The SCEAS System
Navigation Menu

Search the dblp DataBase


Ali Miri: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Muhammad J. Bohio, Ali Miri
    An Authenticated Broadcasting Scheme for Wireless Ad Hoc Network. [Citation Graph (0, 0)][DBLP]
    CNSR, 2004, pp:69-74 [Conf]
  2. Ilker Onat, Ali Miri
    A Real-Time Node-Based Traffic Anomaly Detection Algorithm for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICW/ICHSN/ICMCS/SENET, 2005, pp:422-427 [Conf]
  3. Deholo Nali, Carlisle M. Adams, Ali Miri
    Using Mediated Identity-Based Cryptography to Support Role-Based Access Control. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:245-256 [Conf]
  4. Deholo Nali, Carlisle M. Adams, Ali Miri
    Time-Based Release of Confidential Information in Hierarchical Settings. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:29-43 [Conf]
  5. Muhammad J. Bohio, Ali Miri
    Self-Healing in Group Key Distribution Using Subset Difference Method. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:405-408 [Conf]
  6. Deholo Nali, Ali Miri, Carlisle M. Adams
    Efficient Revocation of Dynamic Security Privileges in Hierarchically Structured Communities. [Citation Graph (0, 0)][DBLP]
    PST, 2004, pp:219-223 [Conf]
  7. Muhammad J. Bohio, Ali Miri
    Efficient identity-based security schemes for ad hoc network routing protocols. [Citation Graph (0, 0)][DBLP]
    Ad Hoc Networks, 2004, v:2, n:3, pp:309-317 [Journal]
  8. Ali Miri, Monica Nevins, Terasan Niyomsataya
    Applications of representation theory to wireless communications. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2006, v:41, n:3, pp:307-318 [Journal]
  9. Deholo Nali, Carlisle M. Adams, Ali Miri
    Hierarchical time-based information release. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2006, v:5, n:2, pp:92-104 [Journal]
  10. Ahmed Abdel-Hafez, Ali Miri, Luis Orozco-Barbosa
    Scalable and fault-tolerant key agreement protocol for dynamic groups. [Citation Graph (0, 0)][DBLP]
    Int. Journal of Network Management, 2006, v:16, n:3, pp:185-202 [Journal]
  11. Ali Abbas, Abdulmotaleb El-Saddik, Ali Miri
    A Comprehensive Approach to Designing Internet Security Taxonomy. [Citation Graph (0, 0)][DBLP]
    CCECE, 2006, pp:1316-1319 [Conf]
  12. Grace Elias, Ali Miri, Tet Hin Yeap
    On efficient implementation of FPGA-based hyperelliptic curve cryptosystems. [Citation Graph (0, 0)][DBLP]
    Computers & Electrical Engineering, 2007, v:33, n:5-6, pp:349-366 [Journal]

  13. Privacy preserving ID3 using Gini Index over horizontally partitioned data. [Citation Graph (, )][DBLP]

  14. Efficient Topology Discovery for Multihop Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  15. Combining Hidden Markov Models for Improved Anomaly Detection. [Citation Graph (, )][DBLP]

  16. Anonymous topology discovery for multihop wireless sensor networks. [Citation Graph (, )][DBLP]

  17. New Composite Operations and Precomputation Scheme for Elliptic Curve Cryptosystems over Prime Fields. [Citation Graph (, )][DBLP]

  18. Privacy Preserving k-Means Clustering in Multi-Party Environment. [Citation Graph (, )][DBLP]

  19. Privacy preserving database access through dynamic privacy filters with stable data randomization. [Citation Graph (, )][DBLP]

  20. Combining Attribute-Based and Access Systems. [Citation Graph (, )][DBLP]

  21. Privacy-Preserving Bayesian Network for Horizontally Partitioned Data. [Citation Graph (, )][DBLP]

  22. DiSEL: a distance based slot selection protocol for framed slotted ALOHA RFID systems. [Citation Graph (, )][DBLP]

  23. Location privacy and anonymity preserving routing for wireless sensor networks. [Citation Graph (, )][DBLP]

Search in 0.004secs, Finished in 0.005secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002