Security Analysis of an EPC Class-1 Generation-2 Compliant RFID Authentication Protocol
1. Security Analysis of an EPC Class-1 Generation-2 Compliant RFID Authentication Protocol

Fereidoun Moradi; Hamid Mala; Behrouz Tork Ladani; Fariba Moradi

Volume 3, Issue 3 , Summer and Autumn 2016, , Pages 163-174

Abstract
  Design of secure authentication solutions for low-cost RFID tags is still an open and quite challenging problem, though many protocols have been published in the last decade. In 2013, ...  Read More
Demand based Resource Allocation to Balance the Utilization and User Level Fairness in Femtocell Networks
2. Demand based Resource Allocation to Balance the Utilization and User Level Fairness in Femtocell Networks

Omid Fallah-Mehrjardi; Behrouz Shahgholi Ghahfarokhi; Hamid Mala; Naser Movahhedinia

Volume 1, Issue 3 , Summer and Autumn 2014, , Pages 187-204

Abstract
  Femtocells are widely used to improve poor indoor coverage and decrease the cellular networks high cost. The fact that femtocells and macrocells share similar frequency bands leads ...  Read More
Unified Byte Permutations for the Block Cipher 3D
3. Unified Byte Permutations for the Block Cipher 3D

Hamid Mala

Volume 1, Issue 1 , Winter and Spring 2014, , Pages 15-22

Abstract
  3D is a 512-bit block cipher whose design is inspired from the Advanced Encryption Standard (AES). Like the AES, each round of 3D is composed of 4 transformations including a round-key ...  Read More