Follow
Mohammad Ehdaie
Title
Cited by
Cited by
Year
A novel secret sharing scheme from audio perspective
M Ehdaie, T Eghlidos, MR Aref
2008 International Symposium on Telecommunications, 13-18, 2008
282008
Mitigating node capture attack in random key distribution schemes through key deletion
M Ehdaie, N Alexiou, M Ahmadian, MR Aref, P Papadimitratos
Journal of Communication Engineering 6 (2), 99-109, 2017
102017
2D hash chain robust random key distribution scheme
M Ehdaie, N Alexiou, M Ahmadian, MR Aref, P Papadimitratos
Information Processing Letters 116 (5), 367-372, 2016
102016
Random key pre-distribution techniques against sybil attacks
M Ehdaie, N Alexiou, P Papadimitratos
Journal of Communication Engineering 5 (1), 1-13, 2016
62016
Key splitting: making random key distribution schemes resistant against node capture
M Ehdaie, N Alexiou, MA Attari, MR Aref, P Papadimitratos
Security and Communication Networks 8 (3), 431-445, 2015
42015
Key Splitting for Random Key Distribution Schemes
M Ehdaie, N Alexiou, M Ahmadian, MR Aref, P Papadimitratos
NPSec 2012, 2012
32012
A new method for Visual Secret Sharing
H Firouzi, M Ehdaie, MR Aref
2008 International Symposium on Telecommunications, 619-623, 2008
22008
Secure Broadcasting and Unicasting in Wireless Sensor Networks (In Persian)
ME Hassan Nassiraie, Jamshid Bagherzadeh
ISCISC (International Iranian Society of Cryptology Conference on …, 2011
2011
Some new issues on secret sharing schemes
M Ehdaie, T Eghlidos, MR Aref
2008 International Conference on Telecommunications, 1-5, 2008
2008
A New Threshold Audio Secret Sharing Scheme
MRA Mohammad Ehdaie, Taraneh Eghlidos
Western European Workshop on Research in Cryptology, 2007
2007
A New Threshold Audio Secret Sharing Scheme1
M Ehdaie, T Eghlidos, MR Aref
Western European Workshop on Research in Cryptology, 120, 0
The system can't perform the operation now. Try again later.
Articles 1–11