Follow
Bahareh Akhbari
Bahareh Akhbari
Verified email at Kntu.ac.ir
Title
Cited by
Cited by
Year
Compress-and-forward strategy for the relay channel with non-causal state information
B Akhbari, M Mirmohseni, MR Aref
2009 IEEE International Symposium on Information Theory, 1169-1173, 2009
372009
Compress-and-forward strategy for relay channel with causal and non-causal channel state information
B Akhbari, M Mirmohseni, MR Aref
IET communications 4 (10), 1174-1186, 2010
292010
Watermarking of still images using multiresolution singular value decomposition
B Akhbari, S Ghaemmaghami
2005 International Symposium on Intelligent Signal Processing and …, 2005
262005
Watermarking of still images in wavelet domain based on entropy masking model
B Akhbari, S Ghaemmaghami
TENCON 2005-2005 IEEE Region 10 Conference, 1-6, 2005
232005
On the capacity of interference channel with causal and noncausal generalized feedback at the cognitive transmitter
M Mirmohseni, B Akhbari, MR Aref
IEEE Transactions on Information Theory 58 (5), 2813-2837, 2012
222012
Compress-and-forward strategy for the relay channel with causal state information
M Mirmohseni, B Akhbari, MR Aref
2009 IEEE Information Theory Workshop, 426-430, 2009
192009
Classical-Quantum Multiple Access Wiretap Channel
H Aghaee, B Akhbari
2019 16th International ISC (Iranian Society of Cryptology) Conference on …, 2019
152019
Attacks and improvements on two new-found RFID authentication protocols
B Abdolmaleki, K Baghery, B Akhbari, MR Aref
7'th International Symposium on Telecommunications (IST'2014), 895-900, 2014
152014
LPM2DA: a lattice-based privacy-preserving multi-functional and multi-dimensional data aggregation scheme for smart grid
S Darzi, B Akhbari, H Khodaiemehr
Cluster Computing 25 (1), 263-278, 2022
142022
Imperfect and perfect secrecy in compound multiple access channel with confidential message
H Zivari-Fard, B Akhbari, M Ahmadian-Attari, MR Aref
IEEE Transactions on Information Forensics and Security 11 (6), 1239-1251, 2016
112016
Privacy analysis and improvements of two recent RFID authentication protocols
K Baghery, B Abdolmaleki, B Akhbari, MR Aref
2014 11th International ISC Conference on Information Security and …, 2014
102014
Cooperative relay-broadcast channels with causal channel state information
R Khosravi-Farsani, B Akhbari, M Mirmohseni, MR Aref
2009 IEEE International Symposium on Information Theory, 1174-1178, 2009
102009
Capacity bounds for the three-user cognitive z-interference channel
M Mirmohseni, B Akhbari, MR Aref
2011 12th Canadian Workshop on Information Theory, 34-37, 2011
92011
Multiple access channel with common message and secrecy constraint
H Zivari-Fard, B Akhbari, M Ahmadian-Attari, MR Aref
IET Communications 10 (1), 98-110, 2016
82016
Cryptanalysis of two EPC-based RFID security schemes
B Abdolmaleki, K Baghery, B Akhbari, MR Aref
2015 12th International Iranian Society of Cryptology Conference on …, 2015
82015
Enhancing privacy of recent authentication schemes for low-cost RFID systems
K Baghery, B Abdolmaleki, B Akhbari, MR Aref
ISeCure-The ISC International Journal of Information Security 7 (2), 135-149, 2015
82015
Compound multiple access channel with confidential messages
H Zivari-Fard, B Akhbari, M Ahmadian-Attari, MR Aref
2014 IEEE International Conference on Communications (ICC), 1922-1927, 2014
82014
Three-user cognitive interference channel: Capacity region with strong interference
M Mirmohseni, B Akhbari, MR Aref
IET communications 6 (13), 2099-2107, 2012
82012
Achievable rate regions for Dirty Tape Channels and “joint writing on Dirty paper and Dirty Tape”
R Khosravi-Farsani, B Akhbari, MR Aref
2010 IEEE Information Theory Workshop, 1-5, 2010
82010
Secure resource allocation in device-to-device communications underlaying cellular networks
H Ghavami, B Akhbari
China Communications 19 (8), 149-167, 2022
72022
The system can't perform the operation now. Try again later.
Articles 1–20