Hamed Arshad
Orcid: 0000-0003-3885-7408
According to our database1,
Hamed Arshad
authored at least 18 papers
between 2014 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Sci. Comput. Program., January, 2024
2023
J. Cryptogr. Eng., September, 2023
2022
Semantic Attribute-Based Access Control: A review on current status and future perspectives.
J. Syst. Archit., 2022
Semantic Attribute-Based Encryption: A framework for combining ABE schemes with semantic technologies.
Inf. Sci., 2022
Process Algebra Can Save Lives: Static Analysis of XACML Access Control Policies Using mCRL2.
Proceedings of the Formal Techniques for Distributed Objects, Components, and Systems, 2022
2021
The Snowden Phone: A Comparative Survey of Secure Instant Messaging Mobile Applications.
Secur. Commun. Networks, 2021
2019
Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme.
Future Gener. Comput. Syst., 2019
2018
The Snowden Phone: A Comparative Survey of Secure Instant Messaging Mobile Applications (authors' version).
CoRR, 2018
2017
An Improved SIP Authentication Scheme Based on Server-Oriented Biometric Verification.
Wirel. Pers. Commun., 2017
Multim. Tools Appl., 2017
A secure authentication and key agreement scheme for roaming service with user anonymity.
Int. J. Commun. Syst., 2017
Design and FPGA implementation of an efficient security mechanism for mobile pay-TV systems.
Int. J. Commun. Syst., 2017
2016
An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC.
Multim. Tools Appl., 2016
Design of a Secure Authentication and Key Agreement Scheme Preserving User Privacy Usable in Telecare Medicine Information Systems.
J. Medical Syst., 2016
A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps.
Future Gener. Comput. Syst., 2016
2015
Security analysis and improvement of two authentication and key agreement schemes for session initiation protocol.
J. Supercomput., 2015
On the Security of a Two-Factor Authentication and Key Agreement Scheme for Telecare Medicine Information Systems.
J. Medical Syst., 2015
2014
Three-Factor Anonymous Authentication and Key Agreement Scheme for Telecare Medicine Information Systems.
J. Medical Syst., 2014