Multi-Authority Attribute-Based Access Control with Smart Contract H Guo, E Meamari, CC Shen 2019 International Conference on Blockchain Technology (ICBCT 2019), 2019 | 83 | 2019 |
Blockchain-inspired event recording system for autonomous vehicles H Guo, E Meamari, CC Shen 2018 1st IEEE international conference on hot information-centric networking …, 2018 | 80 | 2018 |
Attribute-based Multi-Signature and Encryption for EHR Management: A Blockchain-based Solution Hao Guo, Wanxin Li, Ehsan Meamari, Mark Nejad, Chien-Chung Shen IEEE International Conference on Blockchain and Cryptocurrency, 2020 | 61* | 2020 |
Structural‐based tunneling: preserving mutual anonymity for circular P2P networks A Naghizadeh, S Berenjian, E Meamari, RE Atani International Journal of Communication Systems 29 (3), 602-619, 2016 | 26 | 2016 |
C-trust: A trust management system to improve fairness on circular P2P networks A Naghizadeh, B Razeghi, E Meamari, M Hatamian, RE Atani Peer-to-Peer Networking and Applications 9, 1128-1144, 2016 | 15 | 2016 |
Defense against lion attack in cognitive radio systems using the Markov decision process approach K Afhamisisi, HS Shahhoseini, E Meamari Frequenz 68 (3-4), 191-201, 2014 | 6 | 2014 |
An analysis on interactions among secondary user and unknown jammer in cognitive radio systems by fictitious play E Meamari, K Afhamisisi, HS Shahhoseini 2013 10th International ISC Conference on Information Security and …, 2013 | 5 | 2013 |
Collusion Attacks on Decentralized Attributed-Based Encryption: Analyses and a Solution E Meamari, H Guo, CC Shen, J Hur | 4 | 2020 |
zk-IoT: Securing the Internet of Things with Zero-Knowledge Proofs on Blockchain Platforms G Ramezan, E Meamari arXiv preprint arXiv:2402.08322, 2024 | 2 | 2024 |
Data User-Based Attribute Based Encryption E Meamari, H Guo, CC Shen, R Zhang IEEE 54th Annual Conference on Information Sciences and Systems (CISS), 2020 | 2 | 2020 |
TrCoin: A Blockchain-based Robust Trust Management System for VANET E Meamari, CC Shen, H Guo, M Nejad TechRxiv, 2022 | 1 | 2022 |
Game theory-based analysis on interactions among secondary and malicious users in coordinated jamming attack in cognitive radio systems E Meamari, K Afhamisisi, HS Shahhoseini Journal of Circuits, Systems and Computers 25 (08), 1650097, 2016 | 1 | 2016 |
Profit from Two Bitcoin Mining Tactics: Towing and Shutdown E Meamari, CC Shen IEEE Blockchain Technical Briefs, 2020 | | 2020 |
BSROne: Binary Search with Routing of O (1); A Scalable Circular Design for Distributed Networks A Naghizadeh, T Yourdkhani, B Razeghi, E Meamari arXiv preprint arXiv:1408.2813, 2014 | | 2014 |
Increasing Performance in IEEE 802.11 for High Traffic by MIDD Backoff Algorithm HS Shahhoseini, K Afhamisisi, E Meamari Arabian Journal for Science and Engineering 39 (6), 4609-4616, 2014 | | 2014 |