Hamid Mala
Orcid: 0000-0002-7789-452X
According to our database1,
Hamid Mala
authored at least 54 papers
between 2009 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Secure fully-verifiable outsourcing of modular exponentiation: two servers check each other.
J. Supercomput., January, 2025
2024
IACR Cryptol. ePrint Arch., 2024
Expert Syst. Appl., 2024
2023
Privacy-preserving multi-party PCA computation on horizontally and vertically partitioned data based on outsourced QR decomposition.
J. Supercomput., September, 2023
ISC Int. J. Inf. Secur., July, 2023
2022
IEEE Trans. Dependable Secur. Comput., 2022
J. Inf. Secur. Appl., 2022
2021
Inf. Process. Manag., 2021
CoRR, 2021
Proceedings of the 18th International ISC Conference on Information Security and Cryptology, 2021
Proceedings of the 18th International ISC Conference on Information Security and Cryptology, 2021
Proceedings of the 26th International Computer Conference, Computer Society of Iran, 2021
2020
Multi-keyword ranked searchable encryption scheme with access control for cloud storage.
Peer-to-Peer Netw. Appl., 2020
Tracking and impersonating tags in a CRC-based ultralightweight RFID authentication protocol.
Peer-to-Peer Netw. Appl., 2020
Preserving Privacy of Software-Defined Networking Policies by Secure Multi-Party Computation.
J. Comput. Sci. Technol., 2020
Secure and efficient publicly verifiable outsourcing of matrix multiplication in online mode.
Clust. Comput., 2020
IEEE Access, 2020
2019
Efficient privacy-preserving group-nearest-neighbor queries with the presence of active adversaries.
Wirel. Networks, 2019
Mob. Networks Appl., 2019
J. Inf. Secur. Appl., 2019
Security analysis of an ultra-lightweight RFID authentication protocol for m-commerce.
Int. J. Commun. Syst., 2019
LACO: Lightweight Three-Factor Authentication, Access Control and Ownership Transfer Scheme for E-Health Systems in IoT.
Future Gener. Comput. Syst., 2019
Future Gener. Comput. Syst., 2019
Proceedings of the IEEE INFOCOM 2019, 2019
2018
DoS, impersonation and de-synchronization attacks against an ultra-lightweight RFID mutual authentication protocol for IoT.
J. Supercomput., 2018
Securing Heterogeneous Wireless Sensor Networks: Breaking and Fixing a Three-Factor Authentication Protocol.
Sensors, 2018
Breaking a Lightweight M2M Authentication Protocol for Communications in IIoT Environment.
IACR Cryptol. ePrint Arch., 2018
Security Analysis of Fan et al. Lightweight RFID Authentication Protocol for Privacy Protection in IoT.
IACR Cryptol. ePrint Arch., 2018
2017
IACR Cryptol. ePrint Arch., 2017
Des. Codes Cryptogr., 2017
Proceedings of the 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2017
2016
Proceedings of the 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology, 2016
2015
Security Analysis and Strengthening of an RFID Lightweight Authentication Protocol Suitable for VANETs.
Wirel. Pers. Commun., 2015
J. Cryptol., 2015
Comput. Stand. Interfaces, 2015
2014
Improving Radio Resource Utilization and User Level Fairness in OFDMA Femtocell Networks.
Wirel. Pers. Commun., 2014
Inf. Process. Lett., 2014
2013
IACR Cryptol. ePrint Arch., 2013
2012
Cryptanalysis of mCrypton - A lightweight block cipher for security of RFID tags and sensors.
Int. J. Commun. Syst., 2012
Des. Codes Cryptogr., 2012
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012
2011
J. Comput. Sci. Technol., 2011
IET Inf. Secur., 2011
IET Inf. Secur., 2011
2010
IACR Cryptol. ePrint Arch., 2010
Comput. Stand. Interfaces, 2010
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010
2009
Proceedings of the Selected Areas in Cryptography, 16th Annual International Workshop, 2009