Volume 7 (2020)
Volume 6 (2019)
Volume 5 (2018)
Volume 4 (2017)
Volume 3 (2016)
Volume 2 (2015)
Volume 1 (2014)
Author = Mala, Hamid
Number of Articles: 3
1. Security Analysis of an EPC Class-1 Generation-2 Compliant RFID Authentication Protocol
Volume 3, Issue 3 , Summer and Autumn 2016, , Pages 163-174
Abstract
Design of secure authentication solutions for low-cost RFID tags is still an open and quite challenging problem, though many protocols have been published in the last decade. In 2013, ... Read More2. Demand based Resource Allocation to Balance the Utilization and User Level Fairness in Femtocell Networks
Volume 1, Issue 3 , Summer and Autumn 2014, , Pages 187-204
Abstract
Femtocells are widely used to improve poor indoor coverage and decrease the cellular networks high cost. The fact that femtocells and macrocells share similar frequency bands leads ... Read More3. Unified Byte Permutations for the Block Cipher 3D
Volume 1, Issue 1 , Winter and Spring 2014, , Pages 15-22