Mahdavi, Mehregan A Distributed Method for Preventing Wormhole Attacks in Wireless Sensor Networks [Volume 8, Issue 2, 2011]
Mahdavi-Amiri, Nezam Finding All the Upper Boundary Points of a Stochastic-Flow Network with Budget Constraints [Volume 8, Issue 2, 2011]
Mahdisoltani, Farzane HiSeg: Unfolding of Segment Hierarchies in Color Images [Volume 8, Issue 2, 2011]
Masoumi, Masoud Protection of the AES Algorithm Against Differential Power Analysis by Using Randomization in Composite Fields [Volume 8, Issue 1, 2010]
Modiri, Nasser Surveying Some Roadmaps for Adoption Service Oriented Architecture [Volume 8, Issue 1, 2010]
Moeini, Ali Surveying Some Roadmaps for Adoption Service Oriented Architecture [Volume 8, Issue 1, 2010]
Mohades Khorasani, Ali The Illumination of Polygonal Regions with Modems [Volume 8, Issue 2, 2011]
Mojtaba Dehnavi, Seyed Protection of the AES Algorithm Against Differential Power Analysis by Using Randomization in Composite Fields [Volume 8, Issue 1, 2010]
Morteza Mirbostani, Seyed A Distributed Method for Preventing Wormhole Attacks in Wireless Sensor Networks [Volume 8, Issue 2, 2011]
Movaghar Rahimabadi, Ali Improving Tora Routing Protocol in MANETs using ANT Colony Algorithm [Volume 8, Issue 1, 2010]