default search action
BibTeX records: Behnam Sattarzadeh
@article{DBLP:journals/jlp/SattarzadehF15, author = {Behnam Sattarzadeh and Mehran S. Fallah}, title = {Automated type-based analysis of injective agreement in the presence of compromised principals}, journal = {J. Log. Algebraic Methods Program.}, volume = {84}, number = {5}, pages = {576--610}, year = {2015}, url = {https://doi.org/10.1016/j.jlamp.2015.06.002}, doi = {10.1016/J.JLAMP.2015.06.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jlp/SattarzadehF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/SattarzadehF14, author = {Behnam Sattarzadeh and Mehran S. Fallah}, title = {Typing secure implementation of authentication protocols in environments with compromised principals}, journal = {Secur. Commun. Networks}, volume = {7}, number = {11}, pages = {1815--1830}, year = {2014}, url = {https://doi.org/10.1002/sec.882}, doi = {10.1002/SEC.882}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/SattarzadehF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/SattarzadehF11, author = {Behnam Sattarzadeh and Mehran S. Fallah}, editor = {Gilles Barthe and Anupam Datta and Sandro Etalle}, title = {Is Cryptyc Able to Detect Insider Attacks?}, booktitle = {Formal Aspects of Security and Trust - 8th International Workshop, {FAST} 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7140}, pages = {230--244}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29420-4\_15}, doi = {10.1007/978-3-642-29420-4\_15}, timestamp = {Sat, 19 Oct 2019 20:16:12 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/SattarzadehF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/AsadpourSM08, author = {Mahdi Asadpour and Behnam Sattarzadeh and Ali Movaghar}, title = {Anonymous authentication protocol for {GSM} networks}, journal = {Int. J. Secur. Networks}, volume = {3}, number = {1}, pages = {54--62}, year = {2008}, url = {https://doi.org/10.1504/IJSN.2008.016202}, doi = {10.1504/IJSN.2008.016202}, timestamp = {Wed, 12 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/AsadpourSM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecumn/SattarzadehAJ07, author = {Behnam Sattarzadeh and Mahdi Asadpour and Rasool Jalili}, title = {Improved User Identity Confidentiality for {UMTS} Mobile Networks}, booktitle = {Fourth European Conference on Universal Multiservice Networks {(ECUMN} 2007), 14-16 February 2007, Toulouse, France}, pages = {401--409}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ECUMN.2007.27}, doi = {10.1109/ECUMN.2007.27}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecumn/SattarzadehAJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SattarzadehAJ06, author = {Behnam Sattarzadeh and Mahdi Asadpour and Rasool Jalili}, editor = {Manu Malek and Eduardo Fern{\'{a}}ndez{-}Medina and Javier Hernando}, title = {Security Enhancement for a Low Computation Cost User Authentication Scheme}, booktitle = {{SECRYPT} 2006, Proceedings of the International Conference on Security and Cryptography, Set{\'{u}}bal, Portugal, August 7-10, 2006, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {5--8}, publisher = {{INSTICC} Press}, year = {2006}, timestamp = {Thu, 28 Sep 2006 10:10:32 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SattarzadehAJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.