Hamed Arshad

Orcid: 0000-0003-3885-7408

According to our database1, Hamed Arshad authored at least 18 papers between 2014 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
XACML2mCRL2: Automatic transformation of XACML policies into mCRL2 specifications.
Sci. Comput. Program., January, 2024

2023
Attribute-based encryption with enforceable obligations.
J. Cryptogr. Eng., September, 2023

2022
Semantic Attribute-Based Access Control: A review on current status and future perspectives.
J. Syst. Archit., 2022

Semantic Attribute-Based Encryption: A framework for combining ABE schemes with semantic technologies.
Inf. Sci., 2022

Process Algebra Can Save Lives: Static Analysis of XACML Access Control Policies Using mCRL2.
Proceedings of the Formal Techniques for Distributed Objects, Components, and Systems, 2022

2021
The Snowden Phone: A Comparative Survey of Secure Instant Messaging Mobile Applications.
Secur. Commun. Networks, 2021

2019
Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme.
Future Gener. Comput. Syst., 2019

2018
The Snowden Phone: A Comparative Survey of Secure Instant Messaging Mobile Applications (authors' version).
CoRR, 2018

2017
An Improved SIP Authentication Scheme Based on Server-Oriented Biometric Verification.
Wirel. Pers. Commun., 2017

A lightweight authentication and key agreement protocol preserving user anonymity.
Multim. Tools Appl., 2017

A secure authentication and key agreement scheme for roaming service with user anonymity.
Int. J. Commun. Syst., 2017

Design and FPGA implementation of an efficient security mechanism for mobile pay-TV systems.
Int. J. Commun. Syst., 2017

2016
An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC.
Multim. Tools Appl., 2016

Design of a Secure Authentication and Key Agreement Scheme Preserving User Privacy Usable in Telecare Medicine Information Systems.
J. Medical Syst., 2016

A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps.
Future Gener. Comput. Syst., 2016

2015
Security analysis and improvement of two authentication and key agreement schemes for session initiation protocol.
J. Supercomput., 2015

On the Security of a Two-Factor Authentication and Key Agreement Scheme for Telecare Medicine Information Systems.
J. Medical Syst., 2015

2014
Three-Factor Anonymous Authentication and Key Agreement Scheme for Telecare Medicine Information Systems.
J. Medical Syst., 2014


  Loading...