Haleh Amintoosi
Orcid: 0000-0002-1447-8086
According to our database1,
Haleh Amintoosi
authored at least 36 papers
between 2005 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
J. Supercomput., January, 2025
2024
A clarity and fairness aware framework for selecting workers in competitive crowdsourcing tasks.
Computing, September, 2024
J. Supercomput., April, 2024
2023
Briefings Bioinform., May, 2023
Secure communication in CloudIoT through design of a lightweight authentication and session key agreement scheme.
Int. J. Commun. Syst., 2023
2022
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Serv. Comput., 2022
ISC Int. J. Inf. Secur., 2022
IEEE Internet Things J., 2022
Comput. Electr. Eng., 2022
2021
On the Security of "Secure and Lightweight Authentication with Key Agreement for Smart Wearable Systems".
Wirel. Pers. Commun., 2021
A provably secure and lightweight authentication scheme for Internet of Drones for smart city surveillance.
J. Syst. Archit., 2021
SCiMet: Stable, sCalable and reliable Metric-based framework for quality assessment in collaborative content generation systems.
J. Informetrics, 2021
Intrusion Detection System Based on Gradient Corrected Online Sequential Extreme Learning Machine.
IEEE Access, 2021
An Iterative Model for Quality Assessment in Collaborative Content Generation Systems.
Proceedings of the Service-Oriented Computing - ICSOC 2021 Workshops, 2021
2020
A Systematic Literature Review of Integration of Blockchain and Artificial Intelligence.
Proceedings of the Blockchain Cybersecurity, Trust and Privacy, 2020
J. Supercomput., 2020
A secure and robust elliptic curve cryptography-based mutual authentication scheme for session initiation protocol.
Secur. Priv., 2020
A provably secure ECC-based roaming authentication scheme for global mobility networks.
J. Inf. Secur. Appl., 2020
Turkish J. Electr. Eng. Comput. Sci., 2020
Enhanced schemes for data fragmentation, allocation, and replication in distributed database systems.
Comput. Syst. Sci. Eng., 2020
2019
Cryptanalysis of Khatoon et al.'s ECC-based Authentication Protocol for Healthcare Systems.
CoRR, 2019
2018
Secur. Commun. Networks, 2018
2017
Proceedings of the Service Research and Innovation - 5th and 6th Australasian Symposium, 2017
Proceedings of the Service Research and Innovation - 5th and 6th Australasian Symposium, 2017
2015
J. Inf. Secur. Appl., 2015
Proceedings of the Tenth IEEE International Conference on Intelligent Sensors, 2015
2014
Mob. Networks Appl., 2014
2013
Providing Trustworthy Contributions via a Reputation Framework in Social Participatory Sensing Systems.
CoRR, 2013
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2013
Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems, 2013
2012
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2012
2005
Design and performance evaluation of a fuzzy based traffic conditioner for differentiated services.
Comput. Networks, 2005