 15 | 2012 |
An improved authentication protocol for distributed mobile cloud computing services H Jannati, B Bahrak International Journal of Critical Infrastructure Protection 19, 59-67, 2017 | 14 | 2017 |
Application of distance bounding protocols with random challenges over RFID noisy communication systems A Falahati, H Jannati Wireless Sensor Systems (WSS 2012), IET Conference on, 1-5, 2012 | 14 | 2012 |
All-or-nothing approach to protect a distance bounding protocol against terrorist fraud attack for low-cost devices A Falahati, H Jannati Electronic Commerce Research 15 (1), 75-95, 2015 | 11 | 2015 |
Detecting relay attacks on RFID communication systems using quantum bits H Jannati, E Ardeshir-Larijani Quantum Information Processing 15, 4759-4771, 2016 | 10 | 2016 |
Mutual distance bounding protocol with its implementability over a noisy channel and its utilization for key agreement in peer-to-peer wireless networks H Jannati, A Falahati Wireless Personal Communications 77 (1), 127-149, 2014 | 10 | 2014 |
Cryptanalysis and enhancement of two low cost RFID authentication protocols H Jannati, A Falahati arXiv preprint arXiv:1202.1971, 2012 | 10 | 2012 |
An RFID Search Protocol Secured Against Relay Attack Based on Distance Bounding Approach H Jannati, A Falahati Wireless Personal Communications 85 (3), 711-726, 2015 | 9 | 2015 |
Achieving an appropriate security level for distance bounding protocols over a noisy channel H Jannati, A Falahati Telecommunication Systems 58 (3), 219-231, 2015 | 8 | 2015 |
A location privacy-preserving method for spectrum sharing in database-driven cognitive radio networks Z Salami, M Ahmadian-Attari, H Jannati, MR Aref Wireless Personal Communications 95, 3687-3711, 2017 | 6 | 2017 |
Security analysis of Niu et al. authentication and ownership management protocol N Bagheri, M Safkhani, H Jannati Cryptology ePrint Archive, 2015 | 6 | 2015 |
An Efficient Mutual Distance Bounding Protocol Over a Noisy Channel H Jannati, A Falahati International Journal of Ad Hoc and Ubiquitous Computing 20 (1), 1-16, 2015 | 6 | 2015 |
A proxy signature scheme based on coding theory H Jannati, A Falahati Global Security, Safety, and Sustainability: 6th International Conference …, 2010 | 5 | 2010 |
Distance bounding-based RFID binding proof protocol to protect inpatient medication safety against relay attack A Falahati, H Jannati International Journal of Ad Hoc and Ubiquitous Computing 22 (2), 71-83, 2016 | 4 | 2016 |
Introducing proxy zero‐knowledge proof and utilization in anonymous credential systems H Jannati, M Salmasizadeh, J Mohajeri, A Moradi Security and Communication Networks 6 (2), 161-172, 2013 | 4 | 2013 |
Analysis of false-reject probability in distance bounding protocols with mixed challenges over RFID noisy communication channel H Jannati, A Falahati Information Processing Letters 115 (6), 623-629, 2015 | 3 | 2015 |