New attacks on UMTS network access Z Ahmadian, S Salimi, A Salahi 2009 Wireless Telecommunications Symposium, 1-6, 2009 | 48 | 2009 |
Private identification, authentication and key agreement protocol with security mode setup F Farhat, S Salimi, A Salahi Cryptology ePrint Archive, 2011 | 29 | 2011 |
Cognitive interference channel with two confidential messages HG Bafghi, S Salimi, B Seyfe, MR Aref 2010 International Symposium On Information Theory & Its Applications, 952-956, 2010 | 20 | 2010 |
An extended authentication and key agreement protocol of UMTS F Farhat, S Salimi, A Salahi Information Security Practice and Experience: 5th International Conference …, 2009 | 19 | 2009 |
The CEO problem with secrecy constraints MS F Naghibi, S Salimi Information Forensics and Security, IEEE Transactions on 10 (6), 1234-1249, 2015 | 17* | 2015 |
Anonymous roaming in universal mobile telecommunication system mobile networks M Fatemi, S Salimi, A Salahi IET Information security 4 (2), 93-103, 2010 | 17 | 2010 |
Key agreement over multiple access channel S Salimi, M Salmasizadeh, MR Aref, JD Golic IEEE Transactions on Information Forensics and Security 6 (3), 775-790, 2011 | 15 | 2011 |
Security enhancements against UMTS–GSM interworking attacks Z Ahmadian, S Salimi, A Salahi Computer Networks 54 (13), 2256-2270, 2010 | 15 | 2010 |
Rate regions of secret key sharing in a new source model S Salimi, M Salmasizadeh, MR Aref IET communications 5 (4), 443-455, 2011 | 14 | 2011 |
Key agreement over a generalized multiple access channel using noiseless and noisy feedback S Salimi, M Skoglund, JD Golic, M Salmasizadeh, MR Aref IEEE Journal on Selected Areas in Communications 31 (9), 1765-1778, 2013 | 12 | 2013 |
Sequential detection of deception attacks in networked control systems with watermarking S Salimi, S Dey, A Ahlén 2019 18th European Control Conference (ECC), 883-890, 2019 | 11 | 2019 |
Finite-SNR regime analysis of the Gaussian wiretap multiple-access channel P Babaheidarian, S Salimi, P Papadimitratos 2015 53rd Annual Allerton Conference on Communication, Control, and …, 2015 | 11 | 2015 |
Secure partial repair in wireless caching networks with broadcast channels M Gerami, M Xiao, S Salimi, M Skoglund 2015 IEEE Conference on Communications and Network Security (CNS), 353-360, 2015 | 9 | 2015 |
Secret key agreement using correlated sources over the generalized multiple access channel S Salimi, M Skoglund 2012 IEEE Information Theory Workshop, 467-471, 2012 | 8 | 2012 |
Key agreement over multiple access channel using feedback channel S Salimi, M Salmasizadeh, MR Aref 2011 IEEE International Symposium on Information Theory Proceedings, 1970-1974, 2011 | 8 | 2011 |
Compute-and-forward can buy secrecy cheap P Babaheidarian, S Salimi 2015 IEEE International Symposium on Information Theory (ISIT), 2475-2479, 2015 | 7 | 2015 |
Secret key sharing in a new source model: Rate regions S Salimi, M Salmasizadeh, MR Aref 2010 Australian Communications Theory Workshop (AusCTW), 117-122, 2010 | 7 | 2010 |
Security in the gaussian interference channel: Weak and moderately weak interference regimes P Babaheidarian, S Salimi, P Papadimitratos 2016 IEEE International Symposium on Information Theory (ISIT), 2434-2438, 2016 | 6 | 2016 |
Simultaneously generating multiple keys in a four-terminal network P Babaheidarian, S Salimi, MR Aref IET Information Security 6 (3), 190-201, 2012 | 6 | 2012 |
Generalised secure distributed source coding with side information S Salimi, M Salmasizadeh, MR Aref IET communications 4 (18), 2262-2272, 2010 | 6 | 2010 |