Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks AH Adavoudi-Jolfaei, M Ashouri-Talouki, SF Aghili Peer-to-Peer Networking and Applications, 2017 | 74 | 2017 |
DoS, impersonation and de-synchronization attacks against an ultra-lightweight RFID mutual authentication protocol for IoT SF Aghili, M Ashouri-Talouki, H Mala The Journal of Supercomputing 74, 509-525, 2018 | 54 | 2018 |
Anonymous decentralized attribute-based access control for cloud-assisted IoT H Nasiraee, M Ashouri-Talouki Future Generation Computer Systems 110, 45-56, 2020 | 33 | 2020 |
GLP: A cryptographic approach for group location privacy M Ashouri-Talouki, A Baraani-Dastjerdi, AA Selçuk Computer Communications 35 (12), 1527-1533, 2012 | 33 | 2012 |
Multi-keyword ranked searchable encryption scheme with access control for cloud storage M Zarezadeh, H Mala, M Ashouri-Talouki Peer-to-Peer Networking and Applications 13 (1), 207-218, 2020 | 24 | 2020 |
Privacy-preserving distributed data access control for CloudIoT H Nasiraee, M Ashouri-Talouki IEEE Transactions on Dependable and Secure Computing 19 (4), 2476-2487, 2021 | 20 | 2021 |
SeVR+ :Secure and Privacy-Aware Cloud-Assisted Video Reporting in 5G Enabled Vehicular Networks A Mohseni-Ejiyeh, M Ashouri-Talouki Electrical Engineering (ICEE), 2017 25th Iranian Conference on, 2017 | 18* | 2017 |
The Cloaked-Centroid protocol: location privacy protection for a group of users of location-based services M Ashouri-Talouki, A Baraani-Dastjerdi, AA Selçuk Knowledge and Information Systems 45 (3), 589-615, 2015 | 15 | 2015 |
Homomorphic encryption to preserve location privacy M Ashouri-Talouki, A Baraani-Dastjerdi International Journal of Security and Its Applications 6 (4), 183-189, 2012 | 15 | 2012 |
An efficient privacy-preserving data aggregation scheme in smart grid A Karampour, M Ashouri-Talouki, BT Ladani 2019 27th Iranian Conference on Electrical Engineering (ICEE), 1967-1971, 2019 | 14 | 2019 |
Blockchain for steganography: advantages, new algorithms and open challenges O Torki, M Ashouri-Talouki, M Mahdavi 18th International ISC Conference on Information Security and Cryptology …, 2021 | 10 | 2021 |
Developing Ghasedak: a mobile application to improve the quality of cancer palliative care N Salimian, A Ehteshami, M Ashouri-Talouki Acta Informatica Medica 27 (1), 19, 2019 | 10 | 2019 |
An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks A Mohseni-Ejiyeh, M Ashouri-Talouki, M Mahdavi The ISC Int'l Journal of Information Security (ISeCure) 10, 15-27, 2018 | 9 | 2018 |
Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems. M Zarezadeh, MA Taluki, M Siavashi ISeCure 12 (2), 2020 | 7 | 2020 |
K-anonymity privacy protection using ontology MA Talouki, M NematBakhsh, A Baraani 2009 14th International CSI Computer Conference, 682-685, 2009 | 7 | 2009 |
A white-box generator membership inference attack against generative models M Azadmanesh, BS Ghahfarokhi, MA Talouki 2021 18th International ISC Conference on Information Security and …, 2021 | 6 | 2021 |
ADAM-DPGAN: a differential private mechanism for generative adversarial network M Azadmanesh, BS Ghahfarokhi, MA Talouki Applied Intelligence 53 (9), 11142-11161, 2023 | 5 | 2023 |
A lightweight and secure data sharing protocol for D2D communications A Mohseni-Ejiyeh, M Ashouri-Talouki, M Mahdavi 2017 14th International ISC (Iranian Society of Cryptology) Conference on …, 2017 | 5 | 2017 |
Cryptographic collusion-resistant protocols for secure sum M Ashouri-Talouki, A Baraani-Dastjerdi International Journal of Electronic Security and Digital Forensics 9 (1), 19-34, 2017 | 4 | 2017 |
Anonymous electronic voting protocol with deniable authentication for mobile ad hoc networks M Ashouri-Talouki, A Baraani-Dastjerdi International Journal of Multimedia and Ubiquitous Engineering 9 (1), 361-368, 2014 | 4 | 2014 |