default search action
Mohammad Ali 0003
Person information
- affiliation: Amirkabir University of Technology, Tehran, Iran
Other persons with the same name
- Mohammad Ali — disambiguation page
- Mohammad Ali 0001 — Coventry University, Coventry Business School, UK
- Mohammad Ali 0002 — Zenuity AB, Gothenburg, Sweden (and 2 more)
- Mohammad Ali 0004 — Aligarh Muslim University, India
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Amin Hosseingholizadeh, Farhad Rahmati, Mohammad Ali, Hamid Damadi, Ximeng Liu:
Privacy-Preserving Joint Data and Function Homomorphic Encryption for Cloud Software Services. IEEE Internet Things J. 11(1): 728-741 (2024) - [j12]Mostafa Chegenizadeh, Mohammad Ali, Javad Mohajeri, Mohammad Reza Aref:
HUAP: Practical Attribute-Based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices. ISC Int. J. Inf. Secur. 16(1): 93-114 (2024) - [j11]Zahra Seyedi, Farhad Rahmati, Mohammad Ali, Ximeng Liu:
Verifiable and privacy-preserving fine-grained data management in vehicular fog computing: A game theory-based approach. Peer Peer Netw. Appl. 17(1): 410-431 (2024) - [j10]Mohammad Ali, Amin Hosseingholizadeh, Ximeng Liu:
Data Inspection and Access Control for 5G Edge Computing-Enabled Internet of Medical Things. IEEE Trans. Netw. Sci. Eng. 11(5): 4120-4133 (2024) - 2023
- [j9]Mohammad Ali, Mohammad-Reza Sadeghi, Ximeng Liu, Athanasios V. Vasilakos:
Anonymous Aggregate Fine-Grained Cloud Data Verification System for Smart Health. IEEE Trans. Cloud Comput. 11(3): 2839-2855 (2023) - [i5]Mohammad Ali, Ximeng Liu:
Federated Online/Offline Remote Data Inspection for Distributed Edge Computing. CoRR abs/2308.05198 (2023) - [i4]Zahra Seyedi, Farhad Rahmati, Mohammad Ali, Ximeng Liu:
A fully decentralized auditing approach for edge computing: A Game-Theoretic Perspective. CoRR abs/2312.16007 (2023) - 2022
- [j8]Mohammad Ali:
Attribute-Based Remote Data Auditing and User Authentication for Cloud Storage Systems. ISC Int. J. Inf. Secur. 14(3): 43-49 (2022) - [j7]Mohammad Ali, Mohammadreza Sadeghi, Ximeng Liu, Yinbin Miao, Athanasios V. Vasilakos:
Verifiable online/offline multi-keyword search for cloud-assisted Industrial Internet of Things. J. Inf. Secur. Appl. 65: 103101 (2022) - [j6]Mohammad Ali, Ximeng Liu:
Lightweight verifiable data management system for cloud-assisted wireless body area networks. Peer-to-Peer Netw. Appl. 15(4): 1792-1816 (2022) - 2021
- [j5]Mohammad Ali, Mohammad-Reza Sadeghi:
Provable secure lightweight attribute-based keyword search for cloud-based Internet of Things networks. Trans. Emerg. Telecommun. Technol. 32(5) (2021) - [i3]Mostafa Chegenizadeh, Mohammad Ali, Javad Mohajeri, Mohammad Reza Aref:
HUAP: Practical Attribute-based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices. CoRR abs/2107.10133 (2021) - 2020
- [j4]Mohammad Ali, Mohammad-Reza Sadeghi, Ximeng Liu:
Lightweight Revocable Hierarchical Attribute-Based Encryption for Internet of Things. IEEE Access 8: 23951-23964 (2020) - [j3]Mohammad Ali, Javad Mohajeri, Mohammad-Reza Sadeghi, Ximeng Liu:
Attribute-based fine-grained access control for outscored private set intersection computation. Inf. Sci. 536: 222-243 (2020) - [j2]Mohammad Ali, Mohammad-Reza Sadeghi, Ximeng Liu:
Lightweight Fine-Grained Access Control for Wireless Body Area Networks. Sensors 20(4): 1088 (2020) - [j1]Mohammad Ali, Javad Mohajeri, Mohammad-Reza Sadeghi, Ximeng Liu:
A fully distributed hierarchical attribute-based encryption scheme. Theor. Comput. Sci. 815: 25-46 (2020)
2010 – 2019
- 2019
- [c1]Mostafa Chegenizadeh, Mohammad Ali, Javad Mohajeri, Mohammad Reza Aref:
An Anonymous Attribute-based Access Control System Supporting Access Structure Update. ISCISC 2019: 85-91 - 2018
- [i2]Mohammad Ali, Javad Mohajeri, Mohammad-Reza Sadeghi:
On the security of the hierarchical attribute based encryption scheme proposed by Wang et al. CoRR abs/1810.05864 (2018) - [i1]Mohammad Ali, Javad Mohajeri, Mohammad-Reza (Rafsanjani) Sadeghi:
A fully distributed revocable ciphertext-policy hierarchical attribute-based encryption without pairing. IACR Cryptol. ePrint Arch. 2018: 1102 (2018)
Coauthor Index
aka: Mohammad-Reza (Rafsanjani) Sadeghi
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-10 02:07 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint