


Остановите войну!
for scientists:


default search action
Mohammad Heydari
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j13]M. Tafakkori-Bafghi
, Ghasem Barid Loghmani, Mohammad Heydari
:
Numerical solution of two-point nonlinear boundary value problems via Legendre-Picard iteration method. Math. Comput. Simul. 199: 133-159 (2022) - [j12]Z. Nikooeinejad, Mohammad Heydari
, Ghasem Barid Loghmani:
A numerical iterative method for solving two-point BVPs in infinite-horizon nonzero-sum differential games: Economic applications. Math. Comput. Simul. 200: 404-427 (2022) - [c7]Mohammad Heydari, Haralambos Mouratidis, Vahid Heydari Fami Tafreshi:
OntoCyrene: Towards Ontology-Enhanced Asset Modelling for Supply Chains in the Context of Cyber Security. CyberICPS/SECPRE/SPOSE/CPS4CIP/CDT&SECOMAN/EIS/SecAssure@ESORICS 2022: 157-176 - [c6]Ndoricimpa Siméon, Xiaoyang Li, Mohammad Heydari:
Effects of Rural Habitat Distribution and Farm Size on Food Production Index Growth in Sub-Saharan African Region: A Case of East Africa Countries. HAICTA 2022: 404-414 - [c5]Mohammad Heydari, Hamed Benisi Ghadim, Mohammad Salarian:
Prediction of Maximum Temperatures by Time Series and Artificial Neural Networks (Case Study: Isfahan Station). IICAIET 2022: 1-6 - 2021
- [j11]Tayebeh Dehghan Niri, Mohammad Heydari, Mohammad-Mehdi Hosseini:
An improvement of adaptive cubic regularization method for unconstrained optimization problems. Int. J. Comput. Math. 98(2): 271-287 (2021) - 2020
- [b1]Mohammad Heydari:
Indeterminacy-aware prediction model for authentication in IoT. Bournemouth University, Poole, UK, 2020 - [j10]Mohammad Heydari, Alexios Mylonas
, Vahid Heydari Fami Tafreshi, Elhadj Benkhelifa, Surjit Singh
:
Known unknowns: Indeterminacy in authentication in IoT. Future Gener. Comput. Syst. 111: 278-287 (2020) - [j9]Tayebeh Dehghan Niri, Mohammad Heydari, M. M. Hosseini:
Correction of trust region method with a new modified Newton method. Int. J. Comput. Math. 97(5): 1118-1132 (2020) - [j8]M. Ahmadinia
, H. Afshari A., Mohammad Heydari:
Numerical solution of Itô-Volterra integral equation by least squares method. Numer. Algorithms 84(2): 591-602 (2020) - [i1]Mohammad Heydari, Babak Teimourpour:
Analysis of ResearchGate, A Community Detection Approach. CoRR abs/2003.05591 (2020)
2010 – 2019
- 2019
- [j7]Z. Nikooeinejad, Mohammad Heydari:
Nash equilibrium approximation of some class of stochastic differential games: A combined Chebyshev spectral collocation method with policy iteration. J. Comput. Appl. Math. 362: 41-54 (2019) - [c4]Mohammad Heydari, Alexios Mylonas
, Vasilis Katos, Emili Balaguer-Ballester, Amna Altaf, Vahid Heydari Fami Tafreshi:
Uncertainty-Aware Authentication Model for IoT. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 224-237 - [c3]Mohammad Heydari, Alexios Mylonas
, Vasilios Katos, Emili Balaguer-Ballester, Vahid Heydari Fami Tafreshi, Elhadj Benkhelifa:
Uncertainty-Aware Authentication Model for Fog Computing in IoT. FMEC 2019: 52-59 - [c2]Mohammad Heydari, Alexios Mylonas
, Vasilios Katos, Emili Balaguer-Ballester, Vahid Heydari Fami Tafreshi, Elhadj Benkhelifa:
A Location-Aware Authentication Model to Handle Uncertainty in IoT. IoTSMS 2019: 43-50 - [p1]Mohammad Heydari, Alexios Mylonas, Vasileios Katos, Dimitris Gritzalis:
Towards Indeterminacy-Tolerant Access Control in IoT. Handbook of Big Data and IoT Security 2019: 53-71 - 2018
- [j6]Z. Nikooeinejad, Ali Delavarkhalafi, Mohammad Heydari:
Application of shifted Jacobi pseudospectral method for solving (in)finite-horizon min-max optimal control problems with uncertainty. Int. J. Control 91(3): 725-739 (2018) - 2017
- [j5]Mohammad Sabzinejad Farash
, Shehzad Ashraf Chaudhry
, Mohammad Heydari, Seyed Mohammad Sajad Sadough
, Saru Kumari
, Muhammad Khurram Khan
:
A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security. Int. J. Commun. Syst. 30(4) (2017) - [j4]Mohammad Heydari, Seyed Mohammad Sajad Sadough
, Shehzad Ashraf Chaudhry
, Mohammad Sabzinejad Farash
, Khalid Mahmood:
An improved one-to-many authentication scheme based on bilinear pairings with provable security for mobile pay-TV systems. Multim. Tools Appl. 76(12): 14225-14245 (2017) - [c1]Antonia Nisioti, Mohammad Heydari, Alexios Mylonas
, Vasilios Katos, Vahid Heydari Fami Tafreshi
:
TRAWL: Protection against rogue sites for the masses. RCIS 2017: 120-127 - 2016
- [j3]Z. Nikooeinejad, Ali Delavarkhalafi, Mohammad Heydari:
A numerical solution of open-loop Nash equilibrium in nonlinear differential games based on Chebyshev pseudospectral method. J. Comput. Appl. Math. 300: 369-384 (2016) - [j2]Mohammad Heydari, Seyed Mohammad Sajad Sadough
, Mohammad Sabzinejad Farash
, Shehzad Ashraf Chaudhry
, Khalid Mahmood:
An Efficient Password-Based Authenticated Key Exchange Protocol with Provable Security for Mobile Client-Client Networks. Wirel. Pers. Commun. 88(2): 337-356 (2016) - 2015
- [j1]Mohammad Heydari, Seyed Mohammad Sajad Sadough
, Shehzad Ashraf Chaudhry
, Mohammad Sabzinejad Farash
, Mohammad Reza Aref:
An Improved Authentication Scheme for Electronic Payment Systems in Global Mobility Networks. Inf. Technol. Control. 44(4): 387-403 (2015)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-03-14 16:12 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint