hamid mala
University of Isfahan
H-index: 16
Asia-Iran
Top articles of hamid mala
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Enhancing privacy in commit-chains based on blind signature | Expert Systems with Applications | Masoume Akraminasab Mojtaba Mahdavi Hamid Mala | 2024/6/15 |
Privacy-preserving eigenvector computation with applications in spectral clustering | International Journal of Information Technology | Mehrad Jaberi Hamid Mala | 2024/4/5 |
Verifiable Database Supporting Range Query | Biannual Journal Monadi for Cyberspace Security (AFTA) | Seyed Hossein Tahami Hamid Mala | 2024/2/10 |
Privacy-preserving multi-party PCA computation on horizontally and vertically partitioned data based on outsourced QR decomposition | The Journal of Supercomputing | Mehrad Jaberi Hamid Mala | 2023/9 |
Secure Outsourcing of Two Standard Identity-Based Cryptosystems. | ISeCure | Mohammad Reza Saeidi Hamid Mala | 2023/7/1 |
Fully Verifiable Outsourcing of Single and Composite Modular Exponentiation with Single Untrusted Cloud Server | Omid Torki Hamid Mala Maede Ashouri-Talouki Hoda Alkhzaimi | 2022/8/24 | |
EO-PSI-CA: Efficient outsourced private set intersection cardinality | Journal of Information Security and Applications | Amirhossein Adavoudi Jolfaei Hamid Mala Maryam Zarezadeh | 2022/3/1 |
Secure Determining of the k-th Greatest Element Among Distributed Private Values | Mehrad Jaberi Hamid Mala | 2021/3/3 | |
Secure Parameterized Multi-Pattern Matching in Multi-Text Owner Setting | Maryam Zarezadeh Hamid Mala | 2021/9/1 | |
Secure outsourcing of Boneh-Franklin identity-based encryption scheme | Mohammad Reza Saeidi Hamid Mala | 2021/9/1 | |
Closed-loop and open-loop authentication protocols for blockchain-based IoT systems | Information processing & management | Seyed Farhad Aghili Hamid Mala Christian Schindelhauer Mohammad Shojafar Rahim Tafazolli | 2021/7/1 |
A Polynomial-Time Algorithm for Special Cases of the Unbounded Subset-Sum Problem | arXiv preprint arXiv:2103.09080 | Majid Salimi Hamid Mala | 2021/3/15 |
Tracking and impersonating tags in a CRC-based ultralightweight RFID authentication protocol | Peer-to-Peer Networking and Applications | Seyed Farhad Aghili Hamid Mala | 2020/5 |
Full-resilient memory-optimum multi-party non-interactive key exchange | IEEE Access | Majid Salimi Hamid Mala Honorio Martin Pedro Peris-Lopez | 2020/1/6 |
Secure and efficient publicly verifiable outsourcing of matrix multiplication in online mode | Cluster Computing | Fatemeh Erfan Hamid Mala | 2020/12 |
A Secure and Efficient Mobile Payment Protocol with Fair-Exchange Feature | Farahnaz Zamanian Hamid Mala | 2020/1/1 | |
Efficient secure pattern matching with malicious adversaries | IEEE Transactions on Dependable and Secure Computing | Maryam Zarezadeh Hamid Mala Behrouz Tork Ladani | 2020/7/15 |
Multi-keyword ranked searchable encryption scheme with access control for cloud storage | Peer-to-Peer Networking and Applications | Maryam Zarezadeh Hamid Mala Maede Ashouri-Talouki | 2020/1 |
Preserving privacy of software-defined networking policies by secure multi-party computation | Journal of Computer Science and Technology | Maryam Zarezadeh Hamid Mala Homa Khajeh | 2020/7 |
Secure parameterized pattern matching | Information Sciences | Maryam Zarezadeh Hamid Mala Behrouz Tork Ladani | 2020/6/1 |