Journals

1- M. R. Aref, A. El-Gamal, “The Capacity of the Semi – Deterministic Relay Channel,” IEEE Trans on; Inf. Theory, Vol. 28, May 1982.

2- Y. Zakeri, M. R. Are, “Design Algorithms for Doppler and MTI Filters (Using Chebyshev Approximation),” Esteghlal Journal of Engineering No.9, March 1991.

3- G. Abed Hodtani, M. R. Aref, “Capacity Theorems for Relay Networks with Partial Feedback,” Amirkabir Journal of Science and Technology, Vol.4, No.16, winter 1991.

4- M. R. Aref,  Fackoor Yekta, “Interface Data Processing of RADAR,” Amirkabir Journal of Science and Technology, Vol. 5, No. 20, Spring 1992.

5- M. R. Aref, F. Hendesi, M. Omoomi, “A New Fast Data Encryption Algorithm (FDE),” Isteghlal Journal of Engg., No.11, Oct. 1992.

6- M. R. Aref, F. Hendesi, “New Exhaustive Search Attack to the DES,” Iranian Journal of Engg., Vol.4, No.24, Fall 1993.

7- M. R. Aref, M. Soliemanipou,  “The Capacity of Two Hopfield Network and A Practical Way To Increase Its Memory,” Memoirs Of the Faculty of Engineering University of Tehran, No. 53, Dec. 1993.

8- M. R. Aref, M. Berenjkoob, “A Fast Coding Algorithms For Vector Quantization,” Amirkabir Journal of Science and Technology, Vol. 6, No.24, Winter 1994.

9- M. Modarres-Hashemi, M. R. Aref, “The Linear Complexity of the Universal Logic Sequence,” Scientia Iranica, Vol.2, No.1, Spring 1995.

10- M. M. Nayebi, M. R. Aref, M. H. Bastani, “Detection of Coherent Radar Signals with Unknown Doppler Shift,” IEE Proc. Radar, Sonar, and Navigation Vol.143, No.2, April 1996.

11- Taban, M. R. Aref, Alavi, M. M. Nayebi, “A New Approach for Coherent Radar Detection in K- Dist. Interberence,” Scientia Iranica, Vol.5, No.1&2, Spring, 1998.

12- A. Sheykhi, M. M. Nayebi, M. R. Aref, “Adaptive Detection Algorithm for Radar Signal AR Interference,” IEE Proc. Radar, Sonar Navigation, Vol. 45, No.5, Oct. 1998.

13- A. Sheykhi, M. M. Nayebi, M. R. Aref, “Adaptive Detection Algorithms for Radar Signals in Auto-Regressive Interference,” IEE Proc. Radar, Sonar, and Navigation, Vol.145, No.5, Oct. 1998.

14- M. Dakhilalian, M. R. Aref, B. Sadeghian, M. M. Modarres-Hashemi, “A New Statistical Test Based on Linear Complexity Profile (LCP),” Amirkabir Journal of Science of Technology, Vol.11,   No. 42,  pp.67-73, Tehran, Iran, 1999..

15- G. Mirjalili, M. R. Aref, M. M. Nayebi, A. Kahrizi, “Adaptive Decision Fusion in Detection Networks,” Esteghlal Journal of Engg. Vol.19, No.1, Sept., 2000.

16- M. Berenjkoub, H. Saeedi, M. R. Aref, “The Kryptoknight Family of Protocols Evaluation and Enhancement,” Scientia Iranica, Vol.7, No.3&4, Fall 2000.

17- F. Ashtiani, J. A. Salehi, M. R. Aref,  “A New General and Flexible Model for CDMA Cellular Networks,” Scientia Iranica, 2002.

18- F. Ashtiani, J. A. Salehi, M. R. Aref, “Mobility Modeling and Analytical Solution for Spatial Traffic Distribution in Wireless Multimedia Networks,” IEEE JSAC-Vol.21-No.10, Dec. 2003.

19- F. Ashtiani, J. A. Salehi, M. R. Aref, “A Flexible Dynamic Traffic Model for Reverse Link CDMA Cellular Network,” IEEE Trans. Wireless Communication, Vol. 3, No .1, Jan 2004.

20- F. Ashtiani, J. A. Salehi, M. R. Aref, ” Performance Comparison of Admission control Policies for New Cells in Soft-Handoff Regions for CDMA Cellular Networks,” Scientia Iranica Vol. 11, No. 3, Summer 2004.

