default search action
Morteza Nikooghadam
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j44]Dariush Abbasinezhad-Mood, Sayyed Majid Mazinani, Morteza Nikooghadam, Arezou Ostad-Sharif:
Efficient Provably-Secure Dynamic ID-Based Authenticated Key Agreement Scheme With Enhanced Security Provision. IEEE Trans. Dependable Secur. Comput. 19(2): 1227-1238 (2022) - 2021
- [j43]Seyed Abdolreza Eftekhari, Morteza Nikooghadam, Masoud Rafighi:
Robust session key generation protocol for social internet of vehicles with enhanced security provision. J. Supercomput. 77(3): 2511-2544 (2021) - [j42]Dariush Abbasinezhad-Mood, Arezou Ostad-Sharif, Morteza Nikooghadam, Sayyed Majid Mazinani:
Novel certificateless Chebyshev chaotic map-based key agreement protocol for advanced metering infrastructure. J. Supercomput. 77(8): 8082-8110 (2021) - [j41]Seyed Abdolreza Eftekhari, Morteza Nikooghadam, Masoud Rafighi:
Security-enhanced three-party pairwise secret key agreement protocol for fog-based vehicular ad-hoc communications. Veh. Commun. 28: 100306 (2021) - 2020
- [j40]Dariush Abbasinezhad-Mood, Arezou Ostad-Sharif, Morteza Nikooghadam:
Efficient provably-secure privacy-preserving signature-based key establishment protocol. Ad Hoc Networks 100: 102062 (2020) - [j39]Dariush Abbasinezhad-Mood, Arezou Ostad-Sharif, Morteza Nikooghadam:
Novel Anonymous Key Establishment Protocol for Isolated Smart Meters. IEEE Trans. Ind. Electron. 67(4): 2844-2851 (2020) - [j38]Dariush Abbasinezhad-Mood, Arezou Ostad-Sharif, Morteza Nikooghadam, Sayyed Majid Mazinani:
A Secure and Efficient Key Establishment Scheme for Communications of Smart Meters and Service Providers in Smart Grid. IEEE Trans. Ind. Informatics 16(3): 1495-1502 (2020) - [j37]Dariush Abbasinezhad-Mood, Arezou Ostad-Sharif, Sayyed Majid Mazinani, Morteza Nikooghadam:
Provably Secure Escrow-Less Chebyshev Chaotic Map-Based Key Agreement Protocol for Vehicle to Grid Connections With Privacy Protection. IEEE Trans. Ind. Informatics 16(12): 7287-7294 (2020) - [j36]Mahdi Ghafoorian, Morteza Nikooghadam:
An anonymous and secure key agreement protocol for NFC applications using pseudonym. Wirel. Networks 26(6): 4269-4285 (2020)
2010 – 2019
- 2019
- [j35]Mojtaba Tajmohammadi, Sayyed Majid Mazinani, Morteza Nikooghadam, Zahraa Al-Hamdawee:
LSPP: Lightweight and Secure Payment Protocol for Dynamic Wireless Charging of Electric Vehicles in Vehicular Cloud. IEEE Access 7: 148424-148438 (2019) - [j34]Hassan Raei, Ensieh Ilkhani, Morteza Nikooghadam:
SeCARA: A security and cost-aware resource allocation method for mobile cloudlet systems. Ad Hoc Networks 86: 103-118 (2019) - [j33]Dariush Abbasinezhad-Mood, Morteza Nikooghadam, Sayyed Majid Mazinani, Abolfazl Babamohammadi, Arezou Ostad-Sharif:
More efficient key establishment protocol for smart grid communications: Design and experimental evaluation on ARM-based hardware. Ad Hoc Networks 89: 119-131 (2019) - [j32]Arezou Ostad-Sharif, Dariush Abbasinezhad-Mood, Morteza Nikooghadam:
Efficient utilization of elliptic curve cryptography in design of a three-factor authentication protocol for satellite communications. Comput. Commun. 147: 85-97 (2019) - [j31]Arezou Ostad-Sharif, Hamed Arshad, Morteza Nikooghadam, Dariush Abbasinezhad-Mood:
Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme. Future Gener. Comput. Syst. 100: 882-892 (2019) - [j30]Arezou Ostad-Sharif, Dariush Abbasinezhad-Mood, Morteza Nikooghadam:
An enhanced anonymous and unlinkable user authentication and key agreement protocol for TMIS by utilization of ECC. Int. J. Commun. Syst. 32(5) (2019) - [j29]Arezou Ostad-Sharif, Abolfazl Babamohammadi, Dariush Abbasinezhad-Mood, Morteza Nikooghadam:
Efficient privacy-preserving authentication scheme for roaming consumer in global mobility networks. Int. J. Commun. Syst. 32(5) (2019) - [j28]Arezou Ostad-Sharif, Morteza Nikooghadam, Dariush Abbasinezhad-Mood:
Design of a lightweight and anonymous authenticated key agreement protocol for wireless body area networks. Int. J. Commun. Syst. 32(12) (2019) - [j27]Dariush Abbasinezhad-Mood, Arezou Ostad-Sharif, Morteza Nikooghadam:
Design of an Anonymous Lightweight Communication Protocol for Smart Grid and Its Implementation on 8-bit AVR and 32-bit ARM. Int. J. Netw. Secur. 21(4): 607-617 (2019) - [j26]Arezou Ostad-Sharif, Dariush Abbasinezhad-Mood, Morteza Nikooghadam:
A Robust and Efficient ECC-based Mutual Authentication and Session Key Generation Scheme for Healthcare Applications. J. Medical Syst. 43(1): 10:1-10:22 (2019) - [j25]Niloofar Ravanbakhsh, Mohadeseh Mohammadi, Morteza Nikooghadam:
Perfect forward secrecy in VoIP networks through design a lightweight and secure authenticated communication scheme. Multim. Tools Appl. 78(9): 11129-11153 (2019) - [j24]Dariush Abbasinezhad-Mood, Arezou Ostad-Sharif, Morteza Nikooghadam:
Novel chaotic map-based privacy-preserving authenticated key agreement scheme without the electricity service provider involvement. Secur. Priv. 2(5) (2019) - 2018
- [j23]Dariush Abbasinezhad-Mood, Morteza Nikooghadam:
Design and hardware implementation of a security-enhanced elliptic curve cryptography based lightweight authentication scheme for smart grid communications. Future Gener. Comput. Syst. 84: 47-57 (2018) - [j22]Dariush Abbasinezhad-Mood, Morteza Nikooghadam:
Design and extensive hardware performance analysis of an efficient pairwise key generation scheme for Smart Grid. Int. J. Commun. Syst. 31(5) (2018) - [j21]Dariush Abbasinezhad-Mood, Morteza Nikooghadam:
Efficient design and hardware implementation of a secure communication scheme for smart grid. Int. J. Commun. Syst. 31(10) (2018) - [j20]Dariush Abbasinezhad-Mood, Morteza Nikooghadam:
Design of an enhanced message authentication scheme for smart grid and its performance analysis on an ARM Cortex-M3 microcontroller. J. Inf. Secur. Appl. 40: 9-19 (2018) - [j19]Dariush Abbasinezhad-Mood, Morteza Nikooghadam:
Efficient design and extensive hardware evaluation of an anonymous data aggregation scheme for smart grid. Secur. Priv. 1(2) (2018) - [j18]Dariush Abbasinezhad-Mood, Morteza Nikooghadam:
Design and microcontroller-based hardware performance analysis of a security-enhanced lightweight communication scheme for smart grid. Secur. Priv. 1(5) (2018) - [j17]Dariush Abbasinezhad-Mood, Morteza Nikooghadam:
An Anonymous ECC-Based Self-Certified Key Distribution Scheme for the Smart Grid. IEEE Trans. Ind. Electron. 65(10): 7996-8004 (2018) - [j16]Dariush Abbasinezhad-Mood, Morteza Nikooghadam:
