Theo dõi
Dr. Doostari
Dr. Doostari
Department of Computer Engineering, Shahed University
Email được xác minh tại shahed.ac.ir
Tiêu đề
Trích dẫn bởi
Trích dẫn bởi
Năm
A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT
M Fotouhi, M Bayat, AK Das, HAN Far, SM Pournaghi, MA Doostari
Computer Networks 177, 107333, 2020
2162020
LAPTAS: Lightweight anonymous privacy-preserving three-factor authentication scheme for WSN-based IIoT
H Abdi Nasib Far, M Bayat, A Kumar Das, M Fotouhi, SM Pournaghi, ...
Wireless Networks 27 (2), 1389-1412, 2021
722021
Fully distributed ECC-based key management for mobile ad hoc networks
M Gharib, Z Moradlou, MA Doostari, A Movaghar
Computer Networks 113, 269-283, 2017
392017
An image watermarking method based on bidimensional empirical mode decomposition
J Taghia, MA Doostari, J Taghia
2008 Congress on Image and Signal Processing 5, 674-678, 2008
292008
A lightweight and efficient data sharing scheme for cloud computing
S Rezaei, MA Doostari, M Bayat
International Journal of Electronics and Information Engineering 9 (2), 115-131, 2018
262018
Low‐complexity and differential power analysis (DPA)‐resistant two‐folded power‐aware Rivest–Shamir–Adleman (RSA) security schema implementation for IoT‐connected devices
S Kaedi, MA Doostari, MB Ghaznavi‐Ghoushchi
IET Computers & Digital Techniques 12 (6), 279-288, 2018
182018
A hybrid approach to multimodal biometric recognition based on feature-level fusion of face, two irises, and both thumbprints
MH Safavipour, MA Doostari, H Sadjedi
Journal of Medical Signals & Sensors 12 (3), 177-191, 2022
162022
A simulation study on autonomous decentralized mechanism in fish behaviour model
N Sannomiya, MA Doustari
International journal of systems science 27 (10), 1001-1007, 1996
161996
A new method to persian text watermarking using curvaceous letters
H Yazdani, M Doostari, V Yazdani
Journal of Basic and Applied Scientific Research 3 (4), 2013
132013
Deep Hybrid Multimodal Biometric Recognition System Based on Features‐Level Deep Fusion of Five Biometric Traits
MH Safavipour, MA Doostari, H Sadjedi
Computational Intelligence and Neuroscience 2023 (1), 6443786, 2023
122023
ESIV: an end-to-end secure internet voting system
NM Shakiba, MA Doostari, M Mohammadpourfard
Electronic Commerce Research 17, 463-494, 2017
122017
A simulation study on schooling mechanism in fish behavior
MA Doustari, N Sannomiya
Transactions of the Institute of Systems, Control and Information Engineers …, 1992
121992
Subband-based single-channel source separation of instantaneous audio mixtures
J Taghia, MA Doostari
World Applied Sciences Journal 6 (6), 784-792, 2009
102009
Heuristic process model simplification in frequency response domain
M Shirvani, MA DOUSTARI, M Shahbaz, Z Eksiri
INTERNATIONAL JOURNAL OF ENGINEERING 17 (1), 19-39, 2004
92004
A New Side-Channel Attack on Reduction of RSA-CRT Montgomery Method Based
S Kaedi, MA Doostari, MB Ghaznavi-Ghoushchi, H Yusefi
Journal of Circuits, Systems and Computers 30 (03), 2150038, 2021
82021
How does Fish School Change Form? A Hypothesis from Simulation Study
MA Doustari, N Sannomiya
Transactions of the Society of Instrument and Control Engineers 29 (12 …, 1993
81993
A new secure Internet voting protocol using Java Card 3 technology and Java information flow concept
M Mohammadpourfard, MA Doostari, MB Ghaznavi Ghoushchi, ...
Security and Communication Networks 8 (2), 261-283, 2015
72015
Blockchain based authentication and access verfication scheme in smart home
A Heshmati, M Bayat, MA Doostari, SM Pournaghi
Journal of Ambient Intelligence and Humanized Computing 14 (3), 2525-2547, 2023
62023
Fully distributed self certified key management for large-scale MANETs
Z Moradlu, MA Doostari, M Gharib, A Movaghar
2013 IEEE 10th International Conference on Ubiquitous Intelligence and …, 2013
62013
A new approach for secure and portable OS
HR Ghaleh, MA Doustari
2008 Second International Conference on Emerging Security Information …, 2008
62008
Hệ thống không thể thực hiện thao tác ngay bây giờ. Hãy thử lại sau.
Bài viết 1–20