21- H. Rouhi, M. R. Aref, M. E. Kalantari, “Capacity Analysis for a CDMA Cellular System with Mixed Cell Sizes and Imperfect Power Control,” Scientia Iranica, Vol. 11, No .3, Summer 2004.

22- M. Derakhtian, A. A. Tadaion, M. M. Nayebi, M. R. Aref, “Detection of a Sinusoid Signal with Unknown Parameters Using Wavelets,” Proc. IEE Waveform, Diversity and Design, Nov.  2004.

23- A. Payandeh, M. Ahmadian, M.R. Aref, “A Secure Error-Resilient Lossless Source Coding Scheme Based On Punctured Turbo Codes” Iranian J. of Elec. & Comput. Engg. , Vol.5, No.1, Winter-Spring 2006.

24- A. Payandeh, M. Ahmadian, M.R. Aref, “Adaptive Secure Channel Coding Based on Punctured Turbo Codes,” IEE Proc. Communication, Vol.153, No.2, April 2006.

25- A. Payandeh, M. Ahmadian, M. R. Aref, “An Adaptive Secure Channel Coding  Scheme for Data Transmission Over the LEO Satellite Channel,” Scientica Iranica, Vol.13, No.4 , Oct. 2006 .

26- A. Tadaion, M. Derakhtian, S. Gazor, M. Nayebi, M.R. Aref, “Signal Activity Detection of PSK Signals,” IEEE Trans. on Comm., Vol. 54, No.8, Aug. 2006.

27- A. Tadaion, M. Derakhtian, S. Gazor, M.R. Aref, “A Fast Multiple Source Detection and Localization Array Signal Processing Algorithm Using ML Approach,” IEEE Trans. on Signal Processing , Vol.55 , No.5 , May 2007.

28- M. Derakhtian, A.A. Tadaion, M.M. Nayebi, M.R. Aref, “Detection of a Band-Limited Signal Using an Orthonormal Fully-Decimated Filter-Bankh,” Scientia Iranica, Vol. 14, No. 6, Dec. 2007, pp. 555-565.

29- M. R. Taban, M. R. Aref, “A New Approach for Coherent Radar Detection in Pseudo-Gaussian Interference,” Modarres S. R. Journal, No. 26, Winter 2007, pp. 31-44.

30- F. Haddadi, M.M. Nayebi, M.R. Aref, “On The Positive Definiteness of Polarity Coincidence Correlation Coefficient Matrix,” IEEE Signal Processing Letters, Vol. 15, No. 1, Jan. 2008, pp. 73-76.

31- B. Bahrak, M. R. Aref, “Impossible Differential Attack on 7-round AES-128,” IET J. on Information Security, Vol. 2, No. 2, Feb. 2008, pp. 28-32.

32- L. Ghabeli, M.R. Aref, “A New Achievable Rate and the Capacity of Some Classes of Multilevel Relay Network,” EURASIP Journal on Wireless Communications and Networking, doi: 10.1155/2008/135857, 2008.

33- A. A. Tadaion, M. Derakhtian, M.M. Nayebi, M.R. Aref, “GLR Detector for Coded Signals in Noise and Interference,” Scientia Iranica, Vol. 15, No. 2, March 2008, pp. 170-174.

34- L. Ghabeli, M R. Aref, “Symmetric Relaying Strategy for Two-Relay Networks,” IEEE Communications Letters, Vol. 12, No. 10, Oct. 2008, pp. 708-710.

35- L. Ghabeli, M.R. Aref, “Symmetric Relaying Based on Partial Decoding and the Capacity of a Class of Relay Networks,” IET Communications, Vol. 3, No. 1, Jan. 2009, pp. 151-159.

36- A. Sobhiafshar, T. Eghlidos, M.R. Aref, “Efficient Secure Channel Coding Based on Quasi-cyclic Low- density-Parity-check Codes,” IET Communications, Vol. 3, No. 2, Feb. 2009, pp. 279- 292.

37- F. Haddadi, M.M. Nayebi, M.R. Aref, “Direction-of-Arrival Estimation for Temporally Correlated Narrowband Signals,” IEEE Trans. on Signal Processing, Vol. 57, No. 2, Feb. 2009, pp. 600-610.

38- L. Ghabeli, M.R. Aref, “Comprehensive Partial Decoding Approach for Two-Level Relay Networks,” IET Communications, Vol. 3, No. 4, April 2009, pp. 585-596.

39- L. Ghabeli, M. R. Aref, “Symmetric Semideterministic Relay Networks With No Interference at the Relays,” in IEEE Trans. on Inf. Theory, Vol. 57, No. 9, 2011.

