default search action
Mohammad-Ali Doostari
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j11]Afshin Heshmati, Majid Bayat, Mohammad-Ali Doostari, Seyed Morteza Pournaghi:
Blockchain based authentication and access verfication scheme in smart home. J. Ambient Intell. Humaniz. Comput. 14(3): 2525-2547 (2023) - 2021
- [j10]Saman Kaedi, Mohammad-Ali Doostari, M. B. Ghaznavi-Ghoushchi, H. Yusefi:
A New Side-Channel Attack on Reduction of RSA-CRT Montgomery Method Based. J. Circuits Syst. Comput. 30(3): 2150038:1-2150038:18 (2021) - [j9]Hossein Abdi Nasib Far, Majid Bayat, Ashok Kumar Das, Mahdi Fotouhi, Seyed Morteza Pournaghi, Mohammad-Ali Doostari:
LAPTAS: lightweight anonymous privacy-preserving three-factor authentication scheme for WSN-based IIoT. Wirel. Networks 27(2): 1389-1412 (2021) - 2020
- [j8]Mahdi Fotouhi, Majid Bayat, Ashok Kumar Das, Hossein Abdi Nasib Far, Seyed Morteza Pournaghi, Mohammad-Ali Doostari:
A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT. Comput. Networks 177: 107333 (2020)
2010 – 2019
- 2019
- [j7]Saman Kaedi, Mohammad-Ali Doostari, M. B. Ghaznavi-Ghoushchi:
A DPA Attack on IOA Data-Dependent Delay Countermeasure Based on an Inherent Tempo-Spatial Data Dependency. IEEE Trans. Circuits Syst. II Express Briefs 66-II(8): 1341-1345 (2019) - 2018
- [j6]Saman Kaedi, Mohammad-Ali Doostari, Mohammad Bagher Ghaznavi Ghoushchi:
Low-complexity and differential power analysis (DPA)-resistant two-folded power-aware Rivest-Shamir-Adleman (RSA) security schema implementation for IoT-connected devices. IET Comput. Digit. Tech. 12(6): 279-288 (2018) - [j5]Saman Kaedi, Mohammad-Ali Doostari, M. B. Ghaznavi-Ghoushchi:
NEMR: A Nonequidistant DPA Attack-Proof of Modular Reduction in a CRT Implementation of RSA. J. Circuits Syst. Comput. 27(12): 1850191:1-1850191:16 (2018) - 2017
- [j4]Mohammed Gharib, Zahra Moradlou, Mohammad-Ali Doostari, Ali Movaghar:
Fully distributed ECC-based key management for mobile ad hoc networks. Comput. Networks 113: 269-283 (2017) - [j3]Nafiseh Shakiba, Mohammad-Ali Doostari, Mostafa Mohammadpourfard:
ESIV: an end-to-end secure internet voting system. Electron. Commer. Res. 17(3): 463-494 (2017) - 2015
- [j2]Mostafa Mohammadpourfard, Mohammad-Ali Doostari, Mohammad Bagher Ghaznavi Ghoushchi, Nafiseh Shakiba:
A new secure Internet voting protocol using Java Card 3 technology and Java information flow concept. Secur. Commun. Networks 8(2): 261-283 (2015) - 2014
- [j1]Mostafa Mohammadpourfard, Mohammad-Ali Doostari, Mohammad Bagher Ghaznavi Ghoushchi, Hadi Mikaili:
Design and implementation of a novel secure internet voting protocol using Java Card 3 technology. Int. J. Bus. Inf. Syst. 17(4): 414-439 (2014) - 2013
- [c3]Zahra Moradlu, Mohammad-Ali Doostari, Mohammed Gharib, Ali Movaghar:
Fully Distributed Self Certified Key Management for Large-Scale MANETs. UIC/ATC 2013: 96-102
2000 – 2009
- 2009
- [c2]Hossein Rezaei Ghaleh, Mohammad-Ali Doostari:
Improving the Client Security Using the Smart Card and Trusted Server. Security and Management 2009: 529-534 - 2008
- [c1]Abbas Golestani, Ali Ashouri, Kushan Ahmadian, Mohammad Reza Jahed-Motlagh, Mohammad-Ali Doostari:
Irregularity Analysis of Iris Patterns. IPCV 2008: 691-695
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint