hamid mala

hamid mala

University of Isfahan

H-index: 16

Asia-Iran

About hamid mala

hamid mala, With an exceptional h-index of 16 and a recent h-index of 11 (since 2020), a distinguished researcher at University of Isfahan, specializes in the field of Cryptology, Cryptographic Protocols, Secure Computation.

His recent articles reflect a diverse array of research interests and contributions to the field:

Enhancing privacy in commit-chains based on blind signature

Privacy-preserving eigenvector computation with applications in spectral clustering

Verifiable Database Supporting Range Query

Privacy-preserving multi-party PCA computation on horizontally and vertically partitioned data based on outsourced QR decomposition

Secure Outsourcing of Two Standard Identity-Based Cryptosystems.

Fully Verifiable Outsourcing of Single and Composite Modular Exponentiation with Single Untrusted Cloud Server

EO-PSI-CA: Efficient outsourced private set intersection cardinality

Secure Determining of the k-th Greatest Element Among Distributed Private Values

hamid mala Information

University

Position

Associate Professor of Computer Engineering

Citations(all)

1136

Citations(since 2020)

673

Cited By

741

hIndex(all)

16

hIndex(since 2020)

11

i10Index(all)

24

i10Index(since 2020)

14

Email

University Profile Page

University of Isfahan

Google Scholar

View Google Scholar Profile

hamid mala Skills & Research Interests

Cryptology

Cryptographic Protocols

Secure Computation

Top articles of hamid mala

Title

Journal

Author(s)

Publication Date

Enhancing privacy in commit-chains based on blind signature

Expert Systems with Applications

Masoume Akraminasab

Mojtaba Mahdavi

Hamid Mala

2024/6/15

Privacy-preserving eigenvector computation with applications in spectral clustering

International Journal of Information Technology

Mehrad Jaberi

Hamid Mala

2024/4/5

Verifiable Database Supporting Range Query

Biannual Journal Monadi for Cyberspace Security (AFTA)

Seyed Hossein Tahami

Hamid Mala

2024/2/10

Privacy-preserving multi-party PCA computation on horizontally and vertically partitioned data based on outsourced QR decomposition

The Journal of Supercomputing

Mehrad Jaberi

Hamid Mala

2023/9

Secure Outsourcing of Two Standard Identity-Based Cryptosystems.

ISeCure

Mohammad Reza Saeidi

Hamid Mala

2023/7/1

Fully Verifiable Outsourcing of Single and Composite Modular Exponentiation with Single Untrusted Cloud Server

Omid Torki

Hamid Mala

Maede Ashouri-Talouki

Hoda Alkhzaimi

2022/8/24

EO-PSI-CA: Efficient outsourced private set intersection cardinality

Journal of Information Security and Applications

Amirhossein Adavoudi Jolfaei

Hamid Mala

Maryam Zarezadeh

2022/3/1

Secure Determining of the k-th Greatest Element Among Distributed Private Values

Mehrad Jaberi

Hamid Mala

2021/3/3

Secure Parameterized Multi-Pattern Matching in Multi-Text Owner Setting

Maryam Zarezadeh

Hamid Mala

2021/9/1

Secure outsourcing of Boneh-Franklin identity-based encryption scheme

Mohammad Reza Saeidi

Hamid Mala

2021/9/1

Closed-loop and open-loop authentication protocols for blockchain-based IoT systems

Information processing & management

Seyed Farhad Aghili

Hamid Mala

Christian Schindelhauer

Mohammad Shojafar

Rahim Tafazolli

2021/7/1

A Polynomial-Time Algorithm for Special Cases of the Unbounded Subset-Sum Problem

arXiv preprint arXiv:2103.09080

Majid Salimi

Hamid Mala

2021/3/15

Tracking and impersonating tags in a CRC-based ultralightweight RFID authentication protocol

Peer-to-Peer Networking and Applications

Seyed Farhad Aghili

Hamid Mala

2020/5

Full-resilient memory-optimum multi-party non-interactive key exchange

IEEE Access

Majid Salimi

Hamid Mala

Honorio Martin

Pedro Peris-Lopez

2020/1/6

Secure and efficient publicly verifiable outsourcing of matrix multiplication in online mode

Cluster Computing

Fatemeh Erfan

Hamid Mala

2020/12

A Secure and Efficient Mobile Payment Protocol with Fair-Exchange Feature

Farahnaz Zamanian

Hamid Mala

2020/1/1

Efficient secure pattern matching with malicious adversaries

IEEE Transactions on Dependable and Secure Computing

Maryam Zarezadeh

Hamid Mala

Behrouz Tork Ladani

2020/7/15

Multi-keyword ranked searchable encryption scheme with access control for cloud storage

Peer-to-Peer Networking and Applications

Maryam Zarezadeh

Hamid Mala

Maede Ashouri-Talouki

2020/1

Preserving privacy of software-defined networking policies by secure multi-party computation

Journal of Computer Science and Technology

Maryam Zarezadeh

Hamid Mala

Homa Khajeh

2020/7

Secure parameterized pattern matching

Information Sciences

Maryam Zarezadeh

Hamid Mala

Behrouz Tork Ladani

2020/6/1

See List of Professors in hamid mala University(University of Isfahan)

Co-Authors

H-index: 74
Mauro Conti

Mauro Conti

Università degli Studi di Padova

H-index: 64
Vincent Rijmen

Vincent Rijmen

Katholieke Universiteit Leuven

H-index: 47
Mohammad Shojafar

Mohammad Shojafar

University of Surrey

H-index: 33
Christian Schindelhauer

Christian Schindelhauer

Albert-Ludwigs-Universität Freiburg

H-index: 20
Behrouz Tork Ladani

Behrouz Tork Ladani

University of Isfahan

H-index: 15
Mohammad Dakhilalian

Mohammad Dakhilalian

Isfahan University of Technology

academic-engine