Follow
Majid Bayat
Majid Bayat
Associate Professor of Computer Engineering, Shahed University, Tehran, Iran
Verified email at shahed.ac.ir
Title
Cited by
Cited by
Year
A secure authentication scheme for VANETs with batch verification
M Bayat, M Barmshoory, M Rahimi, MR Aref
Wireless networks 21, 1733-1743, 2015
2672015
A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT
M Fotouhi, M Bayat, AK Das, HAN Far, SM Pournaghi, MA Doostari
Computer Networks 177, 107333, 2020
1972020
MedSBA: a novel and secure scheme to share medical data based on blockchain technology and attribute-based encryption
SM Pournaghi, M Bayat, Y Farjami
Journal of Ambient Intelligence and Humanized Computing, 1-29, 2020
1472020
NECPPA: A novel and efficient conditional privacy-preserving authentication scheme for VANET
SM Pournaghi, B Zahednejad, M Bayat, Y Farjami
Computer Networks 134, 78-92, 2018
1402018
NERA: A new and efficient RSU based authentication scheme for VANETs
M Bayat, M Pournaghi, M Rahimi, M Barmshoory
Wireless Networks, 1-16, 2019
942019
A secure ECC-based privacy preserving data aggregation scheme for smart grids
E Vahedi, M Bayat, MR Pakravan, MR Aref
Computer Networks 129, 28-36, 2017
772017
LAPTAS: lightweight anonymous privacy-preserving three-factor authentication scheme for WSN-based IIoT
HAN Far, M Bayat, AK Das, M Fotouhi, SM Pournaghi, MA Doostari
Wireless Networks, 1-24, 2021
64*2021
A new and efficient authentication scheme for vehicular ad hoc networks
M Bayat, M Barmshoory, SM Pournaghi, M Rahimi, Y Farjami, MR Aref
Journal of Intelligent Transportation Systems 24 (2), 171-183, 2020
352020
Vulnerability of two multiple-key agreement protocols
MS Farash, M Bayat, MA Attari
Computers & Electrical Engineering 37 (2), 199-204, 2011
322011
A new provable hierarchical anonymous certificateless authentication protocol with aggregate verification in ADS-B systems
A Asari, MR Alagheband, M Bayat, MR Asaar
Computer Networks 185, 107599, 2021
312021
A Lightweight and Efficient Data Sharing Scheme for Cloud Computing
S Rezaei, MA Doostari, M Bayat
I.J. of Electronics and Information Engineering 9 (2), 115-131, 2018
27*2018
A lightweight hierarchical authentication scheme for internet of things
A Akbarzadeh, M Bayat, B Zahednejad, A Payandeh, MR Aref
Journal of Ambient Intelligence and Humanized Computing 10, 2607-2619, 2019
262019
A novel secure bilinear pairing based remote user authentication scheme with smart card
M Bayat, M Sabzinejad, A Movahed
2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing …, 2010
262010
A Certificateless Multiple-key Agreement Protocol without Hash Functions Based on Bilinear Pairings
M Sabzinejad, MA Attari, M Bayat
International Journal of Engineering and Technology (IJET) 4 (3), 321-325, 2012
202012
Verifiable ranked search over encrypted data with forward and backward privacy
A Najafi, HHS Javadi, M Bayat
Future Generation Computer Systems 101, 410-419, 2019
182019
An Attribute Based Key Agreement Protocol Resilient to KCI Attack
M Bayat, MR Aref
International Journal of Electronics and Information Engineering 2 (1), 9-17, 2015
182015
Efficient and dynamic verifiable multi-keyword searchable symmetric encryption with full security
A Najafi, HHS Javadi, M Bayat
Multimedia Tools and Applications 80 (17), 26049-26068, 2021
172021
Cryptanalysis and Improvement of a User Authentication Scheme for Internet of Things Using Elliptic Curve Cryptography.
M Bayat, M Beheshti-Atashgah, M Barari, MR Aref
Int. J. Netw. Secur. 21 (6), 897-911, 2019
162019
A conditional privacy-preserving fair electronic payment scheme based on blockchain without trusted third party
Z Hatefi, M Bayat, MR Alaghband, N Hamian, SM Pournaghi
Journal of Ambient Intelligence and Humanized Computing 14 (8), 10089-10102, 2023
142023
A secure key-aggregate authentication cryptosystem for data sharing in dynamic cloud storage
K Alimohammadi, M Bayat, HHS Javadi
Multimedia Tools and Applications 79, 2855-2872, 2020
142020
The system can't perform the operation now. Try again later.
Articles 1–20