Följ
somayeh salimi
somayeh salimi
Cygate/Telia
Verifierad e-postadress på kth.se - Startsida
Titel
Citeras av
Citeras av
År
New attacks on UMTS network access
Z Ahmadian, S Salimi, A Salahi
2009 Wireless Telecommunications Symposium, 1-6, 2009
452009
Private identification, authentication and key agreement protocol with security mode setup
F Farhat, S Salimi, A Salahi
Cryptology ePrint Archive, 2011
282011
Cognitive interference channel with two confidential messages
HG Bafghi, S Salimi, B Seyfe, MR Aref
2010 International Symposium On Information Theory & Its Applications, 952-956, 2010
192010
An extended authentication and key agreement protocol of UMTS
F Farhat, S Salimi, A Salahi
International Conference on Information Security Practice and Experience …, 2009
192009
Anonymous roaming in universal mobile telecommunication system mobile networks
M Fatemi, S Salimi, A Salahi
IET information security 4 (2), 93-103, 2010
182010
Key agreement over multiple access channel
S Salimi, M Salmasizadeh, MR Aref, JD Golic
IEEE Transactions on Information Forensics and Security 6 (3), 775-790, 2011
152011
Security enhancements against UMTS–GSM interworking attacks
Z Ahmadian, S Salimi, A Salahi
Computer Networks 54 (13), 2256-2270, 2010
152010
Key agreement over a generalized multiple access channel using noiseless and noisy feedback
S Salimi, M Skoglund, JD Golic, M Salmasizadeh, MR Aref
IEEE Journal on Selected Areas in Communications 31 (9), 1765-1778, 2013
142013
Rate regions of secret key sharing in a new source model
S Salimi, M Salmasizadeh, MR Aref
IET communications 5 (4), 443-455, 2011
142011
The CEO problem with secrecy constraints
MS F Naghibi, S Salimi
Information Forensics and Security, IEEE Transactions on 10 (6), 1234-1249, 2015
13*2015
The CEO problem with secrecy constraints
F Naghibi, S Salimi, M Skoglund
IEEE Transactions on Information Forensics and Security 10 (6), 1234-1249, 2015
132015
Finite-SNR regime analysis of the Gaussian wiretap multiple-access channel
P Babaheidarian, S Salimi, P Papadimitratos
2015 53rd Annual Allerton Conference on Communication, Control, and …, 2015
112015
Secure partial repair in wireless caching networks with broadcast channels
M Gerami, M Xiao, S Salimi, M Skoglund
2015 IEEE Conference on Communications and Network Security (CNS), 353-360, 2015
102015
Secure partial repair in wireless caching networks with broadcast channels
M Gerami, M Xiao, S Salimi, M Skoglund
2015 IEEE Conference on Communications and Network Security (CNS), 353-360, 2015
102015
Key agreement over multiple access channel using feedback channel
S Salimi, M Salmasizadeh, MR Aref
2011 IEEE International Symposium on Information Theory Proceedings, 1970-1974, 2011
82011
Sequential detection of deception attacks in networked control systems with watermarking
S Salimi, S Dey, A Ahlén
2019 18th European Control Conference (ECC), 883-890, 2019
72019
Compute-and-forward can buy secrecy cheap
P Babaheidarian, S Salimi
2015 IEEE International Symposium on Information Theory (ISIT), 2475-2479, 2015
72015
Secret key agreement using correlated sources over the generalized multiple access channel
S Salimi, M Skoglund
2012 IEEE Information Theory Workshop, 467-471, 2012
72012
Secret key sharing in a new source model: Rate regions
S Salimi, M Salmasizadeh, MR Aref
2010 Australian Communications Theory Workshop (AusCTW), 117-122, 2010
72010
Simultaneously generating multiple keys in a four-terminal network
P Babaheidarian, S Salimi, MR Aref
IET Information Security 6 (3), 190-201, 2012
62012
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20