Hoppa till huvudinnehållet
Till KTH:s startsida Till KTH:s startsida

Publications

Journal papers

10. Somayeh Salimi, Matthieu Bloch, Frederic Gabry, Mikael Skoglund, Panos Papadimitratos, “Strong Secrecy in Pairwise Key Agreement over a Generalized Multiple Access Channel,” to be submitted to IEEE Transactions on Information Theory.

9. F. Naghibi, S. Salimi, M. Skoglund, “The CEO Problem with Secrecy Constraints,” IEEE Transactions on Information Forensics and Security, vol. 10, Issue 6, pp. 1234-1249, Jun. 2015.

8. S. Salimi, M. Skoglund, Jovan Dj Golic, M. Salmasizadeh, M. R. Aref, “Key Agreement over a Generalized Multiple Access Channel Using Noiseless and Noisy Feedback,” IEEE Journal on Selected Areas in communications (J-SAC), vol. 31, no. 9, pp. 1765–1778, Sep. 2013.

7. P. Babaheidarian, S. Salimi, M. R. Aref, “Simultaneously Generating Multiple keys in a Four-Terminal Network,” IET Information Security, vol. 6, Issue. 3, pp. 190–201, Sep. 2012.

6. S. Salimi, M. Salmasizadeh, M. R. Aref, Jovan Dj Golic, “Key Agreement over Multiple Access Channel,” IEEE Transactions on Information Forensics and Security, vol. 6, Issue 3, pp. 775-790 Sep. 2011.

5. S. Salimi, M. Salmasizadeh, M. R. Aref, “Rate Regions of Secret Key Sharing in a New Source Model,” IET Communications, Vol. 5, Issue 4, pp. 443–455, March 2011

4. S. Salimi, M. Salmasizadeh, M. R. Aref, “Generalized Secure Distributed Source Coding with Side Information,” IET Communications, Vol. 4, Issue 18, pp. 2262 – 2272, December 2010

3. Z. Ahmadian, S. Salimi and A. Salahi, “Security Enhancement of UMTS-GSM Interworking Attacks”, Elsevier Journal of Computer Network, Jan. 2010, Vol. 54 , Issue 13 , pp. 2256-2270, September 2010.

2. M. Fatemi, S. Salimi and A. Salahi, “Anonymous Roaming in UMTS Mobile Networks”, IET information security, Vol. 4, Issue 2, pp. 93-103, June 2010.

1. F. Farhat, S. Salimi, A. Salahi, “Private Identification, Authentication and Key Agreement Protocol with Security Mode Setup”, IACR Cryptology ePrint Archive, Jan. 2011


Conference papers

29. P. Babaheidarian, S. Salimi, P. Papadimitratos, “Finite-SNR Regime Analysis of The Gaussian Wiretap Multiple-Access Channel” 53rd Annual Allerton Conference on Communication, Control, and Computing, Illinois, USA, Sep. 2015.

28. S. Salimi, E. Jorswieck, M. Skoglund, P. Papadimitratos, “Key Agreement over an Interference Channel with Noiseless Feedback: Achievable Region & Distributed Allocation,” IEEE CNS workshop on Physical-layer Methods for Wireless Security, Florence, Italy, Sep. 2015.

27. M. Gerami, M. Xiao, S. Salimi, M. Skoglund, “Secure Partial Repair in Wireless Caching Networks with Broadcast Channels,” IEEE Conference on Communications and Network Security (CNS), Florence, Italy, Sep. 2015.

26. P. Babaheidarian, S. Salimi, “Compute-and-Forward Can Buy Secrecy Cheap,” International Symposium of Information Theory (ISIT), Hong Kong, Jun. 2015.

25. F. Naghibi, S. Salimi, M. Skoglund, “On transmission of a remote source with secrecy constraints over noisy channels,” in proc. IEEE GlobalSIP (invited paper), Atlanta, Georgia, USA, Dec. 2014.

24. F. Naghibi, S. Salimi, M. Skoglund, “The CEO Problem with Secrecy Constraints,” in proc. International Symposium of Information Theory (ISIT), Hawaii, USA, Jul. 2014.

23. S. Salimi, F. Gabry, M. Skoglund, “Pairwise Key Agreement over a Generalized Multiple Access Channel: Capacity Bounds and Game-theoretic Analysis,” in proc. International Symposium on Wireless Communication Systems (ISWCS), Ilmenau, Germany, Aug. 2013.

22. Farshad Naghibi, Somayeh Salimi, Ragnar Thobaben, and Mikael Skoglund, “On Secure Lossless CEO Problem,” in proc. International Symposium on Wireless Communication Systems (ISWCS), Ilmenau, Germany, Aug. 2013.

21. Frederic Gabry, Somayeh Salimi, Ragnar Thobaben, Mikael Skoglund, “High SNR Performance of Amplify-and-Forward Relaying in Rayleigh Fading Wiretap Channels,” in proc. Iran Workshop on Communication and Information Theory, Tehran, Iran, May. 2013.

20. Farshad Naghibi, Ragnar Thobaben, Somayeh Salimi, Mikael Skoglund, “Layered LDPC Convolutional Codes for Compression of Correlated Sources under Adversarial Attacks,” in proc. International Symposium on Information Theory and its Applications (ISITA), Hawaii, USA, Oct. 2012.

