default search action
Majid Bayat
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j26]Fateme Fathi, Mina Baghani, Majid Bayat:
Light-PerIChain: Using lightweight scalable blockchain based on node performance and improved consensus algorithm in IoT systems. Comput. Commun. 213: 246-259 (2024) - 2023
- [j25]Afshin Heshmati, Majid Bayat, Mohammad-Ali Doostari, Seyed Morteza Pournaghi:
Blockchain based authentication and access verfication scheme in smart home. J. Ambient Intell. Humaniz. Comput. 14(3): 2525-2547 (2023) - [j24]Zahra Hatefi, Majid Bayat, Mahdi R. Alaghband, Negin Hamian, Seyed Morteza Pournaghi:
A conditional privacy-preserving fair electronic payment scheme based on blockchain without trusted third party. J. Ambient Intell. Humaniz. Comput. 14(8): 10089-10102 (2023) - 2022
- [j23]Mahdieh Ebrahimi, Majid Bayat, Behnam Zahednejad:
A Privacy Preserving Mutual Authentication Scheme Suitable for IoT-Based Medical Systems. ISC Int. J. Inf. Secur. 14(1): 57-68 (2022) - 2021
- [j22]Amirhossein Asari, Mahdi R. Alagheband, Majid Bayat, Maryam Rajabzadeh Asaar:
A new provable hierarchical anonymous certificateless authentication protocol with aggregate verification in ADS-B systems. Comput. Networks 185: 107599 (2021) - [j21]Aniseh Najafi, Majid Bayat, Hamid Haj Seyyed Javadi:
Fair multi-owner search over encrypted data with forward and backward privacy in cloud-assisted Internet of Things. Future Gener. Comput. Syst. 124: 285-294 (2021) - [j20]Aniseh Najafi, Majid Bayat, Hamid Haj Seyyed Javadi:
Privacy Preserving Attribute-Based Encryption with Conjunctive Keyword Search for E-health Records in Cloud. ISC Int. J. Inf. Secur. 13(2): 87-100 (2021) - [j19]Aniseh Najafi, Hamid Haj Seyyed Javadi, Majid Bayat:
Efficient and dynamic verifiable multi-keyword searchable symmetric encryption with full security. Multim. Tools Appl. 80(17): 26049-26068 (2021) - [j18]Hossein Abdi Nasib Far, Majid Bayat, Ashok Kumar Das, Mahdi Fotouhi, Seyed Morteza Pournaghi, Mohammad-Ali Doostari:
LAPTAS: lightweight anonymous privacy-preserving three-factor authentication scheme for WSN-based IIoT. Wirel. Networks 27(2): 1389-1412 (2021) - 2020
- [j17]Mahdi Fotouhi, Majid Bayat, Ashok Kumar Das, Hossein Abdi Nasib Far, Seyed Morteza Pournaghi, Mohammad-Ali Doostari:
A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT. Comput. Networks 177: 107333 (2020) - [j16]Mohammad Beheshti-Atashgah, Mohammad Reza Aref, Morteza Barari, Majid Bayat:
Security and privacy-preserving in e-health: A new framework for patient. Internet Things 12: 100290 (2020) - [j15]Seyed Morteza Pournaghi, Majid Bayat, Yaghoub Farjami:
MedSBA: a novel and secure scheme to share medical data based on blockchain technology and attribute-based encryption. J. Ambient Intell. Humaniz. Comput. 11(11): 4613-4641 (2020) - [j14]Majid Bayat, Mostafa Barmshoory, Seyed Morteza Pournaghi, Majid Rahimi, Yaghoub Farjami, Mohammad Reza Aref:
A new and efficient authentication scheme for vehicular ad hoc networks. J. Intell. Transp. Syst. 24(2): 171-183 (2020) - [j13]Kobra Alimohammadi, Majid Bayat, Hamid H. S. Javadi:
A secure key-aggregate authentication cryptosystem for data sharing in dynamic cloud storage. Multim. Tools Appl. 79(3-4): 2855-2872 (2020) - [j12]Majid Bayat, Seyed Morteza Pournaghi, Majid Rahimi, Mostafa Barmshoory:
NERA: A new and efficient RSU based authentication scheme for VANETs. Wirel. Networks 26(5): 3083-3098 (2020)
2010 – 2019
- 2019
- [j11]Aniseh Najafi, Hamid Haj Seyyed Javadi, Majid Bayat:
