I agree that this site is using cookies. You can find further informations
here
.
X
Login
My folder (
0
)
Home
About us
Home About us
Our history
Profile
Press & public relations
Friends
The library in figures
Exhibitions
Projects
Training, internships, careers
Films
Services & Information
Home Services & Information
Lending and interlibrary loans
Returns and renewals
Training and library tours
My Account
Library cards
New to the library?
Download Information
Opening hours
Learning spaces
PC, WLAN, copy, scan and print
Catalogs and collections
Home Catalogs and Collections
Rare books and manuscripts
Digital collections
Subject Areas
Our sites
Home Our sites
Central Library
Law Library (Juridicum)
BB Business and Economics (BB11)
BB Physics and Electrical Engineering
TB Engineering and Social Sciences
TB Economics and Nautical Sciences
TB Music
TB Art & Design
TB Bremerhaven
Contact the library
Home Contact the library
Staff Directory
Open access & publishing
Home Open access & publishing
Reference management: Citavi & RefWorks
Publishing documents
Open Access in Bremen
Show Desktop-Version
Toggle navigation
Ahmed, Omed Hassan
94
results:
Online X
Search for persons
X
Format
Online (94)
Mediatypes
Articles (Online) (64)
Bookchapter (Online) (1)
OpenAccess-fulltext (29)
Sorted by: Relevance
Sorted by: Year
?
1
An Enhanced Authentication Protocol Suitable for Constraine..:
Hosseinzadeh, Mehdi
;
Servati, Mohammad Reza
;
Rahmani, Amir Masoud
...
IEEE Access. 12 (2024) - p. 61610-61628 , 2024
Link:
https://doi.org/10.1109/..
?
2
A novel Q-learning-based secure routing scheme with a robus..:
Hosseinzadeh, Mehdi
;
Ali, Saqib
;
Jawad Ahmad, Husham
...
Vehicular Communications. 49 (2024) - p. 100826 , 2024
Link:
https://doi.org/10.1016/..
?
3
A cluster-based trusted routing method using fire hawk opti..:
Hosseinzadeh, Mehdi
;
Yoo, Joon
;
Ali, Saqib
...
Scientific Reports. 13 (2023) 1 - p. , 2023
Link:
https://doi.org/10.1038/..
?
4
A fuzzy logic-based secure hierarchical routing scheme usin..:
Hosseinzadeh, Mehdi
;
Yoo, Joon
;
Ali, Saqib
...
Scientific Reports. 13 (2023) 1 - p. , 2023
Link:
https://doi.org/10.1038/..
?
5
A novel fuzzy trust-based secure routing scheme in flying a..:
Hosseinzadeh, Mehdi
;
Mohammed, Adil Hussein
;
Alenizi, Farhan A.
...
Vehicular Communications. 44 (2023) - p. 100665 , 2023
Link:
https://doi.org/10.1016/..
?
6
Task Scheduling Mechanisms for Fog Computing: A Systematic ..:
Hosseinzadeh, Mehdi
;
Azhir, Elham
;
Lansky, Jan
...
IEEE Access. , 2023
Link:
https://doi.org/10.1109/..
?
7
Designing secure PUF-based authentication protocols for con..:
Lee, Sang-Woong
;
Safkhani, Masoumeh
;
Le, Quynh
...
Scientific Reports. 13 (2023) 1 - p. , 2023
Link:
https://doi.org/10.1038/..
?
8
A secure routing approach based on league championship algo..:
Hosseinzadeh, Mehdi
;
Mohammed, Adil Hussein
;
Rahmani, Amir Masoud
...
PLOS ONE. 18 (2023) 10 - p. e0290119 , 2023
Link:
https://doi.org/10.1371/..
?
9
Design and simulation of Full-Subtractor based on Quantum-D..:
Hosseinzadeh, Mehdi
;
Hussain, Dildar
;
Azimi, Nemat
...
AEU - International Journal of Electronics and Communications. 171 (2023) - p. 154927 , 2023
Link:
https://doi.org/10.1016/..
?
10
A cluster-tree-based trusted routing algorithm using Grassh..:
Hosseinzadeh, Mehdi
;
Ahmed, Omed Hassan
;
Lansky, Jan
...
PLOS ONE. 18 (2023) 9 - p. e0289173 , 2023
Link:
https://doi.org/10.1371/..
?
11
A greedy perimeter stateless routing method based on a posi..:
Hosseinzadeh, Mehdi
;
Tanveer, Jawad
;
Ionescu-Feleaga, Liliana
...
Journal of King Saud University - Computer and Information Sciences. 35 (2023) 8 - p. 101712 , 2023
Link:
https://doi.org/10.1016/..
?
12
A novel Q-learning-based routing scheme using an intelligen..:
Hosseinzadeh, Mehdi
;
Ali, Saqib
;
Ionescu-Feleaga, Liliana
...
Journal of King Saud University - Computer and Information Sciences. 35 (2023) 10 - p. 101817 , 2023
Link:
https://doi.org/10.1016/..
?
13
SecAODV: A Secure Healthcare Routing Scheme Based on Hybrid..:
Jeong, Heon
;
Lee, Sang-Woong
;
Hussain Malik, Mazhar
...
Frontiers in Medicine. 9 (2022) - p. , 2022
Link:
https://doi.org/10.3389/..
?
14
Cryptanalysis of Two Recent Ultra-Lightweight Authenticatio..:
Servati, Mohammad Reza
;
Safkhani, Masoumeh
;
Ali, Saqib
...
Mathematics. 10 (2022) 23 - p. 4611 , 2022
Link:
https://doi.org/10.3390/..
?
15
A Q-Learning and Fuzzy Logic-Based Hierarchical Routing Sch..:
Rahmani, Amir Masoud
;
Naqvi, Rizwan Ali
;
Yousefpoor, Efat
...
Mathematics. 10 (2022) 22 - p. 4192 , 2022
Link:
https://doi.org/10.3390/..
1-15