19. S. Salimi, M. Skoglund, “Secret Key Agreement Using Correlated Sources over the Generalized Multiple Access Channel,” in proc. Information Theory Workshop (ITW), Lausanne, Switzerland, pp. 472-476, Sep. 2012.

18. S. Salimi, M. Skoglund, M. Salmasizadeh, M. R. Aref, “Pairwise Secret Key Agreement Using the Source Common Randomness,” in proc. The Ninth International Symposium on Wireless Communication Systems (ISWCS), Paris, France, pp. 751-755, Aug. 2012.

17. S. Salimi, M. Salmasizadeh, M. R. Aref, “Key Agreement over Multiple Access Channel Using Feedback Channel,” in proc. International Symposium of Information Theory (ISIT), Russia, Saint Petersburg, pp. 1936-1940, Aug. 2011.

16. P. Babaheidarian, S. Salimi, M. R. Aref, “A New Secret Key Agreement Scheme in a Four-Terminal Network,” in proc. The 2011 Canadian Workshop on Information Theory (CWIT 2011), Kelowna, Canada, pp. 151-154, May 2011

15. S. Salimi, M. Salmasizadeh, M. R. Aref, “Secret Key Rate Region of Multiple Access Channel Model,” in proc. International Symposium of Information Theory and Applications (ISITA), Taichung, Taiwan, pp. 197-202, Oct. 2010

14. A. Sonee, S. Salimi, M. Salmasizadeh, “Generalized Multiple-Access Relay Channel with Confidential Messages,” in proc. International Symposium of Information Theory and Applications (ISITA), Taichung, Taiwan, pp. 1024-1029, Oct. 2010

13. H. Bafghi, S. Salimi, B. Seyfe, M. R. Aref, “Cognitive Interference Channel with Two Confidential Messages,” in proc. International Symposium of Information Theory and Applications (ISITA), Taichung, Taiwan, pp. 952-956, Oct. 2010

12. S. Salimi, M. Salmasizadeh, M. R. Aref, “Secret Key Sharing in a New Source Model” in proc. IEEE Australian Communication Theory Workshop (AusCTW), Australia, Canberra, pp. 117-122, Feb. 2010.


11. V. Jahandideh, S. Salimi, M. Salmasizadeh, “Deterministic Multiple Access Wiretap Channel” in proc. IEEE International Conference on Information Theory and Information Security (ICITIS), China, pp. 998-1001, Dec. 2010.


10. H. Bafghi, S. Salimi, B. Seyfe, M. R. Aref, “Secrecy Rate Region in the Interference Channel with Common Information,” in proc. Workshop on Information Theoretic Methods in Science and Engineering (WITMSE2010), Tampere, Finland, Aug. 2010.

9. V. Jahandideh, S. Salimi, M. Salmasizadeh, “ Secrecy Capacity of Wiretap Channel for a New Scenario and Designing Code for Wiretap Channel”, in proc. 18th Iranian Conference on Electrical Engineering (ICEE2010), Isfahan, Iran, pp. 183-187, May 2010.

8. A. Sonee, S. Salimi, M. Salmasizadeh, “ A New Achievable Rate-Equivocation Region for the Relay-Eavesdropper Channel”, in proc. 18th Iranian Conference on Electrical Engineering (ICEE2010), Isfahan, Iran, pp. 188-193, May 2010.


7. S. Salimi, M. Salmasizadeh, M. R. Aref, “Generalized Secure Distributed Source Coding”, accepted at 6th International Workshop on Coding and Cryptography (WCC 2009).

6. R. Fouladi, S. Salimi, A. Salahi, “Analysis of an Adjacent 3G Network Corruption Influence on WLAN/3G Interworking Access” in proc. International Conference on Computational Aspects of Social Networks (CASoN), Salamanca, Spain, pp. 158-162, Oct. 2011.

5. Z. Ahmadian, S. Salimi, A. Salahi, “New Attacks on UMTS Network Access”, in Proc. IEEE 8th Annual Wireless Telecommunications Symposium (WTS 2009), Prague, Czech Republic, pp.1-6, April 2009.

4. F. Farhat, S. Salimi, A.Salahi, “An Extended Authentication and Key Agreement Protocol of UMTS”, The 5th international Security Practice and Experience Conference (ISPEC 2009), LNCS, vol. 5451, Xi'an, China: Springer-Verlag., pp. 230-244, April 2009.

3. M. Fatemi, S. Salimi and A. Salahi “Improved EndSec: A Practical Protocol for Securing Core Network Signaling in UMTS”, in proc. 6th International ISC Conference on Information Security and Cryptography (ISCISC2009), Isfahan, Iran, pp. 7-12, October 2009

2. R. Fouladi, S. Salimi, A. Salahi, “The Analysis of WLAN/3G Interworking Access Based on a Mobility Model” in proc. IEEE 4th International Conference on Computer Science and Education (ICCSE 2009), Nanning, China, pp. 333-338, July 2009.

1. R. Fouladi, S. Salimi, A. Salahi, “A Graph Based Security Dependency Analysis of Data Communication Networks to Their Topology” in proc. IEEE 4th International Conference on Computer Science and Education (ICCSE 2009), pp. 284-288, July 2009.


Profilbild av Somayeh Salimi

Portfolio