2007 |
11 | EE | Mohammad Hossain Heydari,
Linda Morales,
C. O. Shields Jr.,
Ivan Hal Sudborough:
Computing Cross Associations for Attack Graphs and Other Applications.
HICSS 2007: 270 |
2006 |
10 | EE | Mohammad Hossain Heydari,
Linda Morales,
Ivan Hal Sudborough:
Efficient Algorithms for Batch Re-Keying Operations in Secure Multicast.
HICSS 2006 |
2004 |
9 | EE | Mohamed Eltoweissy,
Mohammad Hossain Heydari,
Linda Morales,
Ivan Hal Sudborough:
Towards Trusted Online Dissemination of Consumer Information.
HICSS 2004 |
8 | | Mohamed Eltoweissy,
Mohammad Hossain Heydari,
Linda Morales,
Ivan Hal Sudborough:
Combinatorial Optimization of Group Key Management.
J. Network Syst. Manage. 12(1): (2004) |
2003 |
7 | EE | Xunhua Wang,
Mohammad Hossain Heydari,
Hua Lin:
An Intrusion-Tolerant Password Authentication System.
ACSAC 2003: 110-118 |
6 | EE | Linda Morales,
Ivan Hal Sudborough,
Mohamed Eltoweissy,
Mohammad Hossain Heydari:
Combinatorial Optimization of Multicast Key Management.
HICSS 2003: 332 |
5 | EE | Mason McDaniel,
Mohammad Hossain Heydari:
Content Based File Type Detection Algorithms.
HICSS 2003: 332 |
1997 |
4 | | Mohammad Hossain Heydari,
Ivan Hal Sudborough:
On the Diameter of the Pancake Network.
J. Algorithms 25(1): 67-94 (1997) |
1994 |
3 | | Mohammad Hossain Heydari,
Ioannis G. Tollis,
Chunliang Xia:
Improved Techniques for MCM Layer Assignment.
ICCD 1994: 604-607 |
2 | EE | Mohammad Hossain Heydari,
Ioannis G. Tollis,
Chunliang Xia:
Algorithms and bounds for layer assignment of MCM routing.
IEEE Trans. VLSI Syst. 2(2): 265-270 (1994) |
1992 |
1 | | Mohammad Hossain Heydari,
Ivan Hal Sudborough:
On Sorting by Prefix Reversals and the Diameter of Pancake Networks.
Heinz Nixdorf Symposium 1992: 218-227 |