A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT M Fotouhi, M Bayat, AK Das, HAN Far, SM Pournaghi, MA Doostari Computer Networks 177, 107333, 2020 | 190 | 2020 |
LAPTAS: lightweight anonymous privacy-preserving three-factor authentication scheme for WSN-based IIoT H Abdi Nasib Far, M Bayat, A Kumar Das, M Fotouhi, SM Pournaghi, ... Wireless Networks 27 (2), 1389-1412, 2021 | 62 | 2021 |
Fully distributed ECC-based key management for mobile ad hoc networks M Gharib, Z Moradlou, MA Doostari, A Movaghar Computer Networks 113, 269-283, 2017 | 39 | 2017 |
An image watermarking method based on bidimensional empirical mode decomposition J Taghia, MA Doostari, J Taghia 2008 Congress on Image and Signal Processing 5, 674-678, 2008 | 29 | 2008 |
A lightweight and efficient data sharing scheme for cloud computing M Bayat, M Doostari, S Rezaei International Journal of Electronics and Information Engineering 9 (2), 2018 | 27 | 2018 |
Low‐complexity and differential power analysis (DPA)‐resistant two‐folded power‐aware Rivest–Shamir–Adleman (RSA) security schema implementation for IoT‐connected devices S Kaedi, MA Doostari, MB Ghaznavi‐Ghoushchi IET Computers & Digital Techniques 12 (6), 279-288, 2018 | 18 | 2018 |
A simulation study on autonomous decentralized mechanism in fish behaviour model N Sannomiya, MA Doustari International journal of systems science 27 (10), 1001-1007, 1996 | 16 | 1996 |
A hybrid approach to multimodal biometric recognition based on feature-level fusion of face, two irises, and both thumbprints MH Safavipour, MA Doostari, H Sadjedi Journal of Medical Signals & Sensors 12 (3), 177-191, 2022 | 13 | 2022 |
A new method to persian text watermarking using curvaceous letters H Yazdani, M Doostari, V Yazdani Journal of Basic and Applied Scientific Research 3 (4), 2013 | 12 | 2013 |
A simulation study on schooling mechanism in fish behavior MA Doustari, N Sannomiya Transactions of the Institute of Systems, Control and Information Engineers …, 1992 | 12 | 1992 |
ESIV: an end-to-end secure internet voting system NM Shakiba, MA Doostari, M Mohammadpourfard Electronic Commerce Research 17, 463-494, 2017 | 11 | 2017 |
Subband-based single-channel source separation of instantaneous audio mixtures J Taghia, MA Doostari World Applied Sciences Journal 6 (6), 784-792, 2009 | 10 | 2009 |
Heuristic process model simplification in frequency response domain M Shahbaz, M Shirvani, MA Doustary, Z Eksiri International Journal of Engineering 17 (1), 19-39, 2004 | 10 | 2004 |
How does Fish School Change Form? A Hypothesis from Simulation Study MA Doustari, N Sannomiya Transactions of the Society of Instrument and Control Engineers 29 (12 …, 1993 | 8 | 1993 |
Deep Hybrid Multimodal Biometric Recognition System Based on Features‐Level Deep Fusion of Five Biometric Traits MH Safavipour, MA Doostari, H Sadjedi Computational Intelligence and Neuroscience 2023 (1), 6443786, 2023 | 7 | 2023 |
A new secure Internet voting protocol using Java Card 3 technology and Java information flow concept M Mohammadpourfard, MA Doostari, MB Ghaznavi Ghoushchi, ... Security and Communication Networks 8 (2), 261-283, 2015 | 7 | 2015 |
Fully distributed self certified key management for large-scale MANETs Z Moradlu, MA Doostari, M Gharib, A Movaghar 2013 IEEE 10th International Conference on Ubiquitous Intelligence and …, 2013 | 6 | 2013 |
A new approach for secure and portable OS HR Ghaleh, MA Doustari 2008 Second International Conference on Emerging Security Information …, 2008 | 6 | 2008 |
Irregularity Analysis of Iris Patterns. A Golestani, A Ashouri, K Ahmadian, MR Jahed-Motlagh, MA Doostari IPCV 8, 691-695, 2008 | 6 | 2008 |
Autonomous decentralized mechanism in fish behavior model MA Doustari, N Sannomiya Proceedings ISAD 93: International Symposium on Autonomous Decentralized …, 1993 | 6 | 1993 |