Mohammad-Ali Doostari
Orcid: 0000-0001-9124-4083
According to our database1,
Mohammad-Ali Doostari
authored at least 14 papers
between 2008 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
J. Ambient Intell. Humaniz. Comput., March, 2023
2021
LAPTAS: lightweight anonymous privacy-preserving three-factor authentication scheme for WSN-based IIoT.
Wirel. Networks, 2021
J. Circuits Syst. Comput., 2021
2020
A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT.
Comput. Networks, 2020
2019
A DPA Attack on IOA Data-Dependent Delay Countermeasure Based on an Inherent Tempo-Spatial Data Dependency.
IEEE Trans. Circuits Syst. II Express Briefs, 2019
2018
NEMR: A Nonequidistant DPA Attack-Proof of Modular Reduction in a CRT Implementation of RSA.
J. Circuits Syst. Comput., 2018
Low-complexity and differential power analysis (DPA)-resistant two-folded power-aware Rivest-Shamir-Adleman (RSA) security schema implementation for IoT-connected devices.
IET Comput. Digit. Tech., 2018
2017
Comput. Networks, 2017
2015
A new secure Internet voting protocol using Java Card 3 technology and Java information flow concept.
Secur. Commun. Networks, 2015
2014
Design and implementation of a novel secure internet voting protocol using Java Card 3 technology.
Int. J. Bus. Inf. Syst., 2014
2013
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013
2009
Improving the Client Security Using the Smart Card and Trusted Server.
Proceedings of the 2009 International Conference on Security & Management, 2009
2008
Irregularity Analysis of Iris Patterns.
Proceedings of the 2008 International Conference on Image Processing, 2008