Mohammad Sabzinejad Farash

Orcid: 0000-0001-5821-4237

According to our database1, Mohammad Sabzinejad Farash authored at least 44 papers between 2010 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
PFLUA-DIoT: A Pairing Free Lightweight and Unlinkable User Access Control Scheme for Distributed IoT Environments.
IEEE Syst. J., 2022

2021
An Improved WBSN Key-Agreement Protocol Based on Static Parameters and Hash Functions.
IEEE Access, 2021

2020
A Key-Agreement Protocol Based on Static Parameters and Hash Functions.
CoRR, 2020

2019
An improved anonymous authentication scheme for distributed mobile cloud computing services.
Clust. Comput., 2019

2018
An improved and robust biometrics-based three factor authentication scheme for multiserver environments.
J. Supercomput., 2018

2017
A Robust and Efficient Privacy Aware Handover Authentication Scheme for Wireless Networks.
Wirel. Pers. Commun., 2017

An improved smart card based authentication scheme for session initiation protocol.
Peer-to-Peer Netw. Appl., 2017

An improved and provably secure privacy preserving authentication protocol for SIP.
Peer-to-Peer Netw. Appl., 2017

An improved one-to-many authentication scheme based on bilinear pairings with provable security for mobile pay-TV systems.
Multim. Tools Appl., 2017

An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments.
J. King Saud Univ. Comput. Inf. Sci., 2017

Security Vulnerabilities and Improvements of SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks.
Inf. Technol. Control., 2017

A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security.
Int. J. Commun. Syst., 2017

Cryptanalysis and improvement of a three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps.
Int. J. Commun. Syst., 2017

An improved password-based authentication scheme for session initiation protocol using smart cards without verification table.
Int. J. Commun. Syst., 2017

A pairing-free certificateless digital multisignature scheme using elliptic curve cryptography.
Int. J. Comput. Math., 2017

2016
An Efficient Password-Based Authenticated Key Exchange Protocol with Provable Security for Mobile Client-Client Networks.
Wirel. Pers. Commun., 2016

An efficient and anonymous multi-server authenticated key agreement based on chaotic map without engaging Registration Centre.
J. Supercomput., 2016

Security analysis and enhancements of an improved authentication for session initiation protocol with provable security.
Peer-to-Peer Netw. Appl., 2016

Single round-trip SIP authentication scheme with provable security for Voice over Internet Protocol using smart card.
Multim. Tools Appl., 2016

Cryptanalysis and improvement of a robust smart card secured authentication scheme on SIP using elliptic curve cryptography.
Multim. Tools Appl., 2016

A provably secure and efficient authentication scheme for access control in mobile pay-TV systems.
Multim. Tools Appl., 2016

A Provably Secure RFID Authentication Protocol Based on Elliptic Curve for Healthcare Environments.
J. Medical Syst., 2016

An anonymous and untraceable password-based authentication scheme for session initiation protocol using smart cards.
Int. J. Commun. Syst., 2016

A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography.
Electron. Commer. Res., 2016

An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment.
Ad Hoc Networks, 2016

2015
An enhanced privacy preserving remote user authentication scheme with provable security.
Secur. Commun. Networks, 2015

Cryptanalysis and Improvement of an Improved Two Factor Authentication Protocol for Telecare Medical Information Systems.
J. Medical Syst., 2015

An Improved Authentication Scheme for Electronic Payment Systems in Global Mobility Networks.
Inf. Technol. Control., 2015

Cryptanalysis and improvement of 'an improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks'.
Int. J. Netw. Manag., 2015

A provably secure and efficient two-party password-based explicit authenticated key exchange protocol resistance to password guessing attacks.
Concurr. Comput. Pract. Exp., 2015

2014
An efficient client-client password-based authentication scheme with provable security.
J. Supercomput., 2014

A secure and efficient identity-based authenticated key exchange protocol for mobile client-server networks.
J. Supercomput., 2014

Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography.
J. Supercomput., 2014

An Enhanced and Secure Three-Party Password-based Authenticated Key Exchange Protocol without Using Server's Public-Keys and Symmetric Cryptosystems.
Inf. Technol. Control., 2014

A Pairing-free ID-based Key Agreement Protocol with Different PKGs.
Int. J. Netw. Secur., 2014

2013
An Enhanced Authenticated Key Agreement for Session Initiation Protocol.
Inf. Technol. Control., 2013

Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC.
ISC Int. J. Inf. Secur., 2013

A new efficient authenticated multiple-key exchange protocol from bilinear pairings.
Comput. Electr. Eng., 2013

2012
A Certificateless Multiple-key Agreement Protocol Based on Bilinear Pairings.
IACR Cryptol. ePrint Arch., 2012

An ID-Based Key Agreement Protocol Based on ECC Among Users of Separate Networks.
IACR Cryptol. ePrint Arch., 2012

A New Efficient Authenticated ID-Based Group Key Agreement Protocol.
IACR Cryptol. ePrint Arch., 2012

2011
Security of Multiple-Key Agreement Protocols and Propose an Enhanced Protocol.
IACR Cryptol. ePrint Arch., 2011

Vulnerability of two multiple-key agreement protocols.
Comput. Electr. Eng., 2011

2010
A Novel Secure Bilinear Pairing Based Remote User Authentication Scheme with Smart Card.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010


  Loading...