The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Mohammad Peyravian: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Don Coppersmith, Rosario Gennaro, Shai Halevi, Charanjit S. Jutla, Stephen M. Matyas, Mohammad Peyravian, David Safford, Nevenko Zunic
    IBM Comments. [Citation Graph (0, 0)][DBLP]
    AES Candidate Conference, 2000, pp:333-336 [Conf]
  2. Mohammad Peyravian, Chin-Tau A. Lea
    An Algorithmic Method for Protocol Conversion. [Citation Graph (0, 0)][DBLP]
    ICDCS, 1992, pp:328-335 [Conf]
  3. Mohammad Peyravian, Ajay D. Kshemkalyani
    Connection Preemption: Issues, Algorithms, and a Simulation Study. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1997, pp:143-151 [Conf]
  4. Mohammad Peyravian
    An Improved Selective Repeat Protocol and Its Performance in High-Speed Environments. [Citation Graph (0, 0)][DBLP]
    Computer Networks and ISDN Systems, 1994, v:26, n:12, pp:1595-1605 [Journal]
  5. Mohammad Peyravian, Jean Calvignac
    Fundamental architectural considerations for network processors. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2003, v:41, n:5, pp:587-600 [Journal]
  6. Mohammad Peyravian, Ajay D. Kshemkalyani
    Decentralized Network Connection Preemption Algorithms. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 1998, v:30, n:11, pp:1029-1043 [Journal]
  7. Mohammad Peyravian, Chin-Tau A. Lea
    Deriving Deadlock and Unspecified Reception Free Protocol Converters from Message Mapping Sets. [Citation Graph (0, 0)][DBLP]
    Computer Networks and ISDN Systems, 1996, v:28, n:13, pp:1831-1844 [Journal]
  8. Mohammad Peyravian, Clark Jeffries
    Secure remote user access over insecure networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:5, pp:660-667 [Journal]
  9. Mohammad Peyravian, Ajay D. Kshemkalyani
    Network path caching: : Issues, algorithms and a simulation study. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1997, v:20, n:8, pp:605-614 [Journal]
  10. Mohammad Peyravian, Chin-Tau A. Lea
    Construction of protocol converters using formal methods. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1993, v:16, n:4, pp:215-228 [Journal]
  11. Mohammad Peyravian, Stephen M. Matyas, Nevenko Zunic
    Decentralized group key management for secure multicast communications. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1999, v:22, n:13, pp:1183-1187 [Journal]
  12. Mohammad Peyravian, Raif O. Onvural
    Enabling ATM networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1996, v:19, n:13, pp:1027-1028 [Journal]
  13. Rosario Gennaro, Paul A. Karger, Stephen M. Matyas, Mohammad Peyravian, Allen Roginsky, David Safford, Michael Willett, Nevenko Zunic
    Two-phase cryptographic key recovery system. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1997, v:16, n:6, pp:481-506 [Journal]
  14. Mike Matyas, Mohammad Peyravian, Allen Roginsky, Nevenko Zunic
    Reversible data mixing procedure for efficient public-key encryption. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1998, v:17, n:3, pp:265-272 [Journal]
  15. Mohammad Peyravian, Don Coppersmith
    A structured symmetric-key block cipher. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1999, v:18, n:2, pp:134-147 [Journal]
  16. Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic
    Generation of RSA Keys That Are Guaranteed to be Unique for Each User. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:3, pp:282-288 [Journal]
  17. Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic
    Multiparty Biometric-Based Authentication. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:4, pp:369-374 [Journal]
  18. Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic
    Ticket and Challenge-Based Protocols for Timestamping. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:6, pp:551-558 [Journal]
  19. Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic
    Alternative Method for Unique RSA Primes Generation. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2001, v:20, n:2, pp:173-179 [Journal]
  20. Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic
    Generating user-based cryptographic keys and random numbers. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1999, v:18, n:7, pp:619-626 [Journal]
  21. Mohammad Peyravian, Allen Roginsky, Ajay D. Kshemkalyani
    On probabilities of hash value matches. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1998, v:17, n:2, pp:171-176 [Journal]
  22. Mohammad Peyravian, Allen Roginsky, Nevenko Zunic
    Methods for preventing unauthorized software distribution. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:4, pp:316-321 [Journal]
  23. Mohammad Peyravian, Allen Roginsky, Nevenko Zunic
    Non-PKI methods for public key distribution. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:2, pp:97-103 [Journal]
  24. Mohammad Peyravian, Allen Roginsky, Nevenko Zunic
    Hash-based encryption system. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1999, v:18, n:4, pp:345-350 [Journal]
  25. Mohammad Peyravian, Nevenko Zunic
    Methods for Protecting Password Transmission. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:5, pp:466-469 [Journal]
  26. James R. Allen Jr., Brian M. Bass, Claude Basso, Richard H. Boivie, Jean Calvignac, Gordon T. Davis, Laurent Freléchoux, Marco Heddes, Andreas Herkersdorf, Andreas Kind, Joe F. Logan, Mohammad Peyravian, Mark A. Rinaldi, Ravi K. Sabhikhi, Michael S. Siegel, Marcel Waldvogel
    IBM PowerNP network processor: Hardware, software, and applications. [Citation Graph (0, 0)][DBLP]
    IBM Journal of Research and Development, 2003, v:47, n:2-3, pp:177-194 [Journal]
  27. Mohammad Peyravian, Rachel A. Bodner, Chee-Seng Chow, Marc A. Kaplan
    Efficient Transport and Distribution of Network Control Information in NBBS. [Citation Graph (0, 0)][DBLP]
    IBM Systems Journal, 1995, v:34, n:4, pp:640-658 [Journal]
  28. James P. Gray, Ajay D. Kshemkalyani, Stephen M. Matyas, Mohammad Peyravian, Gene Tsudik
    ATM cell encryption and key update synchronization. [Citation Graph (0, 0)][DBLP]
    Telecommunication Systems, 1997, v:7, n:4, pp:391-408 [Journal]

  29. Algorithm for efficient generation of link-state updates in ATM networks. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002