default search action
Somayeh Salimi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [c24]Parisa Babaheidarian, Somayeh Salimi, Panos Papadimitratos:
Scalable Security in Interference Channels With Arbitrary Number of Users. ISITA 2020: 402-406 - [i16]Parisa Babaheidarian, Somayeh Salimi, Panos Papadimitratos:
Towards Scalable Security in Interference Channels With Arbitrary Number of Users. CoRR abs/2004.06588 (2020)
2010 – 2019
- 2019
- [c23]Somayeh Salimi, Subhrakanti Dey, Anders Ahlén:
Sequential Detection of Deception Attacks in Networked Control Systems with Watermarking. ECC 2019: 883-890 - 2018
- [i15]Somayeh Salimi, Subhrakanti Dey, Anders Ahlén:
Sequential Detection of Deception Attacks in Networked Control Systems with Watermarking. CoRR abs/1803.00170 (2018) - 2017
- [c22]Parisa Babaheidarian, Somayeh Salimi, Panos Papadimitratos:
Preserving confidentiality in the Gaussian broadcast channel using compute-and-forward. CISS 2017: 1-6 - [c21]Majid Gerami, Ming Xiao, Somayeh Salimi, Mikael Skoglund, Panos Papadimitratos:
Optimal secure partial-repair in distributed storage systems. CISS 2017: 1-5 - [i14]Parisa Babaheidarian, Somayeh Salimi, Panos Papadimitratos:
Preserving Confidentiality in The Gaussian Broadcast Channel Using Compute-and-Forward. CoRR abs/1703.01208 (2017) - 2016
- [c20]Parisa Babaheidarian, Somayeh Salimi, Panos Papadimitratos:
Security in the Gaussian interference channel: Weak and moderately weak interference regimes. ISIT 2016: 2434-2438 - [i13]Somayeh Salimi, Matthieu R. Bloch, Frederic Gabry, Mikael Skoglund, Panos Papadimitratos:
Strong Secrecy in Pairwise Key Agreement over a Generalized Multiple Access Channel. CoRR abs/1603.05399 (2016) - [i12]Parisa Babaheidarian, Somayeh Salimi, Panos Papadimitratos:
Security in The Gaussian Interference Channel: Weak and Moderately Weak Interference Regimes. CoRR abs/1604.07386 (2016) - 2015
- [j8]Farshad Naghibi, Somayeh Salimi, Mikael Skoglund:
The CEO Problem With Secrecy Constraints. IEEE Trans. Inf. Forensics Secur. 10(6): 1234-1249 (2015) - [c19]Parisa Babaheidarian, Somayeh Salimi, Panos Papadimitratos:
Finite-SNR regime analysis of the Gaussian wiretap multiple-access channel. Allerton 2015: 307-314 - [c18]Somayeh Salimi, Eduard A. Jorswieck, Mikael Skoglund, Panos Papadimitratos:
Key agreement over an interference channel with noiseless feedback: Achievable region & distributed allocation. CNS 2015: 59-64 - [c17]Majid Gerami, Ming Xiao, Somayeh Salimi, Mikael Skoglund:
Secure partial repair in wireless caching networks with broadcast channels. CNS 2015: 353-360 - [c16]Parisa Babaheidarian, Somayeh Salimi:
Compute-and-forward can buy secrecy cheap. ISIT 2015: 2475-2479 - [i11]Farshad Naghibi, Somayeh Salimi, Mikael Skoglund:
The CEO Problem with Secrecy Constraints. CoRR abs/1502.03358 (2015) - [i10]Parisa Babaheidarian, Somayeh Salimi:
Compute-and-Forward Can Buy Secrecy Cheap. CoRR abs/1504.05862 (2015) - [i9]Majid Gerami, Ming Xiao, Somayeh Salimi, Mikael Skoglund:
Secure Partial Repair in Wireless Caching Networks with Broadcast Channels. CoRR abs/1507.05533 (2015) - [i8]Parisa Babaheidarian, Somayeh Salimi, Panos Papadimitratos:
Finite-SNR Regime Analysis of The Gaussian Wiretap Multiple-Access Channel. CoRR abs/1510.01258 (2015) - [i7]Somayeh Salimi, Panos Papadimitratos:
Pairwise Secret Key Agreement based on Location-derived Common Randomness. CoRR abs/1512.08652 (2015) - [i6]Somayeh Salimi, Eduard A. Jorswieck, Mikael Skoglund, Panos Papadimitratos:
Key Agreement over an Interference Channel with Noiseless Feedback: Achievable Region & Distributed Allocation. CoRR abs/1512.08679 (2015) - 2014
- [c15]Farshad Naghibi, Somayeh Salimi, Mikael Skoglund:
On transmission of a remote source with secrecy constraints over noisy channels. GlobalSIP 2014: 746-749 - [c14]Farshad Naghibi, Somayeh Salimi, Mikael Skoglund:
The CEO problem with secrecy constraints. ISIT 2014: 756-760 - 2013
- [j7]Somayeh Salimi, Mikael Skoglund, Jovan Dj. Golic, Mahmoud Salmasizadeh, Mohammad Reza Aref:
