Hoda Jannati
Hoda Jannati
Postdoctoral Researcher at IPM
Verified email at ipm.ir
Cited by
Cited by
Cryptanalysis and enhancement of a secure group ownership transfer protocol for RFID tags
H Jannati, A Falahati
Global Security, Safety and Sustainability & e-Democracy, 186-193, 2011
An oblivious transfer protocol based on elgamal encryption for preserving location privacy
H Jannati, B Bahrak
Wireless Personal Communications 97 (2), 3113-3123, 2017
Analysis of relay, terrorist fraud and distance fraud attacks on RFID systems
H Jannati
International Journal of Critical Infrastructure Protection 11, 51-61, 2015
Security analysis of an RFID tag search protocol
H Jannati, B Bahrak
Information Processing Letters 116 (10), 618-622, 2016
Mutual implementation of predefined and random challenges over RFID distance bounding protocol
H Jannati, A Falahati
2012 9th International ISC Conference on Information Security and Cryptology …, 2012
Application of distance bounding protocols with random challenges over RFID noisy communication systems
A Falahati, H Jannati
Wireless Sensor Systems (WSS 2012), IET Conference on, 1-5, 2012
An improved authentication protocol for distributed mobile cloud computing services
H Jannati, B Bahrak
International Journal of Critical Infrastructure Protection 19, 59-67, 2017
Detecting relay attacks on RFID communication systems using quantum bits
H Jannati, E Ardeshir-Larijani
Quantum Information Processing 15 (11), 4759-4771, 2016
All-or-nothing approach to protect a distance bounding protocol against terrorist fraud attack for low-cost devices
A Falahati, H Jannati
Electronic Commerce Research 15 (1), 75-95, 2015
Mutual distance bounding protocol with its implementability over a noisy channel and its utilization for key agreement in peer-to-peer wireless networks
H Jannati, A Falahati
Wireless Personal Communications 77 (1), 127-149, 2014
Cryptanalysis and enhancement of two low cost RFID authentication protocols
H Jannati, A Falahati
arXiv preprint arXiv:1202.1971, 2012
An RFID Search Protocol Secured Against Relay Attack Based on Distance Bounding Approach
H Jannati, A Falahati
Wireless Personal Communications 85 (3), 711-726, 2015
Achieving an appropriate security level for distance bounding protocols over a noisy channel
H Jannati, A Falahati
Telecommunication Systems 58 (3), 219-231, 2015
Security Analysis of Niu et al. Authentication and Ownership Management Protocol.
N Bagheri, M Safkhani, H Jannati
IACR Cryptol. ePrint Arch. 2015, 615, 2015
An Efficient Mutual Distance Bounding Protocol Over a Noisy Channel
H Jannati, A Falahati
International Journal of Ad Hoc and Ubiquitous Computing 20 (1), 1-16, 2015
Introducing proxy zero‐knowledge proof and utilization in anonymous credential systems
H Jannati, M Salmasizadeh, J Mohajeri, A Moradi
Security and Communication Networks 6 (2), 161-172, 2013
A location privacy-preserving method for spectrum sharing in database-driven cognitive radio networks
Z Salami, M Ahmadian-Attari, H Jannati, MR Aref
Wireless Personal Communications 95 (4), 3687-3711, 2017
Distance bounding-based RFID binding proof protocol to protect inpatient medication safety against relay attack
A Falahati, H Jannati
International Journal of Ad Hoc and Ubiquitous Computing 22 (2), 71-83, 2016
Analysis of false-reject probability in distance bounding protocols with mixed challenges over RFID noisy communication channel
H Jannati, A Falahati
Information Processing Letters 115 (6), 623-629, 2015
A proxy signature scheme based on coding theory
H Jannati, A Falahati
International Conference on Global Security, Safety, and Sustainability, 282-290, 2010
The system can't perform the operation now. Try again later.
Articles 1–20