Author = Mala, Hamid
Number of Articles: 3
1. Security Analysis of an EPC Class-1 Generation-2 Compliant RFID Authentication Protocol

Volume 3, Issue 3, Summer 2016, Pages 163-174

Fereidoun Moradi; Hamid Mala; Behrouz Tork Ladani; Fariba Moradi


2. Demand based Resource Allocation to Balance the Utilization and User Level Fairness in Femtocell Networks

Volume 1, Issue 3, Summer 2014, Pages 187-204

Omid Fallah-Mehrjardi; Behrouz Shahgholi Ghahfarokhi; Hamid Mala; Naser Movahhedinia


3. Unified Byte Permutations for the Block Cipher 3D

Volume 1, Issue 1, Winter 2014, Pages 15-22

Hamid Mala