dblp.uni-trier.dewww.uni-trier.de

Ali Miri

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
26 Ali Miri, Luis Orozco-Barbosa: Editorial. Ad Hoc & Sensor Wireless Networks 7(1-2): 1-2 (2009)
25EETerasan Niyomsataya, Ali Miri, Monica Nevins: An Application of theBruhat Decomposition to the Design of Full Diversity Unitary Space-Time Codes. IEEE Transactions on Information Theory 55(1): 232-244 (2009)
2008
24EESaeed Samet, Ali Miri: Privacy preserving ID3 using Gini Index over horizontally partitioned data. AICCSA 2008: 645-651
23EEAlireza A. Nezhad, Ali Miri, Dimitris Makrakis: Efficient Topology Discovery for Multihop Wireless Sensor Networks. CNSR 2008: 358-365
22EEPatrick Longa, Ali Miri: New Composite Operations and Precomputation Scheme for Elliptic Curve Cryptosystems over Prime Fields. Public Key Cryptography 2008: 229-247
21EEAlireza A. Nezhad, Ali Miri, Dimitris Makrakis: Location privacy and anonymity preserving routing for wireless sensor networks. Computer Networks 52(18): 3433-3452 (2008)
20EEPatrick Longa, Ali Miri: Fast and Flexible Elliptic Curve Point Arithmetic over Prime Fields. IEEE Trans. Computers 57(3): 289-302 (2008)
19EETerasan Niyomsataya, Ali Miri, Monica Nevins: Affine Reflection Group Codes. IEEE Transactions on Information Theory 54(1): 441-454 (2008)
18EETerasan Niyomsataya, Ali Miri, Monica Nevins: Unitary Space-Time Group Codes: Diversity Sums From Character Tables. IEEE Transactions on Information Theory 54(11): 5203-5210 (2008)
2007
17 Carlisle M. Adams, Ali Miri, Michael J. Wiener: Selected Areas in Cryptography, 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers Springer 2007
16EEAlireza A. Nezhad, Dimitris Makrakis, Ali Miri: Anonymous topology discovery for multihop wireless sensor networks. Q2SWinet 2007: 78-85
15EEHan-Yuen Ong, Ali Miri: Privacy preserving database access through dynamic privacy filters with stable data randomization. SMC 2007: 3333-3338
14EEGrace Elias, Ali Miri, Tet Hin Yeap: On efficient implementation of FPGA-based hyperelliptic curve cryptosystems. Computers & Electrical Engineering 33(5-6): 349-366 (2007)
13EETerasan Niyomsataya, Ali Miri, Monica Nevins: Unitary Space-Time Constellation Designs From Group Codes. IEEE Transactions on Information Theory 53(11): 4322-4329 (2007)
2006
12EEAli Abbas, Abdulmotaleb El-Saddik, Ali Miri: A Comprehensive Approach to Designing Internet Security Taxonomy. CCECE 2006: 1316-1319
11EEAli Miri, Monica Nevins, Terasan Niyomsataya: Applications of representation theory to wireless communications. Des. Codes Cryptography 41(3): 307-318 (2006)
10EETerasan Niyomsataya, Ali Miri, Monica Nevins: A New Unitary Space-Time Code with High Diversity Product. IEEE Transactions on Wireless Communications 5(11): 3045-3049 (2006)
9EEDeholo Nali, Carlisle M. Adams, Ali Miri: Hierarchical time-based information release. Int. J. Inf. Sec. 5(2): 92-104 (2006)
8EEAhmed Abdel-Hafez, Ali Miri, Luis Orozco-Barbosa: Scalable and fault-tolerant key agreement protocol for dynamic groups. Int. Journal of Network Management 16(3): 185-202 (2006)
2005
7EEIlker Onat, Ali Miri: A Real-Time Node-Based Traffic Anomaly Detection Algorithm for Wireless Sensor Networks. ICW/ICHSN/ICMCS/SENET 2005: 422-427
6EEDeholo Nali, Carlisle M. Adams, Ali Miri: Time-Based Release of Confidential Information in Hierarchical Settings. ISC 2005: 29-43
2004
5EEMuhammad J. Bohio, Ali Miri: An Authenticated Broadcasting Scheme for Wireless Ad Hoc Network. CNSR 2004: 69-74
4EEDeholo Nali, Carlisle M. Adams, Ali Miri: Using Mediated Identity-Based Cryptography to Support Role-Based Access Control. ISC 2004: 245-256
3EEMuhammad J. Bohio, Ali Miri: Self-Healing in Group Key Distribution Using Subset Difference Method. NCA 2004: 405-408
2EEDeholo Nali, Ali Miri, Carlisle M. Adams: Efficient Revocation of Dynamic Security Privileges in Hierarchically Structured Communities. PST 2004: 219-223
1EEMuhammad J. Bohio, Ali Miri: Efficient identity-based security schemes for ad hoc network routing protocols. Ad Hoc Networks 2(3): 309-317 (2004)

Coauthor Index

1Ali Abbas [12]
2Ahmed Abdel-Hafez [8]
3Carlisle M. Adams (Carlisle Adams) [2] [4] [6] [9] [17]
4Muhammad J. Bohio [1] [3] [5]
5Abdulmotaleb El-Saddik [12]
6Grace Elias [14]
7Patrick Longa [20] [22]
8Dimitris Makrakis [16] [21] [23]
9Deholo Nali [2] [4] [6] [9]
10Monica Nevins [10] [11] [13] [18] [19] [25]
11Alireza A. Nezhad [16] [21] [23]
12Terasan Niyomsataya [10] [11] [13] [18] [19] [25]
13Ilker Onat [7]
14Han-Yuen Ong [15]
15Luis Orozco-Barbosa [8] [26]
16Saeed Samet [24]
17Michael J. Wiener [17]
18Tet Hin Yeap [14]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)