• Publications
  • Influence
An Improvement over a Server-less RFID Authentication Protocol
TLDR
In this paper we analyze the security of a server-less RFID authentication protocol which is proposed by Deng et al. and show that their protocol is still vulnerable against data desynchronization attack. Expand
A SOLUTION TO THE SURPRISE EXAM PARADOX IN CONSTRUCTIVE MATHEMATICS
TLDR
We represent the well-known surprise exam paradox in constructive and computable mathematics and offer solutions. Expand
Borda paradox in the 2017 Iranian presidential election: empirical evidence from opinion polls
Different voting paradoxes identified by social choice theorists have rarely been documented in real-world elections. The collected data from the opinion polls in the 2017 Iranian presidentialExpand
Decidability and Specker sequences in intuitionistic mathematics
TLDR
We propose a schema (which we call ED) about intuitionistic decidability that asserts that the existence of a Specker sequence is equivalent to ED. Expand
The double negation of the intermediate value theorem
TLDR
We introduce the notion of strong Specker double sequence, and prove that the existence of such a double sequence is equivalent to a function ϕ ∈ F m o n where ¬ ∃ x ∈ [ 0 , 1 ] ( ϕ ( x ) = 1 2 ) . Expand
Diffusion of innovations over multiplex social networks
TLDR
We address the problem of diffusion of innovations over multiplex social networks where the neighbours of a person belong to one or multiple networks (or layers) such as friends, families, or colleagues. Expand
Coverage improvement in femtocell networks via efficient utility pricing
TLDR
We propose a framework to motivate femtocells to share their free resources with MUs to improve their coverage probability through a bargaining game. Expand
A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving
TLDR
We investigate Scyther operational semantics as n example of this approach and then we model and verify some famous security protocols using Scyther . Expand
A Hypercomputation in Brouwer's Constructivism
TLDR
We propose a hypercomputation called persistently evolutionary Turing machines based on Brouwer's notion of being constructive. Expand
...
1
2
3
4
...