40- A. Farhadian, M. R. Aref,  “An Efficient Method for Simplifying and Approximating the S-Boxex Based on Power Functions,” IET Information Security, Vol. 3, No.3, June 2009, pp.114-118.

41- G. A. Hodtani, M.R. Aref, “A New Achievable Rate and A Certain Capacity Result for A Stochastic Two Relay Network with No Interference,” IET Communications, Vol. 3, No. 7, July 2009, pp. 1153- 1162.

42- G. A. Hodtani, M. R. Aref, “On the Devroye-Mitran-Tarokh Rate Region for the Cognitive Radio Channel,” IEEE Trans. on Wireless Communications, Vol. 8, No, pp. 3458- 3461, July 2009.

43- G. A. Hodtani, M. R. Aref, “Unified Approach to the Capacity of the Relay Channel,” IET Communications, Vol.3, No. 7, pp. 1208- 1215, July 2009.

44- S. Saleh Kalaibar, L. Ghabeli, M. R. Aref, “An Achievable Rate Region for Multiple-Access-Relay- Networks,” IET Communications, Vol. 4, No. 15, pp. 1792- 1798, 2010.

45- A. Payandeh, M. Ahmadian, M. R. Aref, “Source Coded Modulation for Discrete Sources With Memory,” Sharif Journal, No. 52, pp. 31-36, 2010.

46- F. Haddadi, M.M. Nayebi, M.R. Aref, “Statistical Performance Analysis of Detection of Signals by Information Theoretic Criteria,” IEEE Transactions on Signal Processing, Vol. 58, No. 1, pp.452-457, Jan 2010.

47- A. H. Salavati, B.H. Khalaj, P. Crespo, M.R. Aref, “Wireless QoSNC A Novel Approach to QoS-based Network Coding in Wireless Networksa,” J. of Communications and Networks, Vol.12, NO.1, pp. 86- 94, Jan 2010.

48- B. Akhbari, M. Mirmohseni, M. R. Aref, “Compress-and-Forward Strategy for Relay Channel with Causal and Non- Causal Channel State Information,” IET Communications, Vol. 4, No. 10, pp. 1174- 1186, Oct. 2010.

49- S. Saleh- Kalaibar, L. Ghabeli, M. R. Aref, “An Achievable Rate for Relay Networks Based on Compress-and-Forward Strategyn,” IEEE Communications Letters, Vol. 14, No.4, pp. 279- 281, April 2010.

50- S. Saleh- Kalaibar, L. Ghabeli,  M. R. Aref, “Achievable Rate Region for Broadcast-Relay Networks with Two Cooperative Relays,” IET Communications, Vol. 4, No.8,  pp.946- 955, Aug 2010.

51- B. Akhbari, M. Mirmohseni, M. R. Aref, “Compress- and- Forward Strategy for Relay Channel With Causal and Non-Causal Channel State Information,” IET Communications, Vol. 4, No. 10,  pp.1174- 1186, Oct 2010.

52- A. Sharifi, E. Mehrabi, T. Eghlidos, M. R. Aref, “Algebraic Attacks from a Groebner Basis Perspective,” International Journal of Algebra, Vol. 4, No. 10, pp. 447-459, Oct 2010.

53- S.Salimi, M. Salmasizadeh, M. R. Aref, “Generalized Secure Distributed Source Coding with Side Information,” IET Communications, Vol. 4, No. 18, pp. 2262- 2272, 2010.

54- L.Ghabeli, M. R. Aref, “Capacity of a Class of Relay Network with Orthogonal Component,” IET Communications, Vol. 4, No. 18, pp. 2181- 2186, 2010.

55- N. Rohani, Z. Noferesti, J. Mohajeri. M. R. Aref, “Guess and Determine Attack on Biviumnent,” Journal of Information Processing Systems, Vol. 7, No.1, pp. 151-156, Jan. 2011.

56- S. Salimi, M. Salmasizadeh, M. R. Aref,  “Rate Regions of Secret Key Sharing in a New Source Model,” IET Communications, Vol. 5, No. 4, pp. 443-455, 2011.

57- M. H. Yassaee, M. R. Aref, “Slepian-Wolf Coding Over Cooperative Relay Networksl,” IEEE Trans. on Inf. Theory, Vol. 57, No.6, pp. 3462- 3482, June 2011.

