An efficient and provably secure authenticated key agreement scheme for mobile edge computing M Rakeei, F Moazami Wireless Networks 28 (7), 2983-2999, 2022 | 8 | 2022 |
Secure Internet Exams Despite Coercion M Rakeei, R Giustolisi, G Lenzini International Workshop on Data Privacy Management, 85-100, 2022 | 3 | 2022 |
Cryptanalysis of an anonymous authentication and key agreement protocol for secure wireless body area network MA Rakeei, F Moazami Cryptology ePrint Archive, 2020 | 3 | 2020 |
Remote secure object authentication: Secure sketches, fuzzy extractors, and security protocols MP Arenas, G Fotiadis, G Lenzini, M Rakeei Computers & Security, 104131, 2024 | | 2024 |
Verifying Artifact Authenticity with Unclonable Optical Tags MP Arenas, G Lenzini, M Rakeei, PYA Ryan, M Škrobot, M Zhekova | | |