dblp.uni-trier.dewww.uni-trier.de

Mohammad Peyravian

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2007
30EEBrian K. Flachs, Shigehiro Asano, Sang H. Dhong, H. Peter Hofstee, Gilles Gervais, Roy Kim, Tien Le, Peichun Liu, Jens Leenstra, John S. Liberty, Brad W. Michael, Hwa-Joon Oh, Silvia M. Müller, Osamu Takahashi, Koji Hirairi, Atsushi Kawasumi, Hiroaki Murakami, Hiromi Noro, Shoji Onishi, Juergen Pille, Joel Silberman, Suksoon Yong, Akiyuki Hatakeyama, Yukio Watanabe, Naoka Yano, Daniel A. Brokenshire, Mohammad Peyravian, VanDung To, Eiji Iwata: Microarchitecture and implementation of the synergistic processor in 65-nm and 90-nm SOI. IBM Journal of Research and Development 51(5): 529-544 (2007)
2006
29EEMohammad Peyravian, Clark Jeffries: Secure remote user access over insecure networks. Computer Communications 29(5): 660-667 (2006)
2004
28EEMohammad Peyravian, Allen Roginsky, Nevenko Zunic: Non-PKI methods for public key distribution. Computers & Security 23(2): 97-103 (2004)
2003
27 Mohammad Peyravian, Jean Calvignac: Fundamental architectural considerations for network processors. Computer Networks 41(5): 587-600 (2003)
26EEMohammad Peyravian, Allen Roginsky, Nevenko Zunic: Methods for preventing unauthorized software distribution. Computers & Security 22(4): 316-321 (2003)
25EEJames R. Allen Jr., Brian M. Bass, Claude Basso, Richard H. Boivie, Jean Calvignac, Gordon T. Davis, Laurent Freléchoux, Marco Heddes, Andreas Herkersdorf, Andreas Kind, Joe F. Logan, Mohammad Peyravian, Mark A. Rinaldi, Ravi K. Sabhikhi, Michael S. Siegel, Marcel Waldvogel: IBM PowerNP network processor: Hardware, software, and applications. IBM Journal of Research and Development 47(2-3): 177-194 (2003)
2001
24 Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic: Alternative Method for Unique RSA Primes Generation. Computers & Security 20(2): 173-179 (2001)
2000
23 Don Coppersmith, Rosario Gennaro, Shai Halevi, Charanjit S. Jutla, Stephen M. Matyas, Mohammad Peyravian, David Safford, Nevenko Zunic: IBM Comments. AES Candidate Conference 2000: 333-336
22 Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic: Generation of RSA Keys That Are Guaranteed to be Unique for Each User. Computers & Security 19(3): 282-288 (2000)
21 Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic: Multiparty Biometric-Based Authentication. Computers & Security 19(4): 369-374 (2000)
20 Mohammad Peyravian, Nevenko Zunic: Methods for Protecting Password Transmission. Computers & Security 19(5): 466-469 (2000)
19 Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic: Ticket and Challenge-Based Protocols for Timestamping. Computers & Security 19(6): 551-558 (2000)
1999
18EEMohammad Peyravian, Stephen M. Matyas, Nevenko Zunic: Decentralized group key management for secure multicast communications. Computer Communications 22(13): 1183-1187 (1999)
17EEMohammad Peyravian, Don Coppersmith: A structured symmetric-key block cipher. Computers & Security 18(2): 134-147 (1999)
16EEMohammad Peyravian, Allen Roginsky, Nevenko Zunic: Hash-based encryption system. Computers & Security 18(4): 345-350 (1999)
15EEMohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic: Generating user-based cryptographic keys and random numbers. Computers & Security 18(7): 619-626 (1999)
1998
14EEMohammad Peyravian, Ajay D. Kshemkalyani: Decentralized Network Connection Preemption Algorithms. Computer Networks 30(11): 1029-1043 (1998)
13EEMohammad Peyravian, Allen Roginsky, Ajay D. Kshemkalyani: On probabilities of hash value matches. Computers & Security 17(2): 171-176 (1998)
12EEMike Matyas, Mohammad Peyravian, Allen Roginsky, Nevenko Zunic: Reversible data mixing procedure for efficient public-key encryption. Computers & Security 17(3): 265-272 (1998)
1997
11 Mohammad Peyravian, Ajay D. Kshemkalyani: Connection Preemption: Issues, Algorithms, and a Simulation Study. INFOCOM 1997: 143-151
10EEMohammad Peyravian, Ajay D. Kshemkalyani: Network path caching: : Issues, algorithms and a simulation study. Computer Communications 20(8): 605-614 (1997)
9EEMohammad Peyravian, Raif O. Onvural: Algorithm for efficient generation of link-state updates in ATM networks. Computer Networks and ISDN Systems 29(2): 237-247 (1997)
8EERosario Gennaro, Paul A. Karger, Stephen M. Matyas, Mohammad Peyravian, Allen Roginsky, David Safford, Michael Willett, Nevenko Zunic: Two-phase cryptographic key recovery system. Computers & Security 16(6): 481-506 (1997)
7 James P. Gray, Ajay D. Kshemkalyani, Stephen M. Matyas, Mohammad Peyravian, Gene Tsudik: ATM cell encryption and key update synchronization. Telecommunication Systems 7(4): 391-408 (1997)
1996
6EEMohammad Peyravian, Raif O. Onvural: Enabling ATM networks. Computer Communications 19(13): 1027-1028 (1996)
5EEMohammad Peyravian, Chin-Tau A. Lea: Deriving Deadlock and Unspecified Reception Free Protocol Converters from Message Mapping Sets. Computer Networks and ISDN Systems 28(13): 1831-1844 (1996)
1995
4 Mohammad Peyravian, Rachel A. Bodner, Chee-Seng Chow, Marc A. Kaplan: Efficient Transport and Distribution of Network Control Information in NBBS. IBM Systems Journal 34(4): 640-658 (1995)
1994
3 Mohammad Peyravian: An Improved Selective Repeat Protocol and Its Performance in High-Speed Environments. Computer Networks and ISDN Systems 26(12): 1595-1605 (1994)
1993
2EEMohammad Peyravian, Chin-Tau A. Lea: Construction of protocol converters using formal methods. Computer Communications 16(4): 215-228 (1993)
1992
1 Mohammad Peyravian, Chin-Tau A. Lea: An Algorithmic Method for Protocol Conversion. ICDCS 1992: 328-335

