A lightweight authentication mechanism for M2M communications in industrial IoT environment A Esfahani, G Mantas, R Matischek, FB Saghezchi, J Rodriguez, A Bicaku, ... IEEE Internet of Things Journal 6 (1), 288-296, 2017 | 317 | 2017 |
An efficient web authentication mechanism preventing man-in-the-middle attacks in industry 4.0 supply chain A Esfahani, G Mantas, J Ribeiro, J Bastos, S Mumtaz, MA Violas, ... IEEE Access 7, 58981-58989, 2019 | 36 | 2019 |
An efficient homomorphic MAC-based scheme against data and tag pollution attacks in network coding-enabled wireless networks A Esfahani, G Mantas, J Rodriguez, JC Neves International Journal of Information Security, 2016 | 35 | 2016 |
Dual-homomorphic message authentication code scheme for network coding-enabled wireless sensor networks A Esfahani, D Yang, G Mantas, A Nascimento, J Rodriguez International Journal of Distributed Sensor Networks 11 (7), 510251, 2015 | 33 | 2015 |
An efficient null space-based homomorphic MAC scheme against tag pollution attacks in RLNC A Esfahani, G Mantas, J Rodriguez IEEE Communications Letters 20 (5), 918-921, 2016 | 31 | 2016 |
A novel intrusion detection and prevention scheme for network coding-enabled mobile small cells R Parsamehr, A Esfahani, G Mantas, A Radwan, S Mumtaz, J Rodriguez, ... IEEE Transactions on Computational Social Systems 6 (6), 1467-1477, 2019 | 28 | 2019 |
An efficient MAC-based scheme against pollution attacks in XOR network coding-enabled WBANs for remote patient monitoring systems A Esfahani, G Mantas, H Silva, J Rodriguez, JC Neves EURASIP Journal on Wireless Communications and Networking 2016, 1-10, 2016 | 14 | 2016 |
Widest k-shortest paths q-routing: A new qos routing algorithm in telecommunication networks A Esfahani, M Analoui 2008 International Conference on Computer Science and Software Engineering 4 …, 2008 | 14 | 2008 |
Towards secure network coding-enabled wireless sensor networks in cyber-physical systems A Esfahani, G Mantas, D Yang, A Nascimento, J Rodriguez, J Neves Cyber-Physical Systems: From Theory to Practice, 395-414, 2015 | 13 | 2015 |
A Null Space-based MAC Scheme against Pollution Attacks to Random Linear Network Coding A Esfahani, G Mantas, J Rodriguez, A Nascimento, JC Neves 2015 IEEE International Conference on Communications (ICC2015), 2015 | 12 | 2015 |
Machine learning to automate network segregation for enhanced security in industry 4.0 FB Saghezchi, G Mantas, J Ribeiro, A Esfahani, H Alizadeh, J Bastos, ... Broadband Communications, Networks, and Systems: 9th International EAI …, 2019 | 11 | 2019 |
A location-aware idps scheme for network coding-enabled mobile small cells R Parsamehr, A Esfahani, G Mantas, J Rodriguez, JF Martinez-Ortega 2019 IEEE 2nd 5G World Forum (5GWF), 91-96, 2019 | 10 | 2019 |
Analysis of a homomorphic MAC-based scheme against tag pollution in RLNC-enabled wireless networks A Esfahani, G Mantas, V Monteiro, K Ramantasy, E Datsikay, J Rodriguez 2015 IEEE 20th International Workshop on Computer Aided Modelling and Design …, 2015 | 10 | 2015 |
An Improved Homomorphic Message Authentication Code Scheme for RLNC-Enabled Wireless Networks A Esfahani, D Yang, G Mantas, A Nascimento, J Rodriguez IEEE CAMAD 2014, 2014 | 9 | 2014 |
PriLok: Citizen-protecting distributed epidemic tracing P Esteves-Verissimo, J Decouchant, M Völp, A Esfahani, R Graczyk arXiv preprint arXiv:2005.04519, 2020 | 6 | 2020 |
Improve End to End Delay with Q-Routing Algorithm A Esfahani, M Analoui International Journal of Advancements in Computing Technology 1 (1), 2009 | 6 | 2009 |
Jointly Padding for Subspace Orthogonality against Tag Pollution D Yang, A Esfahani, G Mantas, J Rodriguez IEEE CAMAD 2014, 2014 | 5 | 2014 |
A Context-Based Decision-Making Trust Scheme for Malicious Detection in Connected and Autonomous Vehicles EO Eze, S Keates, K Pedram, A Esfahani, U Odih 2022 International Conference on Computing, Electronics & Communications …, 2022 | 3 | 2022 |
An efficient MAC-signature scheme for authentication in XOR network coding A Esfahani, A Nascimento, J Rodriguez, JC Neves 2014 IEEE Symposium on Computers and Communications (ISCC), 1-5, 2014 | 3 | 2014 |
Security framework for the semiconductor supply chain environment A Esfahani, G Mantas, M Barcelos, FB Saghezchi, V Sucasas, J Bastos, ... Broadband Communications, Networks, and Systems: 9th International EAI …, 2019 | 2 | 2019 |