|
Search the dblp DataBase
Mohammad Hossain Heydari:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Xunhua Wang, Mohammad Hossain Heydari, Hua Lin
An Intrusion-Tolerant Password Authentication System. [Citation Graph (0, 0)][DBLP] ACSAC, 2003, pp:110-118 [Conf]
- Mohamed Eltoweissy, Mohammad Hossain Heydari, Linda Morales, Ivan Hal Sudborough
Towards Trusted Online Dissemination of Consumer Information. [Citation Graph (0, 0)][DBLP] HICSS, 2004, pp:- [Conf]
- Mohammad Hossain Heydari, Linda Morales, Ivan Hal Sudborough
Efficient Algorithms for Batch Re-Keying Operations in Secure Multicast. [Citation Graph (0, 0)][DBLP] HICSS, 2006, pp:- [Conf]
- Mason McDaniel, Mohammad Hossain Heydari
Content Based File Type Detection Algorithms. [Citation Graph (0, 0)][DBLP] HICSS, 2003, pp:332- [Conf]
- Linda Morales, Ivan Hal Sudborough, Mohamed Eltoweissy, Mohammad Hossain Heydari
Combinatorial Optimization of Multicast Key Management. [Citation Graph (0, 0)][DBLP] HICSS, 2003, pp:332- [Conf]
- Mohammad Hossain Heydari, Linda Morales, C. O. Shields Jr., Ivan Hal Sudborough
Computing Cross Associations for Attack Graphs and Other Applications. [Citation Graph (0, 0)][DBLP] HICSS, 2007, pp:270- [Conf]
- Mohammad Hossain Heydari, Ioannis G. Tollis, Chunliang Xia
Improved Techniques for MCM Layer Assignment. [Citation Graph (0, 0)][DBLP] ICCD, 1994, pp:604-607 [Conf]
- Mohammad Hossain Heydari, Ivan Hal Sudborough
On Sorting by Prefix Reversals and the Diameter of Pancake Networks. [Citation Graph (0, 0)][DBLP] Heinz Nixdorf Symposium, 1992, pp:218-227 [Conf]
- Mohammad Hossain Heydari, Ivan Hal Sudborough
On the Diameter of the Pancake Network. [Citation Graph (0, 0)][DBLP] J. Algorithms, 1997, v:25, n:1, pp:67-94 [Journal]
- Mohamed Eltoweissy, Mohammad Hossain Heydari, Linda Morales, Ivan Hal Sudborough
Combinatorial Optimization of Group Key Management. [Citation Graph (0, 0)][DBLP] J. Network Syst. Manage., 2004, v:12, n:1, pp:- [Journal]
- Mohammad Hossain Heydari, Ioannis G. Tollis, Chunliang Xia
Algorithms and bounds for layer assignment of MCM routing. [Citation Graph (0, 0)][DBLP] IEEE Trans. VLSI Syst., 1994, v:2, n:2, pp:265-270 [Journal]
Stack and Queue Layouts for Toruses and Extended Hypercubes. [Citation Graph (, )][DBLP]
Search in 0.016secs, Finished in 0.016secs
|