Coauthor Index

1James R. Allen Jr. [25]
2Shigehiro Asano [30]
3Brian M. Bass [25]
4Claude Basso [25]
5Rachel A. Bodner [4]
6Richard H. Boivie [25]
7Daniel A. Brokenshire [30]
8Jean Calvignac [25] [27]
9Chee-Seng Chow [4]
10Don Coppersmith [17] [23]
11Gordon T. Davis [25]
12Sang H. Dhong [30]
13Brian K. Flachs [30]
14Laurent Freléchoux [25]
15Rosario Gennaro [8] [23]
16Gilles Gervais [30]
17James P. Gray [7]
18Shai Halevi [23]
19Akiyuki Hatakeyama [30]
20Marco Heddes [25]
21Andreas Herkersdorf [25]
22Koji Hirairi [30]
23H. Peter Hofstee [30]
24Eiji Iwata [30]
25Clark Jeffries [29]
26Charanjit S. Jutla [23]
27Marc A. Kaplan [4]
28Paul A. Karger [8]
29Atsushi Kawasumi [30]
30Roy Kim [30]
31Andreas Kind [25]
32Ajay D. Kshemkalyani [7] [10] [11] [13] [14]
33Tien Le [30]
34Chin-Tau A. Lea [1] [2] [5]
35Jens Leenstra [30]
36John S. Liberty [30]
37Peichun Liu [30]
38Joe F. Logan [25]
39Mike Matyas [12]
40Stephen M. Matyas [7] [8] [15] [18] [19] [21] [22] [23] [24]
41Brad W. Michael [30]
42Silvia M. Müller [30]
43Hiroaki Murakami [30]
44Hiromi Noro [30]
45Hwa-Joon Oh [30]
46Shoji Onishi [30]
47Raif O. Onvural [6] [9]
48Juergen Pille [30]
49Mark A. Rinaldi [25]
50Allen Roginsky [8] [12] [13] [15] [16] [19] [21] [22] [24] [26] [28]
51Ravi K. Sabhikhi [25]
52David Safford [8] [23]
53Michael S. Siegel [25]
54Joel Silberman [30]
55Osamu Takahashi [30]
56VanDung To [30]
57Gene Tsudik [7]
58Marcel Waldvogel [25]
59Yukio Watanabe [30]
60Michael Willett [8]
61Naoka Yano [30]
62Suksoon Yong [30]
63Nevenko Zunic [8] [12] [15] [16] [18] [19] [20] [21] [22] [23] [24] [26] [28]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)