Efficient Anonymous Password-Authenticated Key Exchange Protocol to Read Isolated Smart Meters by Utilization of Extended Chebyshev Chaotic Maps. IEEE Trans. Ind. Informatics 14(11): 4815-4828 (2018) - [j15]Dariush Abbasinezhad-Mood, Morteza Nikooghadam:
Efficient Design of a Novel ECC-Based Public Key Scheme for Medical Data Protection by Utilization of NanoPi Fire. IEEE Trans. Reliab. 67(3): 1328-1339 (2018) - [j14]Dariush Abbasinezhad-Mood, Morteza Nikooghadam:
An Ultra-Lightweight and Secure Scheme for Communications of Smart Meters and Neighborhood Gateways by Utilization of an ARM Cortex-M Microcontroller. IEEE Trans. Smart Grid 9(6): 6194-6205 (2018) - 2017
- [j13]Hamed Arshad, Morteza Nikooghadam, Sara Avezverdi, Mahboubeh Nazari:
Design and FPGA implementation of an efficient security mechanism for mobile pay-TV systems. Int. J. Commun. Syst. 30(15) (2017) - [j12]Morteza Nikooghadam, Reza Jahantigh, Hamed Arshad:
A lightweight authentication and key agreement protocol preserving user anonymity. Multim. Tools Appl. 76(11): 13401-13423 (2017) - 2016
- [j11]Hamed Arshad, Morteza Nikooghadam:
An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC. Multim. Tools Appl. 75(1): 181-197 (2016) - 2015
- [j10]Hamed Arshad, Vahid Teymoori, Morteza Nikooghadam, Hassan Abbassi:
On the Security of a Two-Factor Authentication and Key Agreement Scheme for Telecare Medicine Information Systems. J. Medical Syst. 39(8): 76 (2015) - [j9]Hamed Arshad, Morteza Nikooghadam:
Security analysis and improvement of two authentication and key agreement schemes for session initiation protocol. J. Supercomput. 71(8): 3163-3180 (2015) - [j8]Omid Mir, Morteza Nikooghadam:
A Secure Biometrics Based Authentication with Key Agreement Scheme in Telemedicine Networks for E-Health Services. Wirel. Pers. Commun. 83(4): 2439-2461 (2015) - 2014
- [j7]Hamed Arshad, Morteza Nikooghadam:
Three-Factor Anonymous Authentication and Key Agreement Scheme for Telecare Medicine Information Systems. J. Medical Syst. 38(12): 136 (2014) - 2013
- [j6]Ali Zakerolhosseini, Morteza Nikooghadam:
Low-power and high-speed design of a versatile bit-serial multiplier in finite fields GF(2m). Integr. 46(2): 211-217 (2013) - [j5]Morteza Nikooghadam, Ali Zakerolhosseini:
Utilization of Pipeline Technique in AOP Based Multipliers with Parallel Inputs. J. Signal Process. Syst. 72(1): 57-62 (2013) - [j4]Ali Zakerolhosseini, Morteza Nikooghadam:
Secure Transmission of Mobile Agent in Dynamic Distributed Environments. Wirel. Pers. Commun. 70(2): 641-656 (2013) - 2012
- [j3]Morteza Nikooghadam, Ali Zakerolhosseini:
Secure Communication of Medical Information Using Mobile Agents. J. Medical Syst. 36(6): 3839-3850 (2012) - 2010
- [j2]Morteza Nikooghadam, Ali Zakerolhosseini, Mohsen Ebrahimi Moghaddam:
Efficient utilization of elliptic curve cryptosystem for hierarchical access control. J. Syst. Softw. 83(10): 1917-1929 (2010)
2000 – 2009
- 2009
- [j1]Morteza Nikooghadam, Ali Zakerolhosseini:
An efficient blind signature scheme based on the elliptic curve discrete logarithm problem. ISC Int. J. Inf. Secur. 1(2): 125-131 (2009) - 2008
- [c1]Morteza Nikooghadam, Ehsan Malekian, Ali Zakerolhosseini:
A Versatile Reconfigurable Bit-Serial Multiplier Architecture in Finite Fields GF(2m). CSICC 2008: 227-234
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint