Showing
1 - 9
results of
9
for search '
Khodadadi, Touraj
'
Skip to content
AUNILO IRDS | AUNILO Institutional Repository Discovery Service
FAQs
|
Search Tips
|
Feedback
Your Account
Log Out
Login
Theme
Bootstrap
Aunilo
Language
English
中文(繁體)
اللغة العربية
Toggle navigation
Home
Search/Browse Options
Search History
Advanced Search
About
About AUNILO IRDS
Content Sources
Statistics
Technical Team
Disclaimer
Privacy & Security Policy
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced
Author
Khodadadi, Touraj
Showing
1 - 9
results of
9
for search '
Khodadadi, Touraj
'
, query time: 0.01s
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
1
An efficient recognition-based graphical password scheme improving security and usability
by
Khodadadi
,
Touraj
Published 2013
Get full text
Thesis
Save to List
Saved in:
2
A survey on wireless mesh networks: architecture, specifications and challenges
by
Eslami, Mohammad
,
Karimi, Omidreza
,
Khodadadi
,
Touraj
Published 2014
Get full text
Get full text
Conference or Workshop Item
Save to List
Saved in:
3
Security analysis method of recognition-based graphical password
by
Khodadadi
,
Touraj
,
Alizadeh, Mojtaba
,
Gholizadeh, Somayyeh
,
Zamani, Mazdak
,
Darvishi, Mahdi
Published 2015
Get full text
Get full text
Article
Save to List
Saved in:
4
Energy efficient routing in wireless sensor networks based on fuzzy ant colony optimization
by
Amiri, Ehsan
,
Keshavarz, Hassan
,
Alizadeh, Mojtaba
,
Zamani, Mazdak
,
Khodadadi
,
Touraj
Published 2014
Get full text
Get full text
Article
Save to List
Saved in:
5
Efficient intelligent energy routing protocol in wireless sensor networks
by
Kiani, Farzad
,
Amiri, Ehsan
,
Zamani, Mazdak
,
Khodadadi
,
Touraj
,
Abdul Manaf, Azizah
Published 2015
Get full text
Get full text
Article
Save to List
Saved in:
6
Security and privacy criteria to evaluate authentication mechanisms in proxy mobile IPv6
by
Alizadeh, Mojtaba
,
Zamani, Mazdak
,
Baharun, Sabariah
,
Hassan, Wan Haslina
,
Khodadadi
,
Touraj
Published 2015
Get full text
Get full text
Article
Save to List
Saved in:
7
Privacy issues and protection in secure data outsourcing
by
Khodadadi
,
Touraj
,
Islam, A. K. M. Muzahidul
,
Baharun, Sabariah
,
Shozo, Komaki
Published 2014
Get full text
Get full text
Get full text
Article
Save to List
Saved in:
8
Evaluation of recognition-based graphical password schemes in terms of usability and security attributes
by
Khodadadi
,
Touraj
,
A. K. M., Muzahidul Islam
,
Baharun, Sabariah
,
Komaki, Shozo
Published 2016
Get full text
Get full text
Article
Save to List
Saved in:
9
Anonymity and untraceability assessment of authentication protocols in proxy mobile IPv6
by
Alizadeh, Mojtaba
,
Baharun, Sabariah
,
Zamani, Mazdak
,
Khodadadi
,
Touraj
,
Darvishi, Mahdi
,
Gholizadeh, Somayyeh
,
Ahmadi, Hossein
Published 2015
Get full text
Get full text
Get full text
Article
Save to List
Saved in:
Search Tools:
Get RSS Feed
—
Email this Search
—
×
Loading...