关注
Dr. Doostari
Dr. Doostari
Department of Computer Engineering, Shahed University
在 shahed.ac.ir 的电子邮件经过验证
标题
引用次数
引用次数
年份
A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT
M Fotouhi, M Bayat, AK Das, HAN Far, SM Pournaghi, MA Doostari
Computer Networks 177, 107333, 2020
1902020
LAPTAS: lightweight anonymous privacy-preserving three-factor authentication scheme for WSN-based IIoT
H Abdi Nasib Far, M Bayat, A Kumar Das, M Fotouhi, SM Pournaghi, ...
Wireless Networks 27 (2), 1389-1412, 2021
622021
Fully distributed ECC-based key management for mobile ad hoc networks
M Gharib, Z Moradlou, MA Doostari, A Movaghar
Computer Networks 113, 269-283, 2017
392017
An image watermarking method based on bidimensional empirical mode decomposition
J Taghia, MA Doostari, J Taghia
2008 Congress on Image and Signal Processing 5, 674-678, 2008
292008
A lightweight and efficient data sharing scheme for cloud computing
M Bayat, M Doostari, S Rezaei
International Journal of Electronics and Information Engineering 9 (2), 2018
272018
Low‐complexity and differential power analysis (DPA)‐resistant two‐folded power‐aware Rivest–Shamir–Adleman (RSA) security schema implementation for IoT‐connected devices
S Kaedi, MA Doostari, MB Ghaznavi‐Ghoushchi
IET Computers & Digital Techniques 12 (6), 279-288, 2018
182018
A simulation study on autonomous decentralized mechanism in fish behaviour model
N Sannomiya, MA Doustari
International journal of systems science 27 (10), 1001-1007, 1996
161996
A hybrid approach to multimodal biometric recognition based on feature-level fusion of face, two irises, and both thumbprints
MH Safavipour, MA Doostari, H Sadjedi
Journal of Medical Signals & Sensors 12 (3), 177-191, 2022
132022
A new method to persian text watermarking using curvaceous letters
H Yazdani, M Doostari, V Yazdani
Journal of Basic and Applied Scientific Research 3 (4), 2013
122013
A simulation study on schooling mechanism in fish behavior
MA Doustari, N Sannomiya
Transactions of the Institute of Systems, Control and Information Engineers …, 1992
121992
ESIV: an end-to-end secure internet voting system
NM Shakiba, MA Doostari, M Mohammadpourfard
Electronic Commerce Research 17, 463-494, 2017
112017
Subband-based single-channel source separation of instantaneous audio mixtures
J Taghia, MA Doostari
World Applied Sciences Journal 6 (6), 784-792, 2009
102009
Heuristic process model simplification in frequency response domain
M Shahbaz, M Shirvani, MA Doustary, Z Eksiri
International Journal of Engineering 17 (1), 19-39, 2004
102004
How does Fish School Change Form? A Hypothesis from Simulation Study
MA Doustari, N Sannomiya
Transactions of the Society of Instrument and Control Engineers 29 (12 …, 1993
81993
Deep Hybrid Multimodal Biometric Recognition System Based on Features‐Level Deep Fusion of Five Biometric Traits
MH Safavipour, MA Doostari, H Sadjedi
Computational Intelligence and Neuroscience 2023 (1), 6443786, 2023
72023
A new secure Internet voting protocol using Java Card 3 technology and Java information flow concept
M Mohammadpourfard, MA Doostari, MB Ghaznavi Ghoushchi, ...
Security and Communication Networks 8 (2), 261-283, 2015
72015
Fully distributed self certified key management for large-scale MANETs
Z Moradlu, MA Doostari, M Gharib, A Movaghar
2013 IEEE 10th International Conference on Ubiquitous Intelligence and …, 2013
62013
A new approach for secure and portable OS
HR Ghaleh, MA Doustari
2008 Second International Conference on Emerging Security Information …, 2008
62008
Irregularity Analysis of Iris Patterns.
A Golestani, A Ashouri, K Ahmadian, MR Jahed-Motlagh, MA Doostari
IPCV 8, 691-695, 2008
62008
Autonomous decentralized mechanism in fish behavior model
MA Doustari, N Sannomiya
Proceedings ISAD 93: International Symposium on Autonomous Decentralized …, 1993
61993
系统目前无法执行此操作,请稍后再试。
文章 1–20