Lightweight revocable hierarchical attribute-based encryption for internet of things M Ali, MR Sadeghi, X Liu IEEE Access 8, 23951-23964, 2020 | 45 | 2020 |
A fully distributed hierarchical attribute-based encryption scheme M Ali, J Mohajeri, MR Sadeghi, X Liu Theoretical Computer Science 815, 25-46, 2020 | 38 | 2020 |
Verifiable online/offline multi-keyword search for cloud-assisted industrial internet of things M Ali, MR Sadeghi, X Liu, Y Miao, AV Vasilakos Journal of Information Security and Applications 65, 103101, 2022 | 26 | 2022 |
Attribute-based fine-grained access control for outscored private set intersection computation M Ali, J Mohajeri, MR Sadeghi, X Liu Information Sciences 536, 222-243, 2020 | 25 | 2020 |
Lightweight fine-grained access control for wireless body area networks M Ali, MR Sadeghi, X Liu Sensors 20 (4), 1088, 2020 | 17 | 2020 |
Provable secure lightweight attribute‐based keyword search for cloud‐based Internet of Things networks M Ali, MR Sadeghi Transactions on Emerging Telecommunications Technologies 32 (5), e3905, 2021 | 9 | 2021 |
Anonymous aggregate fine-grained cloud data verification system for smart health M Ali, MR Sadeghi, X Liu, AV Vasilakos IEEE Transactions on Cloud Computing, 2022 | 8 | 2022 |
Lightweight verifiable data management system for cloud-assisted wireless body area networks M Ali, X Liu Peer-to-Peer Networking and Applications 15 (4), 1792-1816, 2022 | 8 | 2022 |
A fully distributed revocable ciphertext-policy hierarchical attribute-based encryption without pairing M Ali, J Mohajeri, MR Sadeghi Cryptology ePrint Archive, 2018 | 4 | 2018 |
Privacy-preserving joint data and function homomorphic encryption for cloud software services A Hosseingholizadeh, F Rahmati, M Ali, H Damadi, X Liu IEEE Internet of Things Journal, 2023 | 3 | 2023 |
Verifiable and privacy-preserving fine-grained data management in vehicular fog computing: A game theory-based approach Z Seyedi, F Rahmati, M Ali, X Liu Peer-to-Peer Networking and Applications 17 (1), 410-431, 2024 | 2 | 2024 |
Attribute-Based Remote Data Auditing and User Authentication for Cloud Storage Systems. M Ali ISeCure 14 (3), 2022 | 2 | 2022 |
HUAP: Practical Attribute-based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices M Chegenizadeh, M Ali, J Mohajeri, MR Aref arXiv preprint arXiv:2107.10133, 2021 | 1 | 2021 |
On the security of the hierarchical attribute based encryption scheme proposed by Wang et al M Ali, J Mohajeri, MR Sadeghi arXiv preprint arXiv:1810.05864, 2018 | 1 | 2018 |
HUAP: Practical Attribute-Based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices MRA Mostafa Chegenizadeh, Mohammad Ali, Javad Mohajeri The ISC International Journal of Information Security 16 (1), 93-114, 2024 | | 2024 |
A fully decentralized auditing approach for edge computing: A Game-Theoretic Perspective Z Seyedi, F Rahmati, M Ali, X Liu arXiv preprint arXiv:2312.16007, 2023 | | 2023 |
Privacy-preserving data and function in cloud environments using homomorphic encryption A Hosseingholizadeh, F Rahmati, M Ali Biannual Journal Monadi for Cyberspace Security (AFTA) 12 (1), 30-48, 2023 | | 2023 |
Federated Online/Offline Remote Data Inspection for Distributed Edge Computing M Ali, X Liu arXiv preprint arXiv:2308.05198, 2023 | | 2023 |
An Anonymous Attribute-based Access Control System Supporting Access Structure Update M Chegenizadeh, M Ali, J Mohajeri, MR Aref 2019 16th International ISC (Iranian Society of Cryptology) Conference on …, 2019 | | 2019 |