Maryam Rajabzadeh Asaar
Orcid: 0000-0001-6049-2113Affiliations:
- Islamic Azad University, Tehran, Iran
According to our database1,
Maryam Rajabzadeh Asaar
authored at least 47 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
ISC Int. J. Inf. Secur., July, 2024
Int. J. Inf. Sec., June, 2024
A blockchain-based anonymous reporting system with no central authority: Architecture and protocol.
Cyber Secur. Appl., 2024
2023
Peer Peer Netw. Appl., March, 2023
J. Inf. Secur. Appl., March, 2023
Comput. Ind. Eng., March, 2023
Toward Metaverse of everything: Opportunities, challenges, and future directions of the next generation of visual/virtual communications.
J. Netw. Comput. Appl., 2023
2022
A Lightweight Auditing Service for Shared Data with Secure User Revocation in Cloud Storage.
IEEE Trans. Serv. Comput., 2022
BB-CSP: An Efficient Blockchain-Based Collective Salary Payment Framework Using Weighted Functional Encryption.
SN Comput. Sci., 2022
Int. J. Internet Protoc. Technol., 2022
Clust. Comput., 2022
2021
An efficient hash-based authentication protocol for wireless sensor networks in Internet of Things applications with forward secrecy.
Int. J. Commun. Syst., 2021
Comput. Networks, 2021
A new provable hierarchical anonymous certificateless authentication protocol with aggregate verification in ADS-B systems.
Comput. Networks, 2021
2020
A lightweight identity-based provable data possession supporting users' identity privacy and traceability.
J. Inf. Secur. Appl., 2020
A lightweight anonymous two-factor authentication protocol for wireless sensor networks in Internet of Vehicles.
Int. J. Commun. Syst., 2020
Clust. Comput., 2020
2019
J. Netw. Comput. Appl., 2019
2018
IEEE Trans. Veh. Technol., 2018
Int. J. Commun. Syst., 2018
2017
Proceedings of the 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2017
2016
Proxy-based Authentication Scheme for Vehicular Ad Hoc Networks: Security Analysis and an Efficient Scheme.
IACR Cryptol. ePrint Arch., 2016
Code-based Strong Designated Verifier Signatures: Security Analysis and a New Construction.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
2015
Secur. Commun. Networks, 2015
Identity-based proxy signatures: a generic construction and a concrete scheme from RSA.
Secur. Commun. Networks, 2015
ISC Int. J. Inf. Secur., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Comput. Stand. Interfaces, 2015
An Identity-Based Multi-Proxy Multi-Signature Scheme Without Bilinear Pairings and its Variants.
Comput. J., 2015
2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014
2013
ISC Int. J. Inf. Secur., 2013
Proceedings of the 10th International ISC Conference on Information Security and Cryptology, 2013
Proceedings of the 10th International ISC Conference on Information Security and Cryptology, 2013
Non-Delegatable Strong Designated Verifier Signature Using a Trusted Third Party without Pairings.
Proceedings of the Eleventh Australasian Information Security Conference, 2013
2012
A Non-delegatable Identity-based Designated Verifier Signature Scheme without Bilinear Pairings.
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
2011
ISC Int. J. Inf. Secur., 2011
2008
Int. J. Electron. Secur. Digit. Forensics, 2008
Security Modification for the Hwang-Wen-Hwang's E-voting Scheme.
Proceedings of the 2008 International Conference on Security & Management, 2008