A key-policy attribute-based temporary keyword search scheme for secure cloud storage MH Ameri, M Delavar, J Mohajeri, M Salmasizadeh IEEE Transactions on Cloud Computing 8 (3), 660-671, 2018 | 67 | 2018 |
Quantum physical unclonable functions: Possibilities and impossibilities M Arapinis, M Delavar, M Doosti, E Kashefi Quantum 5, 475, 2021 | 44 | 2021 |
PUF‐based solutions for secure communications in Advanced Metering Infrastructure (AMI) M Delavar, S Mirzakuchaki, MH Ameri, J Mohajeri International Journal of Communication Systems 30 (9), e3195, 2017 | 41 | 2017 |
A ring oscillator-based PUF with enhanced challenge-response pairs M Delavar, S Mirzakuchaki, J Mohajeri Canadian Journal of Electrical and Computer Engineering 39 (2), 174-180, 2016 | 29 | 2016 |
Client-server identification protocols with quantum puf M Doosti, N Kumar, M Delavar, E Kashefi ACM Transactions on Quantum Computing 2 (3), 1-40, 2021 | 17 | 2021 |
Provably secure and efficient PUF‐based broadcast authentication schemes for smart grid applications MH Ameri, M Delavar, J Mohajeri International Journal of Communication Systems 32 (8), e3935, 2019 | 15 | 2019 |
An efficient and physically secure privacy-preserving authentication scheme for Vehicular Ad-hoc NETworks (VANETs) A Aghabagherloo, M Delavar, J Mohajeri, M Salmasizadeh, B Preneel Ieee Access 10, 93831-93844, 2022 | 13 | 2022 |
A unified framework for quantum unforgeability M Doosti, M Delavar, E Kashefi, M Arapinis arXiv preprint arXiv:2103.13994, 2021 | 11 | 2021 |
On the security of an efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks M Kazemi, M Delavar, J Mohajeri, M Salmasizadeh The 26th Iranian Conference on Electrical Engineering (ICEE), 2018 | 11 | 2018 |
On the security of an ECC based RFID authentication protocol P Babaheidarian, M Delavar, J Mohajeri 2012 9th International ISC Conference on Information Security and Cryptology …, 2012 | 10 | 2012 |
An attribute-based anonymous broadcast encryption scheme with adaptive security in the standard model R Rabaninejad, MH Ameri, M Delavar, J Mohajeri Scientia Iranica 26 (3), 1700-1713, 2019 | 7 | 2019 |
An efficient and secure attribute-based signcryption scheme for smart grid applications SM Sedaghat, MH Ameri, M Delavar, J Mohajeri, MR Aref Cryptology ePrint Archive, 2018 | 7 | 2018 |
On the Security of O-PSI a Delegated Private Set Intersection on Outsourced Datasets M Mahdavi Oliaiy, M Delavar, MH Ameri, J Mohajeri, MR Aref The 14th International ISC (Iranian Society of Cryptology) Conference on …, 2017 | 5 | 2017 |
On the security of YRL, an anonymous broadcast encryption scheme R Rabaninejad, MH Ameri, M Delavar, J Mohajeri 2016 8th International Symposium on Telecommunications (IST), 752-755, 2016 | 4 | 2016 |
Security analysis of CLEFIA-128 S Ahmadi, M Delavar, J Mohajeri, MR Aref 2014 11th International ISC Conference on Information Security and …, 2014 | 3 | 2014 |
Spoofing against spoofing: Toward caller ID verification in heterogeneous telecommunication systems S Wang, M Delavar, MA Azad, F Nabizadeh, S Smith, F Hao ACM Transactions on Privacy and Security 27 (1), 1-25, 2023 | 2 | 2023 |
Towards a unified quantum protocol framework: Classification, implementation, and use cases S Singh, M Doosti, N Mathur, M Delavar, A Mantri, H Ollivier, E Kashefi arXiv preprint arXiv:2310.12780, 2023 | 1 | 2023 |
Unforgeability in the quantum world M Arapinis, M Delavar, M Doosti, E Kashefi Cryptology ePrint Archive, 2020 | 1 | 2020 |
A Technique to Improve De-anonymization Attacks on Graph Data J Aliakbari, M Delavar, J Mohajeri, M Salmasizadeh The 26th Iranian Conference on Electrical Engineering (ICEE), 2018 | 1 | 2018 |
Privacy and Security Y Wang, M Delavar, MA Azad, F Nabizadeh, S Smith, F Hao, J Ottmann, ... ACM Transactions on 27 (1), 2024 | | 2024 |