Lightweight revocable hierarchical attribute-based encryption for internet of things M Ali, MR Sadeghi, X Liu IEEE Access 8, 23951-23964, 2020 | 52 | 2020 |
A fully distributed hierarchical attribute-based encryption scheme M Ali, J Mohajeri, MR Sadeghi, X Liu Theoretical Computer Science 815, 25-46, 2020 | 47 | 2020 |
Verifiable online/offline multi-keyword search for cloud-assisted industrial internet of things M Ali, MR Sadeghi, X Liu, Y Miao, AV Vasilakos Journal of Information Security and Applications 65, 103101, 2022 | 31 | 2022 |
Attribute-based fine-grained access control for outscored private set intersection computation M Ali, J Mohajeri, MR Sadeghi, X Liu Information Sciences 536, 222-243, 2020 | 30 | 2020 |
Lightweight fine-grained access control for wireless body area networks M Ali, MR Sadeghi, X Liu Sensors 20 (4), 1088, 2020 | 21 | 2020 |
Anonymous aggregate fine-grained cloud data verification system for smart health M Ali, MR Sadeghi, X Liu, AV Vasilakos IEEE Transactions on Cloud Computing 11 (3), 2839-2855, 2023 | 11 | 2023 |
Lightweight verifiable data management system for cloud-assisted wireless body area networks M Ali, X Liu Peer-to-Peer Networking and Applications 15 (4), 1792-1816, 2022 | 11 | 2022 |
Provable secure lightweight attribute‐based keyword search for cloud‐based Internet of Things networks M Ali, MR Sadeghi Transactions on Emerging Telecommunications Technologies 32 (5), e3905, 2021 | 10 | 2021 |
Verifiable and privacy-preserving fine-grained data management in vehicular fog computing: A game theory-based approach Z Seyedi, F Rahmati, M Ali, X Liu Peer-to-Peer Networking and Applications 17 (1), 410-431, 2024 | 4 | 2024 |
Privacy-preserving joint data and function homomorphic encryption for cloud software services A Hosseingholizadeh, F Rahmati, M Ali, H Damadi, X Liu IEEE Internet of Things Journal 11 (1), 728-741, 2023 | 4 | 2023 |
A fully distributed revocable ciphertext-policy hierarchical attribute-based encryption without pairing M Ali, J Mohajeri, MR Sadeghi Cryptology ePrint Archive, 2018 | 4 | 2018 |
Attribute-Based Remote Data Auditing and User Authentication for Cloud Storage Systems. M Ali ISeCure 14 (3), 2022 | 2 | 2022 |
HUAP: Practical Attribute-based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices M Chegenizadeh, M Ali, J Mohajeri, MR Aref arXiv preprint arXiv:2107.10133, 2021 | 2 | 2021 |
Data Inspection and Access Control for 5 G Edge Computing-Enabled Internet of Medical Things M Ali, A Hosseingholizadeh, X Liu IEEE Transactions on Network Science and Engineering, 2024 | 1 | 2024 |
On the security of the hierarchical attribute based encryption scheme proposed by Wang et al M Ali, J Mohajeri, MR Sadeghi arXiv preprint arXiv:1810.05864, 2018 | 1 | 2018 |
Homomorphic multi-party computation for Internet of Medical Things A Hosseingholizadeh, F Rahmati, M Ali, X Liu Peer-to-Peer Networking and Applications 17 (6), 4049-4069, 2024 | | 2024 |
A practical vehicular‐fog‐based privacy‐preserving attribute‐based keyword search system using potential games Z Seyedi, F Rahmati, M Ali Transactions on Emerging Telecommunications Technologies 35 (10), e5042, 2024 | | 2024 |
A Novel Framework in Cloud Security: Remote Signcryption M Ali, X Liu IEEE Internet of Things Journal, 2024 | | 2024 |
HUAP: Practical Attribute-Based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices MRA Mostafa Chegenizadeh, Mohammad Ali, Javad Mohajeri The ISC International Journal of Information Security 16 (1), 93-114, 2024 | | 2024 |
A fully decentralized auditing approach for edge computing: A Game-Theoretic Perspective Z Seyedi, F Rahmati, M Ali, X Liu arXiv preprint arXiv:2312.16007, 2023 | | 2023 |