somayeh salimi
somayeh salimi
Cygate/Telia
Verified email at kth.se - Homepage
Title
Cited by
Cited by
Year
New attacks on UMTS network access
Z Ahmadian, S Salimi, A Salahi
2009 Wireless Telecommunications Symposium, 1-6, 2009
422009
Private Identification, Authentication and Key Agreement Protocol with Security Mode Setup.
F Farhat, S Salimi, A Salahi
IACR Cryptol. ePrint Arch. 2011, 45, 2011
292011
Anonymous roaming in universal mobile telecommunication system mobile networks
M Fatemi, S Salimi, A Salahi
IET information security 4 (2), 93-103, 2010
192010
Cognitive interference channel with two confidential messages
HG Bafghi, S Salimi, B Seyfe, MR Aref
2010 International Symposium On Information Theory & Its Applications, 952-956, 2010
182010
An extended authentication and key agreement protocol of UMTS
F Farhat, S Salimi, A Salahi
International Conference on Information Security Practice and Experience …, 2009
182009
Security enhancements against UMTS–GSM interworking attacks
Z Ahmadian, S Salimi, A Salahi
Computer Networks 54 (13), 2256-2270, 2010
162010
Key agreement over multiple access channel
S Salimi, M Salmasizadeh, MR Aref, JD Golic
IEEE Transactions on Information Forensics and Security 6 (3), 775-790, 2011
152011
Key agreement over a generalized multiple access channel using noiseless and noisy feedback
S Salimi, M Skoglund, JD Golic, M Salmasizadeh, MR Aref
IEEE Journal on Selected Areas in Communications 31 (9), 1765-1778, 2013
142013
Rate regions of secret key sharing in a new source model
S Salimi, M Salmasizadeh, MR Aref
IET communications 5 (4), 443-455, 2011
142011
The CEO problem with secrecy constraints
MS F Naghibi, S Salimi
Information Forensics and Security, IEEE Transactions on 10 (6), 1234-1249, 2015
12*2015
The CEO problem with secrecy constraints
F Naghibi, S Salimi, M Skoglund
IEEE Transactions on Information Forensics and Security 10 (6), 1234-1249, 2015
122015
Finite-SNR regime analysis of the Gaussian wiretap multiple-access channel
P Babaheidarian, S Salimi, P Papadimitratos
2015 53rd Annual Allerton Conference on Communication, Control, and …, 2015
112015
Secure partial repair in wireless caching networks with broadcast channels
M Gerami, M Xiao, S Salimi, M Skoglund
2015 IEEE Conference on Communications and Network Security (CNS), 353-360, 2015
82015
Secure partial repair in wireless caching networks with broadcast channels
M Gerami, M Xiao, S Salimi, M Skoglund
2015 IEEE Conference on Communications and Network Security (CNS), 353-360, 2015
82015
Compute-and-forward can buy secrecy cheap
P Babaheidarian, S Salimi
2015 IEEE International Symposium on Information Theory (ISIT), 2475-2479, 2015
82015
Key agreement over multiple access channel using feedback channel
S Salimi, M Salmasizadeh, MR Aref
2011 IEEE International Symposium on Information Theory Proceedings, 1970-1974, 2011
82011
Secret key agreement using correlated sources over the generalized multiple access channel
S Salimi, M Skoglund
2012 IEEE Information Theory Workshop, 467-471, 2012
72012
Secret key sharing in a new source model: Rate regions
S Salimi, M Salmasizadeh, MR Aref
2010 Australian Communications Theory Workshop (AusCTW), 117-122, 2010
72010
Simultaneously generating multiple keys in a four-terminal network
P Babaheidarian, S Salimi, MR Aref
IET Information Security 6 (3), 190-201, 2012
62012
Security in the gaussian interference channel: Weak and moderately weak interference regimes
P Babaheidarian, S Salimi, P Papadimitratos
2016 IEEE International Symposium on Information Theory (ISIT), 2434-2438, 2016
52016
The system can't perform the operation now. Try again later.
Articles 1–20