Mohammad Ali Hadavi
According to our database1,
Mohammad Ali Hadavi
authored at least 20 papers
between 2008 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2022
ISC Int. J. Inf. Secur., 2022
ISC Int. J. Inf. Secur., 2022
2021
ISC Int. J. Inf. Secur., 2021
Proceedings of the 18th International ISC Conference on Information Security and Cryptology, 2021
2019
A Trust Based Probabilistic Method for Efficient Correctness Verification in Database Outsourcing.
ISC Int. J. Inf. Secur., 2019
Proceedings of the 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2019
2018
Proceedings of the 15th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2018
Proceedings of the 15th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2018
2017
Proceedings of the 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2017
2016
Distributed Parallel Databases, 2016
2015
(<i>t</i>, <i>k</i>)-Hypergraph anonymization: an approach for secure data publishing.
Secur. Commun. Networks, 2015
Int. J. Inf. Sec., 2015
2012
Correctness Verification in Database Outsourcing: A Trust-Based Fake Tuples Approach.
Proceedings of the Information Systems Security, 8th International Conference, 2012
AS5: A Secure Searchable Secret Sharing Scheme for Privacy Preserving Database Outsourcing.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012
Proceedings of the Data and Applications Security and Privacy XXVI, 2012
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012
2011
ISC Int. J. Inf. Secur., 2011
Access control enforcement on outsourced data ensuring privacy of access control policies.
Proceedings of the 2011 International Conference on High Performance Computing & Simulation, 2011
Proceedings of the Information Systems Security - 7th International Conference, 2011
2008
Proceedings of the The Third International Conference on Availability, 2008