Mohammad Ali

Orcid: 0000-0002-8685-0991

Affiliations:
  • Amirkabir University of Technology, Tehran, Iran


According to our database1, Mohammad Ali authored at least 19 papers between 2018 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A practical vehicular-fog-based privacy-preserving attribute-based keyword search system using potential games.
Trans. Emerg. Telecommun. Technol., October, 2024

Verifiable and privacy-preserving fine-grained data management in vehicular fog computing: A game theory-based approach.
Peer Peer Netw. Appl., January, 2024

HUAP: Practical Attribute-Based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices.
ISC Int. J. Inf. Secur., January, 2024

Privacy-Preserving Joint Data and Function Homomorphic Encryption for Cloud Software Services.
IEEE Internet Things J., January, 2024

Data Inspection and Access Control for 5G Edge Computing-Enabled Internet of Medical Things.
IEEE Trans. Netw. Sci. Eng., 2024

2023
Anonymous Aggregate Fine-Grained Cloud Data Verification System for Smart Health.
IEEE Trans. Cloud Comput., 2023

A fully decentralized auditing approach for edge computing: A Game-Theoretic Perspective.
CoRR, 2023

Federated Online/Offline Remote Data Inspection for Distributed Edge Computing.
CoRR, 2023

2022
Lightweight verifiable data management system for cloud-assisted wireless body area networks.
Peer-to-Peer Netw. Appl., 2022

Verifiable online/offline multi-keyword search for cloud-assisted Industrial Internet of Things.
J. Inf. Secur. Appl., 2022

Attribute-Based Remote Data Auditing and User Authentication for Cloud Storage Systems.
ISC Int. J. Inf. Secur., 2022

2021
Provable secure lightweight attribute-based keyword search for cloud-based Internet of Things networks.
Trans. Emerg. Telecommun. Technol., 2021

2020
A fully distributed hierarchical attribute-based encryption scheme.
Theor. Comput. Sci., 2020

Lightweight Fine-Grained Access Control for Wireless Body Area Networks.
Sensors, 2020

Attribute-based fine-grained access control for outscored private set intersection computation.
Inf. Sci., 2020

Lightweight Revocable Hierarchical Attribute-Based Encryption for Internet of Things.
IEEE Access, 2020

2019
An Anonymous Attribute-based Access Control System Supporting Access Structure Update.
Proceedings of the 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2019

2018
A fully distributed revocable ciphertext-policy hierarchical attribute-based encryption without pairing.
IACR Cryptol. ePrint Arch., 2018

On the security of the hierarchical attribute based encryption scheme proposed by Wang et al.
CoRR, 2018


  Loading...