#### Filter Results:

- Full text PDF available (13)

#### Publication Year

2006

2015

- This year (0)
- Last 5 years (13)
- Last 10 years (24)

#### Publication Type

#### Co-author

#### Journals and Conferences

#### Key Phrases

Learn More

- Hadi Ahmadi, Taraneh Eghlidos
- IET Information Security
- 2009

- Amir Faraz Ghasemi, Hamid Kermanshah, +5 authors Hadi Ahmadi
- The journal of adhesive dentistry
- 2014

PURPOSE
To evaluate the effect of Er,Cr:YSGG laser treatment on microshear bond strength of zirconia to resin cement before and after sintering.
MATERIALS AND METHODS
Ninety pre-sintered yttrium-stabilized tetragonal zirconia specimens (4 × 3 × 2 mm) were divided into 6 groups (n = 15). In group C, sintered zirconia was not treated (control group). In… (More)

- Hadi Ahmadi, Reihaneh Safavi-Naini
- IACR Cryptology ePrint Archive
- 2011

We study the problem of unconditionally secure Secret Key Establishment (SKE) when Alice and Bob are connected by two noisy channels that are eavesdropped by Eve. We consider the case that Alice and Bob do not have any sources of initial randomness at their disposal. We start by discussing special cases of interest where SKE is impossible and then provide a… (More)

- Ghazal Ansari, Mojtaba Mojtahedzadeh, +6 authors Mohammad Abdollahi
- Advances in therapy
- 2008

INTRODUCTION
Recent investigations have revealed that control of hyperglycaemia with insulin improves outcomes. The cornerstone of hyperglycaemia in critically ill patients is insulin resistance and it remains refractory to intensive insulin protocols. We designed this study to evaluate the efficacy and safety of a new intensive insulin therapy (IIT)… (More)

- Mohammad Ali Saghiri, Franklin García-Godoy, James Leo Gutmann, Mehrdad Lotfi, Armen Asatourian, Hadi Ahmadi
- Dental traumatology : official publication of…
- 2013

INTRODUCTION
To analyze the push-out bond strength of Angelus WMTA (Angelus Dental Products), a nano-modification of WMTA (Kamal Asgar Research Center) and Bioaggregate (Innovative Bioceramix).
METHODS
Sixty 2-mm-thick root sections were prepared from 60 single-rooted human teeth. The dentin disks were randomly divided into three groups (n = 20) and… (More)

- Yingxu Wang, Cyprian F. Ngolah, Hadi Ahmadi, Phillip C.-Y. Sheu, Shi Ying
- IJSSCI
- 2009

A Lift Dispatching System (LDS) is a typical real-time system that is highly complicated in design and implementation. This article presents the formal design, specification, and modeling of the LDS system using a denotational mathematics known as Real-Time Process Algebra (RTPA). The conceptual model of the LDS system is introduced as the initial… (More)

- Hadi Ahmadi, Reihaneh Safavi-Naini
- ICITS
- 2013

We investigate the problem of algebraic manipulation detection (AMD) over a communication channel that partially leaks information to an adversary. We assume the adversary is computationally unbounded and there is no shared key or correlated randomness between the sender and the receiver. We introduce leakage-resilient (LR)-AMD codes to detect algebraic… (More)

- Yukiyasu Tsunoo, Teruo Saito, +4 authors Shahram Khazaei

This paper describes the attack on SOSEMANUK, one of the stream ciphers proposed at eSTREAM (the ECRYPT Stream Cipher Project) in 2005. The cipher features the variable secret key length from 128-bit up to 256-bit and 128-bit initial vector. The basic operation of the cipher is performed in a unit of 32 bits i.e. “word”, and each word generates keystream.… (More)

- Hadi Ahmadi, Reihaneh Safavi-Naini
- 2010 International Symposium On Information…
- 2010

We consider the problem of secret key establishment (SKE) in the presence of a passive adversary, Eve, when Alice and Bob are connected by a pair of independent discrete memoryless broadcast channels in opposite directions. We refer to this setup as 2DMBC. We define the secret-key capacity in this setup and provide a lower bound on the capacity by proposing… (More)

- Hadi Ahmadi, Reihaneh Safavi-Naini
- ArXiv
- 2013

We consider the problem of distance bounding verification (DBV), where a proving party claims a distance and a verifying party ensures that the prover is within the claimed distance. Current approaches to “secure” distance estimation use signal’s time of flight, which requires the verifier to have an accurate clock. We study secure DBV using physical… (More)