A new linguistic steganography scheme based on lexical substitution HA Yajam, AS Mousavi, M Amirmazlaghani 2014 11th International ISC Conference on Information Security and …, 2014 | 6 | 2014 |
Deniable Encryption based on Standard RSA with OAEP HA Yajam, YK Ahmadabadi, M Akhaee 2016 8th International Symposium on Telecommunications (IST), 84-88, 2016 | 5 | 2016 |
PapiaPass: Sentence-based passwords using dependency trees HA Yajam, YK Ahmadabadi, M Akhaee 2016 13th International Iranian Society of Cryptology Conference on …, 2016 | 4 | 2016 |
Identity‐based universal re‐encryption for mixnets HA Yajam, J Mohajeri, M Salmasizadeh Security and Communication Networks 8 (17), 2992-3001, 2015 | 4 | 2015 |
Federify: a verifiable federated learning scheme based on zksnarks and blockchain G Keshavarzkalhori, C Pérez-Solà, G Navarro-Arribas, ... IEEE Access, 2023 | 3 | 2023 |
Improvement on bitcoin’s verifiable public randomness with semi-trusted delegates H Yajam, E Ebadi, MT Badakhshan, MA Akhaee 2018 9th International Symposium on Telecommunications (IST), 53-57, 2018 | 3 | 2018 |
Verifiable identity-based mix network MA Ekhtiarabadi, HA Yajam, J Mohajeri, M Salmasizadeh 2015 23rd Iranian Conference on Electrical Engineering, 406-409, 2015 | 3 | 2015 |
A scalable decentralized privacy-preserving e-voting system based on zero-knowledge off-chain computations A Emami, H Yajam, MA Akhaee, R Asghari Journal of Information Security and Applications 79, 103645, 2023 | 2 | 2023 |
Improvements on Easypaysy: The Bitcoin’s Layer-2 Accounts Protocol E Ebadi, H Yajam, MA Akhaee 2020 17th International ISC Conference on Information Security and …, 2020 | 2 | 2020 |
Utilizing Features of Aggregated Flows to Identify Botnet Network Traffic B Heydari, H Yajam, MA Akhaee, S Salehkalaibar 2017 14th International ISC (Iranian Society of Cryptology) Conference on …, 2017 | 2 | 2017 |
Security analysis of SKI protocol P Babvey, HA Yajam, T Eghlidos 2014 11th International ISC Conference on Information Security and …, 2014 | 2 | 2014 |
Security analysis of an identity-based mix net HA Yajam, A Mahmoodi, J Mohajeri, M Salmasizadeh 2013 10th International ISC Conference on Information Security and …, 2013 | 2* | 2013 |
JABS: A Blockchain Simulator for Researching Consensus Algorithms H Yajam, E Ebadi, MA Akhaee IEEE Transactions on Network Science and Engineering 11 (1), 3-13, 2023 | 1 | 2023 |
ISeCure H Yajam, MA Akhaee | | 2023 |
Analysis of IOTA Tangle Stability in High Transaction Rates MA Yajam, Habibullah and Akhaee The ISC International Journal of Information Security 15 (2), -, 2023 | | 2023 |
Backward unlinkable and revocable secret handshake without random oracle HA Yajam, J Mohajeri, M Salmasizadeh 7'th International Symposium on Telecommunications (IST'2014), 907-912, 2014 | | 2014 |