Остановите войну!
for scientists:
default search action
Mahmoud Salmasizadeh
- > Home > Persons > Mahmoud Salmasizadeh
Publications
- 2018
- [j38]Maryam Rajabzadeh Asaar, Mohammad Hassan Ameri, Mahmoud Salmasizadeh, Mohammad Reza Aref:
A provably secure code-based concurrent signature scheme. IET Inf. Secur. 12(1): 34-41 (2018) - [j37]Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Mohammad Reza Aref:
A provably secure code-based short signature scheme and its nontransferable variant. Int. J. Commun. Syst. 31(6) (2018) - [j34]Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Willy Susilo, Akbar Majidi:
A Secure and Efficient Authentication Technique for Vehicular Ad-Hoc Networks. IEEE Trans. Veh. Technol. 67(6): 5409-5423 (2018) - 2017
- [c28]Amirreza Sarencheh, Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Mohammad Reza Aref:
An Efficient Cooperative Message Authentication Scheme in Vehicular Ad-hoc Networks. ISCISC 2017: 111-118 - 2016
- [j31]Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Willy Susilo:
A short ID-based proxy signature scheme. Int. J. Commun. Syst. 29(5): 859-873 (2016) - [i30]Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Mohammad Reza Aref:
A Provably Secure Code-based Concurrent Signature Scheme. IACR Cryptol. ePrint Arch. 2016: 450 (2016) - [i28]Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Mohammad Reza Aref:
Code-based Strong Designated Verifier Signatures: Security Analysis and a New Construction. IACR Cryptol. ePrint Arch. 2016: 779 (2016) - [i26]Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Willy Susilo:
Proxy-based Authentication Scheme for Vehicular Ad Hoc Networks: Security Analysis and an Efficient Scheme. IACR Cryptol. ePrint Arch. 2016: 822 (2016) - 2015
- [j29]Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Willy Susilo:
An Identity-Based Multi-Proxy Multi-Signature Scheme Without Bilinear Pairings and its Variants. Comput. J. 58(4): 1021-1039 (2015) - [j28]Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Willy Susilo:
A short identity-based proxy ring signature scheme from RSA. Comput. Stand. Interfaces 38: 144-151 (2015) - [j26]Ramin Ganjavi, Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh:
A traceable optimistic fair exchange protocol in the standard model. ISC Int. J. Inf. Secur. 7(1): 3-14 (2015) - [j25]Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Willy Susilo:
A provably secure identity-based proxy ring signature based on RSA. Secur. Commun. Networks 8(7): 1223-1236 (2015) - [j23]Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Colin Boyd:
Identity-based proxy signatures: a generic construction and a concrete scheme from RSA. Secur. Commun. Networks 8(18): 3602-3614 (2015) - [i23]Mohammad Hassan Ameri, Maryam Rajabzadeh Asaar, Javad Mohajeri, Mahmoud Salmasizadeh:
A Generic Construction for Verifiable Attribute-based Keyword Search Schemes. IACR Cryptol. ePrint Arch. 2015: 915 (2015) - [i22]Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Mohammad Reza Aref:
A Provably Secure Short Signature Scheme from Coding Theory. IACR Cryptol. ePrint Arch. 2015: 948 (2015) - 2014
- [c24]Ramin Ganjavi, Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh:
A traceable optimistic fair exchange protocol. ISCISC 2014: 161-166 - [i18]Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Willy Susilo:
Security Pitfalls of a Provably Secure Identity-based Multi-Proxy Signature Scheme. IACR Cryptol. ePrint Arch. 2014: 496 (2014) - 2013
- [j19]Sepideh Avizheh, Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh:
Convertible limited (multi-) verifier signature: new constructions and applications. ISC Int. J. Inf. Secur. 5(2): 189-208 (2013) - [c23]Maryam Rajabzadeh Asaar, Ali Vardasbi, Mahmoud Salmasizadeh:
Non-Delegatable Strong Designated Verifier Signature Using a Trusted Third Party without Pairings. AISC 2013: 13-25 - [c22]Rahim Toluee, Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh:
Attribute-based ring signatures: Security analysis and a new construction. ISCISC 2013: 1-6 - [c21]Rahim Toluee, Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh:
A new ring signature scheme. ISCISC 2013: 1-7 - 2012
- [i16]Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh:
A Pairing Based Strong Designated Verifier Signature Scheme without Random Oracles. IACR Cryptol. ePrint Arch. 2012: 61 (2012) - [i15]Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh:
A Novel Strong Designated Verifier Signature Scheme without Random Oracles. IACR Cryptol. ePrint Arch. 2012: 259 (2012) - [i14]Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh:
A Non-delegatable Identity-based Designated Verifier Signature Scheme without Bilinear Pairings. IACR Cryptol. ePrint Arch. 2012: 332 (2012) - 2008
- [j6]Maryam Rajabzadeh Asaar, Javad Mohajeri, Mahmoud Salmasizadeh:
Another security improvement over the Lin et al.'s electronic-voting scheme. Int. J. Electron. Secur. Digit. Forensics 1(4): 413-422 (2008) - [c8]Maryam Rajabzadeh Asaar, Javad Mohajeri, Mahmoud Salmasizadeh:
Security Modification for the Hwang-Wen-Hwang's E-voting Scheme. Security and Management 2008: 486-490
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-02-06 23:45 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint