Follow
Mohammad hassan Ameri
Mohammad hassan Ameri
Computer Science at Purdue University
Verified email at purdue.edu - Homepage
Title
Cited by
Cited by
Year
A key-policy attribute-based temporary keyword search scheme for secure cloud storage
MH Ameri, M Delavar, J Mohajeri, M Salmasizadeh
IEEE Transactions on Cloud Computing 8 (3), 660-671, 2018
562018
PUF‐based solutions for secure communications in Advanced Metering Infrastructure (AMI)
M Delavar, S Mirzakuchaki, MH Ameri, J Mohajeri
International Journal of Communication Systems 30 (9), e3195, 2017
362017
Provably secure and efficient PUF‐based broadcast authentication schemes for smart grid applications
MH Ameri, M Delavar, J Mohajeri
International Journal of Communication Systems, 2019
122019
An efficient and secure data sharing in Smart Grid: Ciphertext-policy attribute-based signcryption
SM Sedaghat, MH Ameri, J Mohajeri, MR Aref
2017 Iranian Conference on Electrical Engineering (ICEE), 2003-2008, 2017
102017
A secure and privacy-preserving protocol for holding double auctions in smart grid
R Sarenche, M Salmasizadeh, MH Ameri, MR Aref
Information Sciences 557, 108-129, 2021
92021
A secure attribute based keyword search scheme against keyword guessing attack
V Yousefipoor, MH Ameri, J Mohajeri, T Eghlidos
2016 8th International Symposium on Telecommunications (IST), 124-128, 2016
92016
An Efficient and Secure Attribute-Based Signcryption Scheme for Smart Grid Applications
SM Sedaghat, MH Ameri, M Delavar, J Mohajeri, MR Aref
72018
A verifiable delegated set intersection without pairing
MM Oliaiy, MH Ameri, J Mohajeri, MR Aref
2017 Iranian Conference on Electrical Engineering (ICEE), 2047-2051, 2017
72017
Verifiable identity-based mix network
MA Ekhtiarabadi, HA Yajam, J Mohajeri, M Salmasizadeh
2015 23rd Iranian Conference on Electrical Engineering, 406-409, 2015
62015
A multi sender attribute-based broadcast authentication scheme
S Aghapour, MH Ameri, J Mohajeri
2016 8th International Symposium on Telecommunications (IST), 78-83, 2016
52016
Computationally Data-Independent Memory Hard Functions
MH Ameri, J Blocki, S Zhou
ITCS 2020, 2019
42019
An attribute-based anonymous broadcast encryption scheme with adaptive security in the standard model
R Rabaninejad, MH Ameri, M Delavar, J Mohajeri
Scientia Iranica 26 (3), 1700-1713, 2019
42019
A generic construction for verifiable attribute-based keyword search schemes
MH Ameri, MR Assar, J Mohajeri, M Salmasizadeh
Cryptology ePrint Archive, 2015
42015
A provably secure code‐based concurrent signature scheme
M Rajabzadeh Asaar, MH Ameri, M Salmasizadeh, MR Aref
IET Information Security 12 (1), 34-41, 2018
32018
On the security of YRL, an anonymous broadcast encryption scheme
R Rabaninejad, MH Ameri, M Delavar, J Mohajeri
2016 8th International Symposium on Telecommunications (IST), 752-755, 2016
32016
Efficient and Provable Secure Anonymous Hierarchical Identity-based Broadcast Encryption (HIBBE) Scheme without Random Oracle
MH Ameri, J Mohajeri, M Salmasizadeh
3*
On the Security of O-PSI a Delegated Private Set Intersection on Outsourced Datasets.
MM Oliaee, M Delavar, MH Ameri, J Mohajeri, MR Aref
ISeCure 10 (2), 2018
22018
On the Security of O-PSI a Delegated Private Set Intersection on Outsourced Datasets
MM Oliaee, M Delavar, MH Ameri, J Mohajeri, MR Aref
2017 14th International ISC (Iranian Society of Cryptology) Conference on …, 2017
22017
Cost-Asymmetric Memory Hard Password Hashing
W Bai, J Blocki, MH Ameri
International Conference on Security and Cryptography for Networks, 21-44, 2022
2022
Memory-hard puzzles in the standard model with applications to memory-hard functions and resource-bounded locally decodable codes
MH Ameri, AR Block, J Blocki
International Conference on Security and Cryptography for Networks, 45-68, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–20