58- M. Mirmohseni, B. Akhbari, M. R. Aref, “On the Capacity of Interference Channel with Causal and Non-causal Generalized Feedback,” “IEEE Trans. on Info. Theory, Vol. 58, No.5, pp. 2813-2837, May 2012.

59- B. Akhbari, R. Khosravi, M. R. Aref, “Cooperative relay broadcast channels with partial causal state information,” IET Communications, Vol:5, No. 6, pp.760- 774, 2011.

60- S. Salimi, M. Salmasizadeh, M. R. Aref, “Key Agreement Over Multiple Access Channel,” IEEE Trans. on Info. Forensics and Security, Vol.6, No.3, pp.775-790, 2011.

61- A. Haghi, R. Khosravi, M. R. Aref, F. A. Marvasti, “The Capacity Region of p-Transmitter/q- Receiver Multiple-Access Channels with Common Information,” IEEE Trans. on Info. Theory, Vol.57, No.11, Nov.2011, pp. 7359-7376.

62- M. Mirmohseni, B. Akhbari, M. R. Aref, “Capacity Regions for Some Classes of Multiple Access-Cognitive Interference Channel,” EURASIP Journal on Wireless Communications and Networking, Nov. 2011.

63- M. Mirmohseni, B. Akhbari, M. R. Aref, “Compress-and-Forward Strategy for Cognitive Interference Channel with Unlimited Look-Ahead,” IEEE Communications Letters, Vol. 15, No.10, pp1068- 107, Oct. 2011.

64- R. Aghajani, R.Saadat, M.R.Aref, G.Mirjalili, “Symbol Error Rate Analysis and Power Allocation forIncremental- Selective Decode-and- Forward Cooperative Communications Over Fading Channels,” IET Communications, 2012.

65- P. Babaheidarian, S. Salimi, M. R. Aref, “Simultaneously Generating Multiple Keys in a Four- Terminal Network,” IET Info. Security, 2012.

66- S. Salehkalaibar, M. R. Aref, “On the Reliable Transmission of Correlated Sources Over Relay Channels,” IEEE Transaction on Information Theory, 2012.

67- J. Emadi, M. Zamani ghomi, M. R. Aref, “Multiple Access Channel with Correlated States and Cooperating Encoders,” IET Communications, 2012.

68- M. R. Alaghband, M. R. Aref, “Dynamic and Secure Key Management Model for Hierarchical Heterogeneous Sensor Networks with Mobile Nodes,” IET Information Security, 2012.

69- R. hooshmand, T. eghlidos, M. r. Aref, “Improving the Rao-Nam secret key cryptosystem using regular EDF-QC-LDPC codes,” ISeCure, 2012.

70- M. Mirmohseni, B. Akhbari, M.  R. Aref, “Three-User Cognitive Interference Channel Capacity Region with Strong Interference,” IET Communications, Vol. 6, No. 13, 2012.

71- M. Alagheband, M. R. Aref, “Unified Privacy Analysis of New-Found RFID Authentication Protocols,” Security and Communication Networks, 2012.

72- F. Farhat, A. Diyanat, S. Ghaemmaghami, M. R. Aref, “Eigenvalues-based LSB Steganalysis,” ISeCure, Vol. 4, No. 2, pp. 97-106, 2012.

73- Z. Ahmadian, M. Salmasi zadeh, M. R. Aref, “Desynchronization Attack on RAPP Ultralightweight Authentication Protocols,” Information Processing Letters, Vol. 113, No. 7, pp. 205-209, 2013.

74- Z. Ahmadian, M. Salmasi zadeh, M. R. Aref, “Recursive Linear and Differential Cryptanalysis of Ultralightweight Authentication Protocols,” IEEE Transaction on Information Forensics and Security, Vol. 8, No. 7, July 2013.

75- S. Salimi, Mikael Skoglund, Jovan Dj Golic, M. Salmasi zadeh, M. R. Aref, “Key Agreement over a Generalized Multiple Access Channel Using Noiseless and Noisy Feedback,” IEEE Journal on Selected Areas in Communications, Vol. 31, No. 9, Sept. 2013.

76- R. Aghajani, R. Saadat, M. R. Aref, “Power Allocation and Performance Analysis for Incremental- Selective Decode-and-Forward Cooperative Communications over Nakagami-m Fading Channels,” IEICE Trans. Commun, Vol. E96-B, No. 6, Jun. 2013.

