Using blockchain to achieve decentralized privacy in IoT healthcare S Meisami, M Beheshti-Atashgah, MR Aref arXiv preprint arXiv:2109.14812, 2021 | 36 | 2021 |
Cryptanalysis and Improvement of a User Authentication Scheme for Internet of Things Using Elliptic Curve Cryptography. M Bayat, M Beheshti-Atashgah, M Barari, MR Aref Int. J. Netw. Secur. 21 (6), 897-911, 2019 | 16 | 2019 |
A secure and efficient chaotic maps based authenticated key-exchange protocol for smart grid M Bayat, MB Atashgah, MR Aref Wireless Personal Communications 97, 2551-2579, 2017 | 13 | 2017 |
Security and privacy-preserving in e-health: A new framework for patient M Beheshti-Atashgah, MR Aref, M Barari, M Bayat Internet of Things 12, 100290, 2020 | 9 | 2020 |
A lightweight anonymous authentication protocol for IoT wireless sensor networks A Rahnama, M Beheshti-Atashgah, T Eghlidos, MR Aref 2019 16th International ISC (Iranian Society of Cryptology) Conference on …, 2019 | 4 | 2019 |
ID-based strong designated verifier signature scheme and its applications in Internet of things M Beheshti-Atashgah, MR Aref, M Bayat, M Barari 2019 27th Iranian Conference on Electrical Engineering (ICEE), 1486-1491, 2019 | 3 | 2019 |
A Scalable Multi-Layered Blockchain Architecture for Enhanced EHR Sharing and Drug Supply Chain Management R Javan, M Mohammadi, M Beheshti-Atashgah, MR Aref arXiv preprint arXiv:2402.17342, 2024 | 2 | 2024 |
A new threshold proxy signature scheme with fast revocation M Beheshti-Atashgah, M Gardeshi, M Bayat International Journal of Computer and Electrical Engineering 4 (5), 766, 2012 | 2 | 2012 |
A designated verifier proxy signature scheme with fast revocation without random oracles M Beheshti-Atashgah, M Gardeshi, M Bayat Digital Information and Communication Technology and Its Applications …, 2011 | 2 | 2011 |
An ultra-lightweight RFID mutual authentication protocol A Rahnama, M Beheshti-Atashgah, T Eghlidos, MR Aref 2019 16th International ISC (Iranian Society of Cryptology) Conference on …, 2019 | 1 | 2019 |
Formal Security of an Identity-Based Proxy Signature Scheme in the Random Oracle Model M Beheshti-Atashgah, M Gardeshi, M Bayat International Journal of Machine Learning and Computing 2 (3), 298, 2012 | 1 | 2012 |
Extended Prêt à voter with discretely-chaotic family of permutations M Ajori, MB Atashgah, A Payandeh 20th Iranian Conference on Electrical Engineering (ICEE2012), 1214-1219, 2012 | 1 | 2012 |
Designated verifier threshold proxy signature scheme without random oracles M Beheshti-Atashgah, M Bayat, M Gardeshi, MR Aref Cryptology ePrint Archive, 2012 | 1 | 2012 |
SCALHEALTH: Scalable Blockchain Integration for Secure IoT Healthcare Systems M Mohammadi, R Javan, M Beheshti-Atashgah, MR Aref arXiv preprint arXiv:2403.08068, 2024 | | 2024 |
Security and privacy-preserving in e-health: A new framework for patient M Barari, MB Atashgah, MR Aref, M Bayat Internet of Things 12 (1), 2020 | | 2020 |
ID-based Strong Designated Verifier Signature Scheme and its Applications in Internet of Things M Barari, M Bayat, MB Atashgah, MR Aref بيست و هفتمين کنفرانس مهندسي برق ايران, 2019 | | 2019 |
Security Concepts and Challenges of Military Internet of Things (IoT) with Focused on the mechanism of MIoT-USA M Bayat, MB Atashgah, M Barari, MR Aref فرماندهي و کنترل 2 (3), 2018 | | 2018 |
A New Framework for Privacy-Preserving and Security of Patient in Electronic Health MB Atashgah, MR Aref, M Bayat, M Barari فرماندهي و کنترل 2 (2), 2018 | | 2018 |
A NOVEL IDENTITY-BASED STRONG DESIGNATED VERIFIER SIGNATURE SCHEME WITH ITS APPLICATION IN INTERNET OF THINGS ERA AM BEHESHTI, MR AREF, M BARARI JOURNAL OF ELECTRONIC AND CYBER DEFENCE 5 (420), 55-67, 2018 | | 2018 |
A New (t, n) Designated Verifier Threshold Proxy Signature Scheme in the Standard Model M Beheshti Atashgah, M Gardeshi, MR Aref Electronic and Cyber Defense 2 (1), 25-35, 2014 | | 2014 |