Majid Bayat

According to our database1, Majid Bayat authored at least 33 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Light-PerIChain: Using lightweight scalable blockchain based on node performance and improved consensus algorithm in IoT systems.
Comput. Commun., January, 2024

2023
Blockchain based authentication and access verfication scheme in smart home.
J. Ambient Intell. Humaniz. Comput., March, 2023

A conditional privacy-preserving fair electronic payment scheme based on blockchain without trusted third party.
J. Ambient Intell. Humaniz. Comput., 2023

2022
A Privacy Preserving Mutual Authentication Scheme Suitable for IoT-Based Medical Systems.
ISC Int. J. Inf. Secur., 2022

2021
LAPTAS: lightweight anonymous privacy-preserving three-factor authentication scheme for WSN-based IIoT.
Wirel. Networks, 2021

Efficient and dynamic verifiable multi-keyword searchable symmetric encryption with full security.
Multim. Tools Appl., 2021

Privacy Preserving Attribute-Based Encryption with Conjunctive Keyword Search for E-health Records in Cloud.
ISC Int. J. Inf. Secur., 2021

Fair multi-owner search over encrypted data with forward and backward privacy in cloud-assisted Internet of Things.
Future Gener. Comput. Syst., 2021

A new provable hierarchical anonymous certificateless authentication protocol with aggregate verification in ADS-B systems.
Comput. Networks, 2021

2020
NERA: A new and efficient RSU based authentication scheme for VANETs.
Wirel. Networks, 2020

A secure key-aggregate authentication cryptosystem for data sharing in dynamic cloud storage.
Multim. Tools Appl., 2020

A new and efficient authentication scheme for vehicular ad hoc networks.
J. Intell. Transp. Syst., 2020

MedSBA: a novel and secure scheme to share medical data based on blockchain technology and attribute-based encryption.
J. Ambient Intell. Humaniz. Comput., 2020

Security and privacy-preserving in e-health: A new framework for patient.
Internet Things, 2020

A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT.
Comput. Networks, 2020

2019
A lightweight hierarchical authentication scheme for internet of things.
J. Ambient Intell. Humaniz. Comput., 2019

A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications.
ISC Int. J. Inf. Secur., 2019

Cryptanalysis and Improvement of a User Authentication Scheme for Internet of Things Using Elliptic Curve Cryptography.
Int. J. Netw. Secur., 2019

Verifiable ranked search over encrypted data with forward and backward privacy.
Future Gener. Comput. Syst., 2019

2018
On the Design of a Secure Proxy Signature-based Handover Authentication Scheme for LTEWireless Networks.
IACR Cryptol. ePrint Arch., 2018

NECPPA: A novel and efficient conditional privacy-preserving authentication scheme for VANET.
Comput. Networks, 2018

2017
A Secure and Efficient Chaotic Maps Based Authenticated Key-Exchange Protocol for Smart Grid.
Wirel. Pers. Commun., 2017

A secure ECC-based privacy preserving data aggregation scheme for smart grids.
Comput. Networks, 2017

2015
A secure authentication scheme for VANETs with batch verification.
Wirel. Networks, 2015

A revocable attribute based data sharing scheme resilient to DoS attacks in smart grid.
Wirel. Networks, 2015

An attribute-based tripartite key agreement protocol.
Int. J. Commun. Syst., 2015

2013
A Secure and efficient elliptic curve based authentication and key agreement protocol suitable for WSN.
IACR Cryptol. ePrint Arch., 2013

2012
A Certificateless Multiple-key Agreement Protocol Based on Bilinear Pairings.
IACR Cryptol. ePrint Arch., 2012

Designated Verifier Threshold Proxy Signature Scheme without Random Oracles.
IACR Cryptol. ePrint Arch., 2012

2011
Security of Multiple-Key Agreement Protocols and Propose an Enhanced Protocol.
IACR Cryptol. ePrint Arch., 2011

Vulnerability of two multiple-key agreement protocols.
Comput. Electr. Eng., 2011

A Designated Verifier Proxy Signature Scheme with Fast Revocation without Random Oracles.
Proceedings of the Digital Information and Communication Technology and Its Applications, 2011

2010
A Novel Secure Bilinear Pairing Based Remote User Authentication Scheme with Smart Card.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010


  Loading...