77- S. Saleh-Kalaibar, M. Mirmohseni, M. R. Aref, “One-Receiver, Two-Eavesdropper Broadcast Channel with Degraded Message Sets,” IEEE Transactions on Information Forensics and Security, Vol. 8, No. 7, 2013, pp. 1162-1172.

78- M. Barmshory, M. R. Rahimi, M. Mansouri, M. R. Aref, “Dynamic Cube Attack on Grain-v1 ,” IET Information Security, 2013.

79- H. Sedghi, M. R. Pakravan, M. R. Aref, “A Misbehavior-Tolerant Multipath Routing Protocol for Wireless Ad hoc Networks,” International Journal of Wireless Information Networks, Vol.2, No. 2, pp.6-15, 2013.

80- M. Emadi، A Gholamii، M. R. Aref, “Analytical Power Allocation for a Full Duplex Decode-and-Forward Relay Channel,” IET Communications, Vol. 7, No. 13, pp. 1338-1347,  2013.

81- M. R. Alagheband, M. R. Aref, “Simulation-based Traceability Analysis of RFID Authentication Protocols,” Wireless Personal Communications, vol.77, no.2, pp. 1038-1019, 2014.

82- M. Bayat, M. R. Aref, “An Attribute Based Tripartite Key Agreement Protocol,” International Journal of Communication Systems, 2014.

83- S. Salehkalaibar , M. R. Aref, “Physical layer security for some classes of three-receiver broadcast channels,” IET Communications, Vol. 8, No.11, 2014.

84- Yassaee, M.R. Aref, A.Aminzadeh, “Achievability Proof via Output Statistics of Random Binning,” IEEE Transactions on Information Theory, 2014.

85- S. Ahmadi, Z. Ahmadian, J. Mohajeri, M. R. Aref, ” Biclique Cryptanalysis of Block Ciphers LBlock and TWINE with Practical Data Complexity,” Journal of Systems and Software, 2014.

86- M. Bayat, M. Pournaghi, M. Barmshoory, M. Rahimi, M. Gardeshi, M. R. Aref, “NERA: A Novel and Efficient RSU Based Authentication Scheme for VANETs,” Security and Communication Networks, 2014.

87- M. Bayat, H. R. Arkian, M. R. Aref, “A Revocable Attribute Based Data Sharing Scheme Resilient to DoS Attacks in Smart Grid,” Wireless Netwoks, 2014.

88- N. Ardalani, M. Mirmohseni, M. R. Aref, “Three-User Interference Channel with Common Information: A Rate Splitting Based Achievability Scheme,” IET Communications, 2014.

89- M. Fatemi, R. Ghasemi, T. Eghlidos, M. R. Aref, “Efficient multistage secret sharing scheme using bilinear map,” IET Information Security, 2014.

90- M. Ehdaie, N. Alexiou z, Mahmoud Atari, M. R. Aref, P. Papadimitratos, ” Key splitting: making random key distribution schemes resistant against node capture,” Security and Communication Networks, 2014.

91- M. J. Emadi, M. Nasiri Khormuji, M. Skoglund, M. R. Aref, “Multi-layer Gelfand-Pinsker Strategies for the Generalized Multiple-Access Channel,” IET Communications, 2014.

92- M. H. Yassaee, A. Gohari, M. R. Aref, “Channel Simulation via Interactive Communications,” IEEE Transactions on Information Theory, 2014.

93- H. Ghasemzadeh, A. payandeh, M. R. Aref, “Toward an Energy Efficient PKC-Based Key Management System for WSNs,” ISeCure, 2014.

94- S. Ahmadi, Z. Ahmadian, J. Mohajeri, M. R. Aref, “Low Data Complexity Biclique Cryptanalysis of Block Ciphers with Application to Piccolo and HIGHT,” IEEE Transactions on Information Forensics and Security, Vol.9, Issue 10, pp. 1641-1652, 2014.

95- H. Bafghi, B. Seyfe, M. Mirmohseni, M. R. Aref, “Capacity of Channel with Energy Harvesting Transmitter,” to appear in IET Communications.

96- S. Salehkalaibar, M. R. Aref, “Lossy Transmission of Correlated Sources over Multiple-Access Wiretap Channels,” IET Communications, pp. 1-17, 2014.

97- Z. Ahmadian, M. Salmasizadeh, M. R. Aref, ” Biclique Cryptanalysis of the Full-Round KLEIN Block Cipher,” to appear in IET Information Security.

98- J. Alizadeh, M. R. Aref, N. Bagheri, “Artemia: A Family of Provably Secure Authenticated Encryption Schemes,” to appear in ISeCure.