A secure authentication scheme for VANETs with batch verification M Bayat, M Barmshoory, M Rahimi, MR Aref Wireless networks 21, 1733-1743, 2015 | 267 | 2015 |
A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT M Fotouhi, M Bayat, AK Das, HAN Far, SM Pournaghi, MA Doostari Computer Networks 177, 107333, 2020 | 197 | 2020 |
MedSBA: a novel and secure scheme to share medical data based on blockchain technology and attribute-based encryption SM Pournaghi, M Bayat, Y Farjami Journal of Ambient Intelligence and Humanized Computing, 1-29, 2020 | 147 | 2020 |
NECPPA: A novel and efficient conditional privacy-preserving authentication scheme for VANET SM Pournaghi, B Zahednejad, M Bayat, Y Farjami Computer Networks 134, 78-92, 2018 | 140 | 2018 |
NERA: A new and efficient RSU based authentication scheme for VANETs M Bayat, M Pournaghi, M Rahimi, M Barmshoory Wireless Networks, 1-16, 2019 | 94 | 2019 |
A secure ECC-based privacy preserving data aggregation scheme for smart grids E Vahedi, M Bayat, MR Pakravan, MR Aref Computer Networks 129, 28-36, 2017 | 77 | 2017 |
LAPTAS: lightweight anonymous privacy-preserving three-factor authentication scheme for WSN-based IIoT HAN Far, M Bayat, AK Das, M Fotouhi, SM Pournaghi, MA Doostari Wireless Networks, 1-24, 2021 | 64* | 2021 |
A new and efficient authentication scheme for vehicular ad hoc networks M Bayat, M Barmshoory, SM Pournaghi, M Rahimi, Y Farjami, MR Aref Journal of Intelligent Transportation Systems 24 (2), 171-183, 2020 | 35 | 2020 |
Vulnerability of two multiple-key agreement protocols MS Farash, M Bayat, MA Attari Computers & Electrical Engineering 37 (2), 199-204, 2011 | 32 | 2011 |
A new provable hierarchical anonymous certificateless authentication protocol with aggregate verification in ADS-B systems A Asari, MR Alagheband, M Bayat, MR Asaar Computer Networks 185, 107599, 2021 | 31 | 2021 |
A Lightweight and Efficient Data Sharing Scheme for Cloud Computing S Rezaei, MA Doostari, M Bayat I.J. of Electronics and Information Engineering 9 (2), 115-131, 2018 | 27* | 2018 |
A lightweight hierarchical authentication scheme for internet of things A Akbarzadeh, M Bayat, B Zahednejad, A Payandeh, MR Aref Journal of Ambient Intelligence and Humanized Computing 10, 2607-2619, 2019 | 26 | 2019 |
A novel secure bilinear pairing based remote user authentication scheme with smart card M Bayat, M Sabzinejad, A Movahed 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing …, 2010 | 26 | 2010 |
A Certificateless Multiple-key Agreement Protocol without Hash Functions Based on Bilinear Pairings M Sabzinejad, MA Attari, M Bayat International Journal of Engineering and Technology (IJET) 4 (3), 321-325, 2012 | 20 | 2012 |
Verifiable ranked search over encrypted data with forward and backward privacy A Najafi, HHS Javadi, M Bayat Future Generation Computer Systems 101, 410-419, 2019 | 18 | 2019 |
An Attribute Based Key Agreement Protocol Resilient to KCI Attack M Bayat, MR Aref International Journal of Electronics and Information Engineering 2 (1), 9-17, 2015 | 18 | 2015 |
Efficient and dynamic verifiable multi-keyword searchable symmetric encryption with full security A Najafi, HHS Javadi, M Bayat Multimedia Tools and Applications 80 (17), 26049-26068, 2021 | 17 | 2021 |
Cryptanalysis and Improvement of a User Authentication Scheme for Internet of Things Using Elliptic Curve Cryptography. M Bayat, M Beheshti-Atashgah, M Barari, MR Aref Int. J. Netw. Secur. 21 (6), 897-911, 2019 | 16 | 2019 |
A conditional privacy-preserving fair electronic payment scheme based on blockchain without trusted third party Z Hatefi, M Bayat, MR Alaghband, N Hamian, SM Pournaghi Journal of Ambient Intelligence and Humanized Computing 14 (8), 10089-10102, 2023 | 14 | 2023 |
A secure key-aggregate authentication cryptosystem for data sharing in dynamic cloud storage K Alimohammadi, M Bayat, HHS Javadi Multimedia Tools and Applications 79, 2855-2872, 2020 | 14 | 2020 |