A secure and efficient authentication technique for vehicular ad-hoc networks MR Asaar, M Salmasizadeh, W Susilo, A Majidi IEEE Transactions on Vehicular Technology 67 (6), 5409-5423, 2018 | 81 | 2018 |
Blockchain and its derived technologies shape the future generation of digital businesses: a focus on decentralized finance and the Metaverse SB Far, AI Rad, MR Asaar Data Science and Management 6 (3), 183-197, 2023 | 41 | 2023 |
A lightweight auditing service for shared data with secure user revocation in cloud storage R Rabaninejad, MA Attari, MR Asaar, MR Aref IEEE Transactions on Services Computing 15 (1), 1-15, 2019 | 29 | 2019 |
A new provable hierarchical anonymous certificateless authentication protocol with aggregate verification in ADS-B systems A Asari, MR Alagheband, M Bayat, MR Asaar Computer Networks 185, 107599, 2021 | 28 | 2021 |
A lightweight anonymous two‐factor authentication protocol for wireless sensor networks in Internet of Vehicles MJ Sadri, M Rajabzadeh Asaar International Journal of Communication Systems 33 (14), e4511, 2020 | 26 | 2020 |
An identity-based online/offline secure cloud storage auditing scheme R Rabaninejad, M Rajabzadeh Asaar, M Ahmadian Attari, MR Aref Cluster Computing 23 (2), 1455-1468, 2020 | 26 | 2020 |
Toward Metaverse of everything: Opportunities, challenges, and future directions of the next generation of visual/virtual communications SB Far, AI Rad, SMH Bamakan, MR Asaar Journal of Network and Computer Applications, 103675, 2023 | 25 | 2023 |
An anonymous two-factor authentication protocol for IoT-based applications MJ Sadri, MR Asaar Computer Networks 199, 108460, 2021 | 22 | 2021 |
A short ID‐based proxy signature scheme MR Asaar, M Salmasizadeh, W Susilo International Journal of Communication Systems 29 (5), 859-873, 2016 | 18 | 2016 |
Comments on a lightweight cloud auditing scheme: Security analysis and improvement R Rabaninejad, MA Attari, MR Asaar, MR Aref Journal of Network and Computer Applications 139, 49-56, 2019 | 17 | 2019 |
A short identity-based proxy ring signature scheme from RSA MR Asaar, M Salmasizadeh, W Susilo Computer Standards & Interfaces 38, 144-151, 2015 | 16 | 2015 |
A lightweight identity-based provable data possession supporting users’ identity privacy and traceability R Rabaninejad, MA Attari, MR Asaar, MR Aref Journal of Information Security and Applications 51, 102454, 2020 | 15 | 2020 |
An identity-based multi-proxy multi-signature scheme without bilinear pairings and its variants MR Asaar, M Salmasizadeh, W Susilo The Computer Journal 58 (4), 1021-1039, 2015 | 13 | 2015 |
A blockchain-based quantum-secure reporting protocol S Banaeian Far, M Rajabzadeh Asaar Peer-to-Peer Networking and Applications 14 (5), 2992-3011, 2021 | 12 | 2021 |
A Novel Strong Designated Verifier Signature Scheme without Random Oracles MR Asaar, M Salmasizadeh Cryptology ePrint Archive, 2012 | 12 | 2012 |
An efficient cooperative message authentication scheme in vehicular ad-hoc networks A Sarencheh, MR Asaar, M Salmasizadeh, MR Aref 2017 14th International ISC (Iranian Society of Cryptology) Conference on …, 2017 | 9 | 2017 |
ACR-MLM: A privacy-preserving framework for anonymous and confidential rewarding in blockchain-based multi-level marketing SB Far, AI Rad, MR Asaar Data Science and Management 5 (4), 219-231, 2022 | 7 | 2022 |
Code-based strong designated verifier signatures: security analysis and a new construction MR Asaar Cryptology ePrint Archive, 2016 | 7 | 2016 |
A provably secure code‐based concurrent signature scheme M Rajabzadeh Asaar, MH Ameri, M Salmasizadeh, MR Aref IET Information Security 12 (1), 34-41, 2018 | 6 | 2018 |
A privacy-preserving framework for blockchain-based multi-level marketing SB Far, MR Asaar, A Haghbin Computers & Industrial Engineering 177, 109095, 2023 | 5 | 2023 |