scispace - formally typeset
M

Majid Naderi

Researcher at Iran University of Science and Technology

Publications -  59
Citations -  434

Majid Naderi is an academic researcher from Iran University of Science and Technology. The author has contributed to research in topics: Mutual authentication & Wireless network. The author has an hindex of 13, co-authored 59 publications receiving 409 citations. Previous affiliations of Majid Naderi include Ryerson University.

Papers
More filters
Proceedings Article

Security analysis of LMAP ++ , an RFID authentication protocol

TL;DR: In this paper, the authors present a third party security evaluation of a recently proposed Lightweight Mutual Authentication Protocol (LMAP++), which is an important class of protocols for RFID applications.
Journal ArticleDOI

Image encryption using a lightweight stream encryption algorithm

TL;DR: It can be concluded that the present algorithm in comparison to A5/1 and W7 stream ciphers has the same security level, is better in terms of the speed of performance, and is used for real-time applications.
Book ChapterDOI

On the security of tan et al. serverless RFID authentication and search protocols

TL;DR: This paper points out how the improved search protocols are vulnerable to traceability attacks, and shows the way an attacker can impersonate a legitimate tag.
Journal ArticleDOI

Encryption of multimedia content in partial encryption scheme of DCT transform coefficients using a lightweight stream algorithm

TL;DR: The results of analyses and simulations by MATLAB software show that the proposed encryption algorithm and two introduced designs are applicable for real-time security applications of multimedia which require high-speed computations and sufficient security levels.
Journal ArticleDOI

Energy-Efficient Cluster-Head Rotation in Beacon-Enabled IEEE 802.15.4 Networks

TL;DR: This work proposes a fair and efficient cluster-head rotation protocol with virtually zero overhead and no dead time, and shows that the proposed approach achieves extremely good balance of nodes' lifetime and optimal network lifetime in maximin sense, outperforming other approaches that use TDMA access.