Mohammad-Ali Doostari

Orcid: 0000-0001-9124-4083

According to our database1, Mohammad-Ali Doostari authored at least 14 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Blockchain based authentication and access verfication scheme in smart home.
J. Ambient Intell. Humaniz. Comput., March, 2023

2021
LAPTAS: lightweight anonymous privacy-preserving three-factor authentication scheme for WSN-based IIoT.
Wirel. Networks, 2021

A New Side-Channel Attack on Reduction of RSA-CRT Montgomery Method Based.
J. Circuits Syst. Comput., 2021

2020
A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT.
Comput. Networks, 2020

2019
A DPA Attack on IOA Data-Dependent Delay Countermeasure Based on an Inherent Tempo-Spatial Data Dependency.
IEEE Trans. Circuits Syst. II Express Briefs, 2019

2018
NEMR: A Nonequidistant DPA Attack-Proof of Modular Reduction in a CRT Implementation of RSA.
J. Circuits Syst. Comput., 2018

Low-complexity and differential power analysis (DPA)-resistant two-folded power-aware Rivest-Shamir-Adleman (RSA) security schema implementation for IoT-connected devices.
IET Comput. Digit. Tech., 2018

2017
ESIV: an end-to-end secure internet voting system.
Electron. Commer. Res., 2017

Fully distributed ECC-based key management for mobile ad hoc networks.
Comput. Networks, 2017

2015
A new secure Internet voting protocol using Java Card 3 technology and Java information flow concept.
Secur. Commun. Networks, 2015

2014
Design and implementation of a novel secure internet voting protocol using Java Card 3 technology.
Int. J. Bus. Inf. Syst., 2014

2013
Fully Distributed Self Certified Key Management for Large-Scale MANETs.
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013

2009
Improving the Client Security Using the Smart Card and Trusted Server.
Proceedings of the 2009 International Conference on Security & Management, 2009

2008
Irregularity Analysis of Iris Patterns.
Proceedings of the 2008 International Conference on Image Processing, 2008


  Loading...