Login / Signup
Hamed Arshad
ORCID
Publication Activity (10 Years)
Years Active: 2014-2024
Publications (10 Years): 17
Top Topics
Security Analysis
Instant Messaging
Lightweight
Access Control
Top Venues
J. Medical Syst.
Future Gener. Comput. Syst.
Multim. Tools Appl.
Int. J. Commun. Syst.
</>
Publications
</>
Hamed Arshad
,
Ross Horne
,
Christian Johansen
,
Olaf Owe
,
Tim A. C. Willemse
XACML2mCRL2: Automatic transformation of XACML policies into mCRL2 specifications.
Sci. Comput. Program.
232 (2024)
Hamed Arshad
,
Pablo Picazo-Sanchez
,
Christian Johansen
,
Gerardo Schneider
Attribute-based encryption with enforceable obligations.
J. Cryptogr. Eng.
13 (3) (2023)
Hamed Arshad
,
Christian Johansen
,
Olaf Owe
,
Pablo Picazo-Sanchez
,
Gerardo Schneider
Semantic Attribute-Based Encryption: A framework for combining ABE schemes with semantic technologies.
Inf. Sci.
616 (2022)
Hamed Arshad
,
Ross Horne
,
Christian Johansen
,
Olaf Owe
,
Tim A. C. Willemse
Process Algebra Can Save Lives: Static Analysis of XACML Access Control Policies Using mCRL2.
FORTE
(2022)
Hamed Arshad
,
Christian Johansen
,
Olaf Owe
Semantic Attribute-Based Access Control: A review on current status and future perspectives.
J. Syst. Archit.
129 (2022)
Christian Johansen
,
Aulon Mujaj
,
Hamed Arshad
,
Josef Noll
The Snowden Phone: A Comparative Survey of Secure Instant Messaging Mobile Applications.
Secur. Commun. Networks
2021 (2021)
Arezou Ostad-Sharif
,
Hamed Arshad
,
Morteza Nikooghadam
,
Dariush Abbasinezhad-Mood
Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme.
Future Gener. Comput. Syst.
100 (2019)
Christian Johansen
,
Aulon Mujaj
,
Hamed Arshad
,
Josef Noll
The Snowden Phone: A Comparative Survey of Secure Instant Messaging Mobile Applications (authors' version).
CoRR
(2018)
Morteza Nikooghadam
,
Reza Jahantigh
,
Hamed Arshad
A lightweight authentication and key agreement protocol preserving user anonymity.
Multim. Tools Appl.
76 (11) (2017)
Hamed Arshad
,
Morteza Nikooghadam
,
Sara Avezverdi
,
Mahboubeh Nazari
Design and FPGA implementation of an efficient security mechanism for mobile pay-TV systems.
Int. J. Commun. Syst.
30 (15) (2017)
Hamed Arshad
,
Abbas Rasoolzadegan
A secure authentication and key agreement scheme for roaming service with user anonymity.
Int. J. Commun. Syst.
30 (18) (2017)
Azeem Irshad
,
Saru Kumari
,
Xiong Li
,
Fan Wu
,
Shehzad Ashraf Chaudhry
,
Hamed Arshad
An Improved SIP Authentication Scheme Based on Server-Oriented Biometric Verification.
Wirel. Pers. Commun.
97 (2) (2017)
Saru Kumari
,
Xiong Li
,
Fan Wu
,
Ashok Kumar Das
,
Hamed Arshad
,
Muhammad Khurram Khan
A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps.
Future Gener. Comput. Syst.
63 (2016)
Hamed Arshad
,
Abbas Rasoolzadegan
Design of a Secure Authentication and Key Agreement Scheme Preserving User Privacy Usable in Telecare Medicine Information Systems.
J. Medical Syst.
40 (11) (2016)
Hamed Arshad
,
Morteza Nikooghadam
An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC.
Multim. Tools Appl.
75 (1) (2016)
Hamed Arshad
,
Vahid Teymoori
,
Morteza Nikooghadam
,
Hassan Abbassi
On the Security of a Two-Factor Authentication and Key Agreement Scheme for Telecare Medicine Information Systems.
J. Medical Syst.
39 (8) (2015)
Hamed Arshad
,
Morteza Nikooghadam
Security analysis and improvement of two authentication and key agreement schemes for session initiation protocol.
J. Supercomput.
71 (8) (2015)
Hamed Arshad
,
Morteza Nikooghadam
Three-Factor Anonymous Authentication and Key Agreement Scheme for Telecare Medicine Information Systems.
J. Medical Syst.
38 (12) (2014)