Author = Haj seyed javadi, Seyed hamid
Fuzzy Identity Based Encryption with a flexible threshold value

Volume 10, Issue 2, July 2021, Pages 182-195

10.22070/jce.2023.16933.1226

Sedigheh Khajouei-Nejad; Sam Jabbehdari; Hamid Haj Seyyed Javadi; Seyed Mohammad Hossein Moattar


The Evolutionary Game-Based Dynamics of Sybil Attack Prevention in WSN

Volume 10, Issue 2, July 2021, Pages 205-219

10.22070/jce.2023.17301.1235

Azadeh Navaei Tourani; Seyed hamid Haj seyed javadi; Hamidreza Navidi Ghaziani; Arash sharifi


Survey of Effective of Combinatorial Design Schemes in Wireless Sensor Networks Security

Volume 9, Issue 2, July 2020, Pages 271-282

10.22070/jce.2021.14655.1189

Nafiseh Masaeli; Hamid Haj Seyyed Javadi; Seyed Hossein Erfani


A Deterministic Multiple Key Space Scheme for Wireless Sensor Networks via Combinatorial Designs

Volume 6, Issue 1, January 2017, Pages 53-70

10.22070/jce.2017.2406.1046

Ibrahim Qasemzadeh Kolagar; hamid haj seyyed javadi; Shahriar Bijani


Sink Location Service Based on Fano Plane in Wireless Sensor Networks

Volume 5, Issue 1, January 2016, Pages 14-23

10.22070/jce.2016.388

Parisa Daneshjoo; Hamid Haj Seyed javadi; Hamid Reza Sharifi


3D Path Planning Algorithm for Mobile Anchor-Assisted Positioning in Wireless Sensor Networks

Volume 4, Issue 2, December 2015, Pages 86-99

10.22070/jce.2015.338

Hamid Reza Sharifi; Hamid Haj Seyyed Javadi