Author = Mala, Hamid
Number of Articles: 3
1. Security Analysis of an EPC Class-1 Generation-2 Compliant RFID Authentication Protocol

Volume 3, Issue 3, Summer and Autumn 2016, Pages 163-174

Fereidoun Moradi; Hamid Mala; Behrouz Tork Ladani; Fariba Moradi

2. Demand based Resource Allocation to Balance the Utilization and User Level Fairness in Femtocell Networks

Volume 1, Issue 3, Summer and Autumn 2014, Pages 187-204

Omid Fallah-Mehrjardi; Behrouz Shahgholi Ghahfarokhi; Hamid Mala; Naser Movahhedinia

3. Unified Byte Permutations for the Block Cipher 3D

Volume 1, Issue 1, Winter and Spring 2014, Pages 15-22

Hamid Mala