Follow
somayeh salimi
somayeh salimi
Cygate/Telia
Verified email at kth.se - Homepage
Title
Cited by
Cited by
Year
New attacks on UMTS network access
Z Ahmadian, S Salimi, A Salahi
2009 Wireless Telecommunications Symposium, 1-6, 2009
482009
Private identification, authentication and key agreement protocol with security mode setup
F Farhat, S Salimi, A Salahi
Cryptology ePrint Archive, 2011
292011
Cognitive interference channel with two confidential messages
HG Bafghi, S Salimi, B Seyfe, MR Aref
2010 International Symposium On Information Theory & Its Applications, 952-956, 2010
202010
An extended authentication and key agreement protocol of UMTS
F Farhat, S Salimi, A Salahi
Information Security Practice and Experience: 5th International Conference …, 2009
192009
Anonymous roaming in universal mobile telecommunication system mobile networks
M Fatemi, S Salimi, A Salahi
IET information security 4 (2), 93-103, 2010
182010
The CEO problem with secrecy constraints
MS F Naghibi, S Salimi
Information Forensics and Security, IEEE Transactions on 10 (6), 1234-1249, 2015
17*2015
The CEO problem with secrecy constraints
F Naghibi, S Salimi, M Skoglund
IEEE Transactions on Information Forensics and Security 10 (6), 1234-1249, 2015
172015
Key agreement over multiple access channel
S Salimi, M Salmasizadeh, MR Aref, JD Golic
IEEE Transactions on Information Forensics and Security 6 (3), 775-790, 2011
152011
Key agreement over a generalized multiple access channel using noiseless and noisy feedback
S Salimi, M Skoglund, JD Golic, M Salmasizadeh, MR Aref
IEEE Journal on Selected Areas in Communications 31 (9), 1765-1778, 2013
142013
Rate regions of secret key sharing in a new source model
S Salimi, M Salmasizadeh, MR Aref
IET communications 5 (4), 443-455, 2011
142011
Security enhancements against UMTS–GSM interworking attacks
Z Ahmadian, S Salimi, A Salahi
Computer Networks 54 (13), 2256-2270, 2010
142010
Finite-SNR regime analysis of the Gaussian wiretap multiple-access channel
P Babaheidarian, S Salimi, P Papadimitratos
2015 53rd Annual Allerton Conference on Communication, Control, and …, 2015
112015
Secure partial repair in wireless caching networks with broadcast channels
M Gerami, M Xiao, S Salimi, M Skoglund
2015 IEEE Conference on Communications and Network Security (CNS), 353-360, 2015
102015
Secure partial repair in wireless caching networks with broadcast channels
M Gerami, M Xiao, S Salimi, M Skoglund
2015 IEEE Conference on Communications and Network Security (CNS), 353-360, 2015
102015
Sequential detection of deception attacks in networked control systems with watermarking
S Salimi, S Dey, A Ahlén
2019 18th European Control Conference (ECC), 883-890, 2019
92019
Key agreement over multiple access channel using feedback channel
S Salimi, M Salmasizadeh, MR Aref
2011 IEEE International Symposium on Information Theory Proceedings, 1970-1974, 2011
82011
Compute-and-forward can buy secrecy cheap
P Babaheidarian, S Salimi
2015 IEEE International Symposium on Information Theory (ISIT), 2475-2479, 2015
72015
Secret key agreement using correlated sources over the generalized multiple access channel
S Salimi, M Skoglund
2012 IEEE Information Theory Workshop, 467-471, 2012
72012
Secret key sharing in a new source model: Rate regions
S Salimi, M Salmasizadeh, MR Aref
2010 Australian Communications Theory Workshop (AusCTW), 117-122, 2010
72010
Security in the gaussian interference channel: Weak and moderately weak interference regimes
P Babaheidarian, S Salimi, P Papadimitratos
2016 IEEE International Symposium on Information Theory (ISIT), 2434-2438, 2016
62016
The system can't perform the operation now. Try again later.
Articles 1–20