Verifiable ranked search over encrypted data with forward and backward privacy. Future Gener. Comput. Syst. 101: 410-419 (2019) - [j10]Majid Bayat, Mohammad Beheshti-Atashgah, Morteza Barari, Mohammad Reza Aref:
Cryptanalysis and Improvement of a User Authentication Scheme for Internet of Things Using Elliptic Curve Cryptography. Int. J. Netw. Secur. 21(6): 897-911 (2019) - [j9]Majid Bayat, Zahra Zare Jousheghani, Ashok Kumar Das, Pitam Singh, Saru Kumari, Mohammad Reza Aref:
A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications. ISC Int. J. Inf. Secur. 11(2): 113-128 (2019) - [j8]Aida Akbarzadeh, Majid Bayat, Behnam Zahednejad, Ali Payandeh, Mohammad Reza Aref:
A lightweight hierarchical authentication scheme for internet of things. J. Ambient Intell. Humaniz. Comput. 10(7): 2607-2619 (2019) - 2018
- [j7]Seyed Morteza Pournaghi, Behnam Zahednejad, Majid Bayat, Yaghoub Farjami:
NECPPA: A novel and efficient conditional privacy-preserving authentication scheme for VANET. Comput. Networks 134: 78-92 (2018) - [i5]Behnam Zahednejad, Majid Bayat, Ashok Kumar Das:
On the Design of a Secure Proxy Signature-based Handover Authentication Scheme for LTEWireless Networks. IACR Cryptol. ePrint Arch. 2018: 1061 (2018) - 2017
- [j6]Erfaneh Vahedi, Majid Bayat, Mohammad Reza Pakravan, Mohammad Reza Aref:
A secure ECC-based privacy preserving data aggregation scheme for smart grids. Comput. Networks 129: 28-36 (2017) - [j5]Majid Bayat, Mohammad Beheshti-Atashgah, Mohammad Reza Aref:
A Secure and Efficient Chaotic Maps Based Authenticated Key-Exchange Protocol for Smart Grid. Wirel. Pers. Commun. 97(2): 2551-2579 (2017) - 2015
- [j4]Majid Bayat, Mohammad Reza Aref:
An attribute-based tripartite key agreement protocol. Int. J. Commun. Syst. 28(8): 1419-1431 (2015) - [j3]Majid Bayat, Hamid Reza Arkian, Mohammad Reza Aref:
A revocable attribute based data sharing scheme resilient to DoS attacks in smart grid. Wirel. Networks 21(3): 871-881 (2015) - [j2]Majid Bayat, Mostafa Barmshoory, Majid Rahimi, Mohammad Reza Aref:
A secure authentication scheme for VANETs with batch verification. Wirel. Networks 21(5): 1733-1743 (2015) - 2013
- [i4]Majid Bayat, Mohammad Reza Aref:
A Secure and efficient elliptic curve based authentication and key agreement protocol suitable for WSN. IACR Cryptol. ePrint Arch. 2013: 374 (2013) - 2012
- [i3]Mohammad Sabzinejad Farash, Mahmoud Ahmadian-Attari, Majid Bayat:
A Certificateless Multiple-key Agreement Protocol Based on Bilinear Pairings. IACR Cryptol. ePrint Arch. 2012: 393 (2012) - [i2]Mohammad Beheshti-Atashgah, Majid Bayat, Mahmoud Gardeshi, Mohammad Reza Aref:
Designated Verifier Threshold Proxy Signature Scheme without Random Oracles. IACR Cryptol. ePrint Arch. 2012: 488 (2012) - 2011
- [j1]Mohammad Sabzinejad Farash, Majid Bayat, Mahmoud Ahmadian-Attari:
Vulnerability of two multiple-key agreement protocols. Comput. Electr. Eng. 37(2): 199-204 (2011) - [c2]Mohammad Beheshti-Atashgah, Mahmoud Gardeshi, Majid Bayat:
A Designated Verifier Proxy Signature Scheme with Fast Revocation without Random Oracles. DICTAP (1) 2011: 535-550 - [i1]Mohammad Sabzinejad Farash, Mahmoud Ahmadian-Attari, Majid Bayat:
Security of Multiple-Key Agreement Protocols and Propose an Enhanced Protocol. IACR Cryptol. ePrint Arch. 2011: 634 (2011) - 2010
- [c1]Majid Bayat, Mohammad Sabzinejad Farash, Amirvala Movahed:
A Novel Secure Bilinear Pairing Based Remote User Authentication Scheme with Smart Card. EUC 2010: 578-582
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:46 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint