Why We Share

We are committed to the principles of open and free research and value collaborative efforts very much. Knowledge has no borders no one has the right to put any border for it by making excuses. Honestly, we take no shit like that from anyone. We strive to make the world a better place to live, for everybody. Please use the contact us link to get to us.

What We Share

We share our findings, presentations, papers, datasets or codes, subject to the copyright laws. We value collaboration a lot, and this means we like to be a part of any research you do which is aligned with our interests.

under construction

Selected Refereed Papers

[1] M. Sayad Haghighi; S. Wen; Y. Xiang; B. Quinn; W. Zhou, "On the Race of Worms and Patches: Modeling the Spread of Information in Wireless Sensor Networks," in IEEE Transactions on Information Forensics and Security , in print, 2016.

[2] A. Mohammadali, M. Sayad Haghighi, M. H. Tadayon, A. Mohammadi, "A Novel Identity-based Key Establishment Scheme for Advanced Metering Infrastructure in Smart Grid", in IEEE Transactions on Smart Grid, in print, 2016.

[3] A. Arabsorkhi, M. Sayad Haghighi, R. Ghorbanloo, "A Trust Framework for Internet of Things Interactions," in International Symposium on Telecommunications, to appear, 2016. [pdf]

[4] M. Sayad Haghighi, Y. Xiang, V. Varadharajan, B. Quinn, "A Stochastic Time-domain Model for Burst Data Aggregation in IEEE 802.15.4 Wireless Sensor Networks", in IEEE Transactions on Computers, 2015.

[5] S. Wen, M. Sayad Haghighi, C. Chen, Y. Xiang, W. Zhou and W. Jia, "A Sword with Two Edges: Propagation Studies on Both Positive and Negative Information in Online Social Networks," in IEEE Transactions on Computers, vol. 64, no. 3, 2015.

[6] M. H. Tadayon, H. Khanmohammadi, M. Sayad Haghighi, "Dynamic and verifiable multi-secret sharing scheme based on Hermite interpolation and bilinear maps," in IET Information Security, vol. 9, no. 4, 2015.

[7] M. Sayad Haghighi, K. Mohamedpour, V. Varadharajan, B. Quinn, "Stochastic Modeling of Hello Flooding Attack in Slotted CSMA/CA Wireless Sensor Networks", in IEEE Transactions on Information Forensics and Security, 2011.