Majid Bayat
According to our database1,
Majid Bayat
authored at least 33 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Light-PerIChain: Using lightweight scalable blockchain based on node performance and improved consensus algorithm in IoT systems.
Comput. Commun., January, 2024
2023
J. Ambient Intell. Humaniz. Comput., March, 2023
A conditional privacy-preserving fair electronic payment scheme based on blockchain without trusted third party.
J. Ambient Intell. Humaniz. Comput., 2023
2022
A Privacy Preserving Mutual Authentication Scheme Suitable for IoT-Based Medical Systems.
ISC Int. J. Inf. Secur., 2022
2021
LAPTAS: lightweight anonymous privacy-preserving three-factor authentication scheme for WSN-based IIoT.
Wirel. Networks, 2021
Efficient and dynamic verifiable multi-keyword searchable symmetric encryption with full security.
Multim. Tools Appl., 2021
Privacy Preserving Attribute-Based Encryption with Conjunctive Keyword Search for E-health Records in Cloud.
ISC Int. J. Inf. Secur., 2021
Fair multi-owner search over encrypted data with forward and backward privacy in cloud-assisted Internet of Things.
Future Gener. Comput. Syst., 2021
A new provable hierarchical anonymous certificateless authentication protocol with aggregate verification in ADS-B systems.
Comput. Networks, 2021
2020
Wirel. Networks, 2020
A secure key-aggregate authentication cryptosystem for data sharing in dynamic cloud storage.
Multim. Tools Appl., 2020
J. Intell. Transp. Syst., 2020
MedSBA: a novel and secure scheme to share medical data based on blockchain technology and attribute-based encryption.
J. Ambient Intell. Humaniz. Comput., 2020
Internet Things, 2020
A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT.
Comput. Networks, 2020
2019
J. Ambient Intell. Humaniz. Comput., 2019
A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications.
ISC Int. J. Inf. Secur., 2019
Cryptanalysis and Improvement of a User Authentication Scheme for Internet of Things Using Elliptic Curve Cryptography.
Int. J. Netw. Secur., 2019
Future Gener. Comput. Syst., 2019
2018
On the Design of a Secure Proxy Signature-based Handover Authentication Scheme for LTEWireless Networks.
IACR Cryptol. ePrint Arch., 2018
NECPPA: A novel and efficient conditional privacy-preserving authentication scheme for VANET.
Comput. Networks, 2018
2017
A Secure and Efficient Chaotic Maps Based Authenticated Key-Exchange Protocol for Smart Grid.
Wirel. Pers. Commun., 2017
Comput. Networks, 2017
2015
Wirel. Networks, 2015
A revocable attribute based data sharing scheme resilient to DoS attacks in smart grid.
Wirel. Networks, 2015
2013
A Secure and efficient elliptic curve based authentication and key agreement protocol suitable for WSN.
IACR Cryptol. ePrint Arch., 2013
2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
2011
IACR Cryptol. ePrint Arch., 2011
A Designated Verifier Proxy Signature Scheme with Fast Revocation without Random Oracles.
Proceedings of the Digital Information and Communication Technology and Its Applications, 2011
2010
A Novel Secure Bilinear Pairing Based Remote User Authentication Scheme with Smart Card.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010