2007 |
30 | EE | Brian K. Flachs,
Shigehiro Asano,
Sang H. Dhong,
H. Peter Hofstee,
Gilles Gervais,
Roy Kim,
Tien Le,
Peichun Liu,
Jens Leenstra,
John S. Liberty,
Brad W. Michael,
Hwa-Joon Oh,
Silvia M. Müller,
Osamu Takahashi,
Koji Hirairi,
Atsushi Kawasumi,
Hiroaki Murakami,
Hiromi Noro,
Shoji Onishi,
Juergen Pille,
Joel Silberman,
Suksoon Yong,
Akiyuki Hatakeyama,
Yukio Watanabe,
Naoka Yano,
Daniel A. Brokenshire,
Mohammad Peyravian,
VanDung To,
Eiji Iwata:
Microarchitecture and implementation of the synergistic processor in 65-nm and 90-nm SOI.
IBM Journal of Research and Development 51(5): 529-544 (2007) |
2006 |
29 | EE | Mohammad Peyravian,
Clark Jeffries:
Secure remote user access over insecure networks.
Computer Communications 29(5): 660-667 (2006) |
2004 |
28 | EE | Mohammad Peyravian,
Allen Roginsky,
Nevenko Zunic:
Non-PKI methods for public key distribution.
Computers & Security 23(2): 97-103 (2004) |
2003 |
27 | | Mohammad Peyravian,
Jean Calvignac:
Fundamental architectural considerations for network processors.
Computer Networks 41(5): 587-600 (2003) |
26 | EE | Mohammad Peyravian,
Allen Roginsky,
Nevenko Zunic:
Methods for preventing unauthorized software distribution.
Computers & Security 22(4): 316-321 (2003) |
25 | EE | James R. Allen Jr.,
Brian M. Bass,
Claude Basso,
Richard H. Boivie,
Jean Calvignac,
Gordon T. Davis,
Laurent Freléchoux,
Marco Heddes,
Andreas Herkersdorf,
Andreas Kind,
Joe F. Logan,
Mohammad Peyravian,
Mark A. Rinaldi,
Ravi K. Sabhikhi,
Michael S. Siegel,
Marcel Waldvogel:
IBM PowerNP network processor: Hardware, software, and applications.
IBM Journal of Research and Development 47(2-3): 177-194 (2003) |
2001 |
24 | | Mohammad Peyravian,
Stephen M. Matyas,
Allen Roginsky,
Nevenko Zunic:
Alternative Method for Unique RSA Primes Generation.
Computers & Security 20(2): 173-179 (2001) |
2000 |
23 | | Don Coppersmith,
Rosario Gennaro,
Shai Halevi,
Charanjit S. Jutla,
Stephen M. Matyas,
Mohammad Peyravian,
David Safford,
Nevenko Zunic:
IBM Comments.
AES Candidate Conference 2000: 333-336 |
22 | | Mohammad Peyravian,
Stephen M. Matyas,
Allen Roginsky,
Nevenko Zunic:
Generation of RSA Keys That Are Guaranteed to be Unique for Each User.
Computers & Security 19(3): 282-288 (2000) |
21 | | Mohammad Peyravian,
Stephen M. Matyas,
Allen Roginsky,
Nevenko Zunic:
Multiparty Biometric-Based Authentication.
Computers & Security 19(4): 369-374 (2000) |
20 | | Mohammad Peyravian,
Nevenko Zunic:
Methods for Protecting Password Transmission.
Computers & Security 19(5): 466-469 (2000) |
19 | | Mohammad Peyravian,
Stephen M. Matyas,
Allen Roginsky,
Nevenko Zunic:
Ticket and Challenge-Based Protocols for Timestamping.
Computers & Security 19(6): 551-558 (2000) |
1999 |
18 | EE | Mohammad Peyravian,
Stephen M. Matyas,
Nevenko Zunic:
Decentralized group key management for secure multicast communications.
Computer Communications 22(13): 1183-1187 (1999) |
17 | EE | Mohammad Peyravian,
Don Coppersmith:
A structured symmetric-key block cipher.
Computers & Security 18(2): 134-147 (1999) |
16 | EE | Mohammad Peyravian,
Allen Roginsky,
Nevenko Zunic:
Hash-based encryption system.
Computers & Security 18(4): 345-350 (1999) |
15 | EE | Mohammad Peyravian,
Stephen M. Matyas,
Allen Roginsky,
Nevenko Zunic:
Generating user-based cryptographic keys and random numbers.
Computers & Security 18(7): 619-626 (1999) |
1998 |
14 | EE | Mohammad Peyravian,
Ajay D. Kshemkalyani:
Decentralized Network Connection Preemption Algorithms.
Computer Networks 30(11): 1029-1043 (1998) |
13 | EE | Mohammad Peyravian,
Allen Roginsky,
Ajay D. Kshemkalyani:
On probabilities of hash value matches.
Computers & Security 17(2): 171-176 (1998) |
12 | EE | Mike Matyas,
Mohammad Peyravian,
Allen Roginsky,
Nevenko Zunic:
Reversible data mixing procedure for efficient public-key encryption.
Computers & Security 17(3): 265-272 (1998) |
1997 |
11 | | Mohammad Peyravian,
Ajay D. Kshemkalyani:
Connection Preemption: Issues, Algorithms, and a Simulation Study.
INFOCOM 1997: 143-151 |
10 | EE | Mohammad Peyravian,
Ajay D. Kshemkalyani:
Network path caching: : Issues, algorithms and a simulation study.
Computer Communications 20(8): 605-614 (1997) |
9 | EE | Mohammad Peyravian,
Raif O. Onvural:
Algorithm for efficient generation of link-state updates in ATM networks.
Computer Networks and ISDN Systems 29(2): 237-247 (1997) |
8 | EE | Rosario Gennaro,
Paul A. Karger,
Stephen M. Matyas,
Mohammad Peyravian,
Allen Roginsky,
David Safford,
Michael Willett,
Nevenko Zunic:
Two-phase cryptographic key recovery system.
Computers & Security 16(6): 481-506 (1997) |
7 | | James P. Gray,
Ajay D. Kshemkalyani,
Stephen M. Matyas,
Mohammad Peyravian,
Gene Tsudik:
ATM cell encryption and key update synchronization.
Telecommunication Systems 7(4): 391-408 (1997) |
1996 |
6 | EE | Mohammad Peyravian,
Raif O. Onvural:
Enabling ATM networks.
Computer Communications 19(13): 1027-1028 (1996) |
5 | EE | Mohammad Peyravian,
Chin-Tau A. Lea:
Deriving Deadlock and Unspecified Reception Free Protocol Converters from Message Mapping Sets.
Computer Networks and ISDN Systems 28(13): 1831-1844 (1996) |
1995 |
4 | | Mohammad Peyravian,
Rachel A. Bodner,
Chee-Seng Chow,
Marc A. Kaplan:
Efficient Transport and Distribution of Network Control Information in NBBS.
IBM Systems Journal 34(4): 640-658 (1995) |
1994 |
3 | | Mohammad Peyravian:
An Improved Selective Repeat Protocol and Its Performance in High-Speed Environments.
Computer Networks and ISDN Systems 26(12): 1595-1605 (1994) |
1993 |
2 | EE | Mohammad Peyravian,
Chin-Tau A. Lea:
Construction of protocol converters using formal methods.
Computer Communications 16(4): 215-228 (1993) |
1992 |
1 | | Mohammad Peyravian,
Chin-Tau A. Lea:
An Algorithmic Method for Protocol Conversion.
ICDCS 1992: 328-335 |