Key Agreement over a Generalized Multiple Access Channel Using Noiseless and Noisy Feedback. IEEE J. Sel. Areas Commun. 31(9): 1765-1778 (2013) - [c13]Farshad Naghibi, Somayeh Salimi, Ragnar Thobaben, Mikael Skoglund:
The Lossless CEO Problem with Security Constraints. ISWCS 2013: 1-5 - [c12]Somayeh Salimi, Frederic Gabry, Mikael Skoglund:
Pairwise Key Agreement over a Generalized Multiple Access Channel: Capacity Bounds and Game-Theoretic Analysis. ISWCS 2013: 1-5 - [c11]Frederic Gabry, Somayeh Salimi, Ragnar Thobaben, Mikael Skoglund:
High SNR performance of amplify-and-forward relaying in Rayleigh fading wiretap channels. IWCIT 2013: 1-5 - 2012
- [j6]Parisa Babaheidarian, Somayeh Salimi, Mohammad Reza Aref:
Simultaneously generating multiple keys in a four-terminal network. IET Inf. Secur. 6(3): 190-201 (2012) - [c10]Farshad Naghibi, Ragnar Thobaben, Somayeh Salimi, Mikael Skoglund:
Layered LDPC convolutional codes for compression of correlated sources under adversarial attacks. ISITA 2012: 165-169 - [c9]Somayeh Salimi, Mikael Skoglund, Mahmoud Salmasizadeh, Mohammad Reza Aref:
Pairwise secret key agreement using the source common randomness. ISWCS 2012: 751-755 - [c8]Somayeh Salimi, Mikael Skoglund:
Secret key agreement using correlated sources over the generalized multiple access channel. ITW 2012: 467-471 - [i5]Somayeh Salimi, Mikael Skoglund:
Secret Key Agreement Using Correlated Sources over the Generalized Multiple Access Channel. CoRR abs/1204.2922 (2012) - 2011
- [j5]Somayeh Salimi, Mahmoud Salmasizadeh, Mohammad Reza Aref:
Rate regions of secret key sharing in a new source model. IET Commun. 5(4): 443-455 (2011) - [j4]Somayeh Salimi, Mahmoud Salmasizadeh, Mohammad Reza Aref, Jovan Dj. Golic:
Key Agreement Over Multiple Access Channel. IEEE Trans. Inf. Forensics Secur. 6(3-1): 775-790 (2011) - [c7]Roja Fouladi, Somayeh Salimi, Hossein Gharaee:
Analysis of an adjacent 3G network corruption influence on WLAN/3G interworking access. CASoN 2011: 158-162 - [c6]Somayeh Salimi, Mahmoud Salmasizadeh, Mohammad Reza Aref:
Key agreement over multiple access channel using feedback channel. ISIT 2011: 1970-1974 - [i4]Parisa Babaheidarian, Somayeh Salimi, Mohammad Reza Aref:
A New Secret key Agreement Scheme in a Four-Terminal Network. CoRR abs/1103.5197 (2011) - [i3]Farshid Farhat, Somayeh Salimi, Ahmad Salahi:
Private Identification, Authentication and Key Agreement Protocol with Security Mode Setup. IACR Cryptol. ePrint Arch. 2011: 45 (2011) - 2010
- [j3]Zahra Ahmadian, Somayeh Salimi, Ahmad Salahi:
Security enhancements against UMTS-GSM interworking attacks. Comput. Networks 54(13): 2256-2270 (2010) - [j2]Somayeh Salimi, Mahmoud Salmasizadeh, Mohammad Reza Aref:
Generalised secure distributed source coding with side information. IET Commun. 4(18): 2262-2272 (2010) - [j1]Mitra Fatemi, Somayeh Salimi, Ahmad Salahi:
Anonymous roaming in universal mobile telecommunication system mobile networks. IET Inf. Secur. 4(2): 93-103 (2010) - [c5]Somayeh Salimi, Mahmoud Salmasizadeh, Mohammad Reza Aref:
Secret key rate region of multiple access channel model. ISITA 2010: 197-202 - [c4]Hamid G. Bafghi, Somayeh Salimi, Babak Seyfe, Mohammad Reza Aref:
Cognitive interference channel with two confidential messages. ISITA 2010: 952-956 - [c3]Amir Sonee, Somayeh Salimi, Mahmoud Salmasizadeh:
Generalized multiple-access relay channel with confidential messages. ISITA 2010: 1024-1029 - [i2]Somayeh Salimi, Mahmoud Salmasizadeh, Mohammad Reza Aref:
Generalized Secure Distributed Source Coding with Side Information. CoRR abs/1004.0798 (2010) - [i1]Somayeh Salimi, Mahmoud Salmasizadeh, Mohammad Reza Aref:
Rate Regions of Secret Key Sharing in a New Source Model. CoRR abs/1004.0799 (2010)
2000 – 2009
- 2009
- [c2]Farshid Farhat, Somayeh Salimi, Ahmad Salahi:
An Extended Authentication and Key Agreement Protocol of UMTS. ISPEC 2009: 230-244 - [c1]Zahra Ahmadian, Somayeh Salimi, Ahmad Salahi:
New attacks on UMTS network access. WTS 2009: 1-6
Coauthor Index
aka: Panos Papadimitratos
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:56 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint