|
Search the dblp DataBase
Ali Miri:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Muhammad J. Bohio, Ali Miri
An Authenticated Broadcasting Scheme for Wireless Ad Hoc Network. [Citation Graph (0, 0)][DBLP] CNSR, 2004, pp:69-74 [Conf]
- Ilker Onat, Ali Miri
A Real-Time Node-Based Traffic Anomaly Detection Algorithm for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] ICW/ICHSN/ICMCS/SENET, 2005, pp:422-427 [Conf]
- Deholo Nali, Carlisle M. Adams, Ali Miri
Using Mediated Identity-Based Cryptography to Support Role-Based Access Control. [Citation Graph (0, 0)][DBLP] ISC, 2004, pp:245-256 [Conf]
- Deholo Nali, Carlisle M. Adams, Ali Miri
Time-Based Release of Confidential Information in Hierarchical Settings. [Citation Graph (0, 0)][DBLP] ISC, 2005, pp:29-43 [Conf]
- Muhammad J. Bohio, Ali Miri
Self-Healing in Group Key Distribution Using Subset Difference Method. [Citation Graph (0, 0)][DBLP] NCA, 2004, pp:405-408 [Conf]
- Deholo Nali, Ali Miri, Carlisle M. Adams
Efficient Revocation of Dynamic Security Privileges in Hierarchically Structured Communities. [Citation Graph (0, 0)][DBLP] PST, 2004, pp:219-223 [Conf]
- Muhammad J. Bohio, Ali Miri
Efficient identity-based security schemes for ad hoc network routing protocols. [Citation Graph (0, 0)][DBLP] Ad Hoc Networks, 2004, v:2, n:3, pp:309-317 [Journal]
- Ali Miri, Monica Nevins, Terasan Niyomsataya
Applications of representation theory to wireless communications. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 2006, v:41, n:3, pp:307-318 [Journal]
- Deholo Nali, Carlisle M. Adams, Ali Miri
Hierarchical time-based information release. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2006, v:5, n:2, pp:92-104 [Journal]
- Ahmed Abdel-Hafez, Ali Miri, Luis Orozco-Barbosa
Scalable and fault-tolerant key agreement protocol for dynamic groups. [Citation Graph (0, 0)][DBLP] Int. Journal of Network Management, 2006, v:16, n:3, pp:185-202 [Journal]
- Ali Abbas, Abdulmotaleb El-Saddik, Ali Miri
A Comprehensive Approach to Designing Internet Security Taxonomy. [Citation Graph (0, 0)][DBLP] CCECE, 2006, pp:1316-1319 [Conf]
- Grace Elias, Ali Miri, Tet Hin Yeap
On efficient implementation of FPGA-based hyperelliptic curve cryptosystems. [Citation Graph (0, 0)][DBLP] Computers & Electrical Engineering, 2007, v:33, n:5-6, pp:349-366 [Journal]
Privacy preserving ID3 using Gini Index over horizontally partitioned data. [Citation Graph (, )][DBLP]
Efficient Topology Discovery for Multihop Wireless Sensor Networks. [Citation Graph (, )][DBLP]
Combining Hidden Markov Models for Improved Anomaly Detection. [Citation Graph (, )][DBLP]
Anonymous topology discovery for multihop wireless sensor networks. [Citation Graph (, )][DBLP]
New Composite Operations and Precomputation Scheme for Elliptic Curve Cryptosystems over Prime Fields. [Citation Graph (, )][DBLP]
Privacy Preserving k-Means Clustering in Multi-Party Environment. [Citation Graph (, )][DBLP]
Privacy preserving database access through dynamic privacy filters with stable data randomization. [Citation Graph (, )][DBLP]
Combining Attribute-Based and Access Systems. [Citation Graph (, )][DBLP]
Privacy-Preserving Bayesian Network for Horizontally Partitioned Data. [Citation Graph (, )][DBLP]
DiSEL: a distance based slot selection protocol for framed slotted ALOHA RFID systems. [Citation Graph (, )][DBLP]
Location privacy and anonymity preserving routing for wireless sensor networks. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.003secs
|