2009 |
26 | | Ali Miri,
Luis Orozco-Barbosa:
Editorial.
Ad Hoc & Sensor Wireless Networks 7(1-2): 1-2 (2009) |
25 | EE | Terasan Niyomsataya,
Ali Miri,
Monica Nevins:
An Application of theBruhat Decomposition to the Design of Full Diversity Unitary Space-Time Codes.
IEEE Transactions on Information Theory 55(1): 232-244 (2009) |
2008 |
24 | EE | Saeed Samet,
Ali Miri:
Privacy preserving ID3 using Gini Index over horizontally partitioned data.
AICCSA 2008: 645-651 |
23 | EE | Alireza A. Nezhad,
Ali Miri,
Dimitris Makrakis:
Efficient Topology Discovery for Multihop Wireless Sensor Networks.
CNSR 2008: 358-365 |
22 | EE | Patrick Longa,
Ali Miri:
New Composite Operations and Precomputation Scheme for Elliptic Curve Cryptosystems over Prime Fields.
Public Key Cryptography 2008: 229-247 |
21 | EE | Alireza A. Nezhad,
Ali Miri,
Dimitris Makrakis:
Location privacy and anonymity preserving routing for wireless sensor networks.
Computer Networks 52(18): 3433-3452 (2008) |
20 | EE | Patrick Longa,
Ali Miri:
Fast and Flexible Elliptic Curve Point Arithmetic over Prime Fields.
IEEE Trans. Computers 57(3): 289-302 (2008) |
19 | EE | Terasan Niyomsataya,
Ali Miri,
Monica Nevins:
Affine Reflection Group Codes.
IEEE Transactions on Information Theory 54(1): 441-454 (2008) |
18 | EE | Terasan Niyomsataya,
Ali Miri,
Monica Nevins:
Unitary Space-Time Group Codes: Diversity Sums From Character Tables.
IEEE Transactions on Information Theory 54(11): 5203-5210 (2008) |
2007 |
17 | | Carlisle M. Adams,
Ali Miri,
Michael J. Wiener:
Selected Areas in Cryptography, 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers
Springer 2007 |
16 | EE | Alireza A. Nezhad,
Dimitris Makrakis,
Ali Miri:
Anonymous topology discovery for multihop wireless sensor networks.
Q2SWinet 2007: 78-85 |
15 | EE | Han-Yuen Ong,
Ali Miri:
Privacy preserving database access through dynamic privacy filters with stable data randomization.
SMC 2007: 3333-3338 |
14 | EE | Grace Elias,
Ali Miri,
Tet Hin Yeap:
On efficient implementation of FPGA-based hyperelliptic curve cryptosystems.
Computers & Electrical Engineering 33(5-6): 349-366 (2007) |
13 | EE | Terasan Niyomsataya,
Ali Miri,
Monica Nevins:
Unitary Space-Time Constellation Designs From Group Codes.
IEEE Transactions on Information Theory 53(11): 4322-4329 (2007) |
2006 |
12 | EE | Ali Abbas,
Abdulmotaleb El-Saddik,
Ali Miri:
A Comprehensive Approach to Designing Internet Security Taxonomy.
CCECE 2006: 1316-1319 |
11 | EE | Ali Miri,
Monica Nevins,
Terasan Niyomsataya:
Applications of representation theory to wireless communications.
Des. Codes Cryptography 41(3): 307-318 (2006) |
10 | EE | Terasan Niyomsataya,
Ali Miri,
Monica Nevins:
A New Unitary Space-Time Code with High Diversity Product.
IEEE Transactions on Wireless Communications 5(11): 3045-3049 (2006) |
9 | EE | Deholo Nali,
Carlisle M. Adams,
Ali Miri:
Hierarchical time-based information release.
Int. J. Inf. Sec. 5(2): 92-104 (2006) |
8 | EE | Ahmed Abdel-Hafez,
Ali Miri,
Luis Orozco-Barbosa:
Scalable and fault-tolerant key agreement protocol for dynamic groups.
Int. Journal of Network Management 16(3): 185-202 (2006) |
2005 |
7 | EE | Ilker Onat,
Ali Miri:
A Real-Time Node-Based Traffic Anomaly Detection Algorithm for Wireless Sensor Networks.
ICW/ICHSN/ICMCS/SENET 2005: 422-427 |
6 | EE | Deholo Nali,
Carlisle M. Adams,
Ali Miri:
Time-Based Release of Confidential Information in Hierarchical Settings.
ISC 2005: 29-43 |
2004 |
5 | EE | Muhammad J. Bohio,
Ali Miri:
An Authenticated Broadcasting Scheme for Wireless Ad Hoc Network.
CNSR 2004: 69-74 |
4 | EE | Deholo Nali,
Carlisle M. Adams,
Ali Miri:
Using Mediated Identity-Based Cryptography to Support Role-Based Access Control.
ISC 2004: 245-256 |
3 | EE | Muhammad J. Bohio,
Ali Miri:
Self-Healing in Group Key Distribution Using Subset Difference Method.
NCA 2004: 405-408 |
2 | EE | Deholo Nali,
Ali Miri,
Carlisle M. Adams:
Efficient Revocation of Dynamic Security Privileges in Hierarchically Structured Communities.
PST 2004: 219-223 |
1 | EE | Muhammad J. Bohio,
Ali Miri:
Efficient identity-based security schemes for ad hoc network routing protocols.
Ad Hoc Networks 2(3): 309-317 (2004) |