Follow
Mohammad Ali
Mohammad Ali
Assistant Professor, Amirkabir University of Technology (Tehran Polytechnic)
Verified email at aut.ac.ir
Title
Cited by
Cited by
Year
Lightweight revocable hierarchical attribute-based encryption for internet of things
M Ali, MR Sadeghi, X Liu
IEEE Access 8, 23951-23964, 2020
522020
A fully distributed hierarchical attribute-based encryption scheme
M Ali, J Mohajeri, MR Sadeghi, X Liu
Theoretical Computer Science 815, 25-46, 2020
472020
Verifiable online/offline multi-keyword search for cloud-assisted industrial internet of things
M Ali, MR Sadeghi, X Liu, Y Miao, AV Vasilakos
Journal of Information Security and Applications 65, 103101, 2022
312022
Attribute-based fine-grained access control for outscored private set intersection computation
M Ali, J Mohajeri, MR Sadeghi, X Liu
Information Sciences 536, 222-243, 2020
302020
Lightweight fine-grained access control for wireless body area networks
M Ali, MR Sadeghi, X Liu
Sensors 20 (4), 1088, 2020
212020
Anonymous aggregate fine-grained cloud data verification system for smart health
M Ali, MR Sadeghi, X Liu, AV Vasilakos
IEEE Transactions on Cloud Computing 11 (3), 2839-2855, 2023
112023
Lightweight verifiable data management system for cloud-assisted wireless body area networks
M Ali, X Liu
Peer-to-Peer Networking and Applications 15 (4), 1792-1816, 2022
112022
Provable secure lightweight attribute‐based keyword search for cloud‐based Internet of Things networks
M Ali, MR Sadeghi
Transactions on Emerging Telecommunications Technologies 32 (5), e3905, 2021
102021
Verifiable and privacy-preserving fine-grained data management in vehicular fog computing: A game theory-based approach
Z Seyedi, F Rahmati, M Ali, X Liu
Peer-to-Peer Networking and Applications 17 (1), 410-431, 2024
42024
Privacy-preserving joint data and function homomorphic encryption for cloud software services
A Hosseingholizadeh, F Rahmati, M Ali, H Damadi, X Liu
IEEE Internet of Things Journal 11 (1), 728-741, 2023
42023
A fully distributed revocable ciphertext-policy hierarchical attribute-based encryption without pairing
M Ali, J Mohajeri, MR Sadeghi
Cryptology ePrint Archive, 2018
42018
Attribute-Based Remote Data Auditing and User Authentication for Cloud Storage Systems.
M Ali
ISeCure 14 (3), 2022
22022
HUAP: Practical Attribute-based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices
M Chegenizadeh, M Ali, J Mohajeri, MR Aref
arXiv preprint arXiv:2107.10133, 2021
22021
Data Inspection and Access Control for 5 G Edge Computing-Enabled Internet of Medical Things
M Ali, A Hosseingholizadeh, X Liu
IEEE Transactions on Network Science and Engineering, 2024
12024
On the security of the hierarchical attribute based encryption scheme proposed by Wang et al
M Ali, J Mohajeri, MR Sadeghi
arXiv preprint arXiv:1810.05864, 2018
12018
Homomorphic multi-party computation for Internet of Medical Things
A Hosseingholizadeh, F Rahmati, M Ali, X Liu
Peer-to-Peer Networking and Applications 17 (6), 4049-4069, 2024
2024
A practical vehicular‐fog‐based privacy‐preserving attribute‐based keyword search system using potential games
Z Seyedi, F Rahmati, M Ali
Transactions on Emerging Telecommunications Technologies 35 (10), e5042, 2024
2024
A Novel Framework in Cloud Security: Remote Signcryption
M Ali, X Liu
IEEE Internet of Things Journal, 2024
2024
HUAP: Practical Attribute-Based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices
MRA Mostafa Chegenizadeh, Mohammad Ali, Javad Mohajeri
The ISC International Journal of Information Security 16 (1), 93-114, 2024
2024
A fully decentralized auditing approach for edge computing: A Game-Theoretic Perspective
Z Seyedi, F Rahmati, M Ali, X Liu
arXiv preprint arXiv:2312.16007, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–20