Login / Signup
Majid Bayat
Publication Activity (10 Years)
Years Active: 2010-2024
Publications (10 Years): 26
Top Topics
Elliptic Curve Cryptography
Key Agreement Protocol
Authentication Scheme
Lightweight
Top Venues
Wirel. Networks
J. Ambient Intell. Humaniz. Comput.
Comput. Networks
ISC Int. J. Inf. Secur.
</>
Publications
</>
Fateme Fathi
,
Mina Baghani
,
Majid Bayat
Light-PerIChain: Using lightweight scalable blockchain based on node performance and improved consensus algorithm in IoT systems.
Comput. Commun.
213 (2024)
Afshin Heshmati
,
Majid Bayat
,
Mohammad-Ali Doostari
,
Seyed Morteza Pournaghi
Blockchain based authentication and access verfication scheme in smart home.
J. Ambient Intell. Humaniz. Comput.
14 (3) (2023)
Zahra Hatefi
,
Majid Bayat
,
Mahdi R. Alaghband
,
Negin Hamian
,
Seyed Morteza Pournaghi
A conditional privacy-preserving fair electronic payment scheme based on blockchain without trusted third party.
J. Ambient Intell. Humaniz. Comput.
14 (8) (2023)
Mahdieh Ebrahimi
,
Majid Bayat
,
Behnam Zahednejad
A Privacy Preserving Mutual Authentication Scheme Suitable for IoT-Based Medical Systems.
ISC Int. J. Inf. Secur.
14 (1) (2022)
Aniseh Najafi
,
Hamid Haj Seyyed Javadi
,
Majid Bayat
Efficient and dynamic verifiable multi-keyword searchable symmetric encryption with full security.
Multim. Tools Appl.
80 (17) (2021)
Aniseh Najafi
,
Majid Bayat
,
Hamid Haj Seyyed Javadi
Fair multi-owner search over encrypted data with forward and backward privacy in cloud-assisted Internet of Things.
Future Gener. Comput. Syst.
124 (2021)
Hossein Abdi Nasib Far
,
Majid Bayat
,
Ashok Kumar Das
,
Mahdi Fotouhi
,
Seyed Morteza Pournaghi
,
Mohammad-Ali Doostari
LAPTAS: lightweight anonymous privacy-preserving three-factor authentication scheme for WSN-based IIoT.
Wirel. Networks
27 (2) (2021)
Amirhossein Asari
,
Mahdi R. Alagheband
,
Majid Bayat
,
Maryam Rajabzadeh Asaar
A new provable hierarchical anonymous certificateless authentication protocol with aggregate verification in ADS-B systems.
Comput. Networks
185 (2021)
Aniseh Najafi
,
Majid Bayat
,
Hamid Haj Seyyed Javadi
Privacy Preserving Attribute-Based Encryption with Conjunctive Keyword Search for E-health Records in Cloud.
ISC Int. J. Inf. Secur.
13 (2) (2021)
Mohammad Beheshti-Atashgah
,
Mohammad Reza Aref
,
Morteza Barari
,
Majid Bayat
Security and privacy-preserving in e-health: A new framework for patient.
Internet Things
12 (2020)
Kobra Alimohammadi
,
Majid Bayat
,
Hamid H. S. Javadi
A secure key-aggregate authentication cryptosystem for data sharing in dynamic cloud storage.
Multim. Tools Appl.
79 (3-4) (2020)
Mahdi Fotouhi
,
Majid Bayat
,
Ashok Kumar Das
,
Hossein Abdi Nasib Far
,
Seyed Morteza Pournaghi
,
Mohammad-Ali Doostari
A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT.
Comput. Networks
177 (2020)
Majid Bayat
,
Mostafa Barmshoory
,
Seyed Morteza Pournaghi
,
Majid Rahimi
,
Yaghoub Farjami
,
Mohammad Reza Aref
A new and efficient authentication scheme for vehicular ad hoc networks.
J. Intell. Transp. Syst.
24 (2) (2020)
Majid Bayat
,
Seyed Morteza Pournaghi
,
Majid Rahimi
,
Mostafa Barmshoory
NERA: A new and efficient RSU based authentication scheme for VANETs.
Wirel. Networks
26 (5) (2020)
Seyed Morteza Pournaghi
,
Majid Bayat
,
Yaghoub Farjami
MedSBA: a novel and secure scheme to share medical data based on blockchain technology and attribute-based encryption.
J. Ambient Intell. Humaniz. Comput.
11 (11) (2020)
Aida Akbarzadeh
,
Majid Bayat
,
Behnam Zahednejad
,
Ali Payandeh
,
Mohammad Reza Aref
A lightweight hierarchical authentication scheme for internet of things.
J. Ambient Intell. Humaniz. Comput.
10 (7) (2019)
Majid Bayat
,
Zahra Zare Jousheghani
,
Ashok Kumar Das
,
Pitam Singh
,
Saru Kumari
,
Mohammad Reza Aref
A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications.
ISC Int. J. Inf. Secur.
11 (2) (2019)
Aniseh Najafi
,
Hamid Haj Seyyed Javadi
,
Majid Bayat
Verifiable ranked search over encrypted data with forward and backward privacy.
Future Gener. Comput. Syst.
101 (2019)
Majid Bayat
,
Mohammad Beheshti-Atashgah
,
Morteza Barari
,
Mohammad Reza Aref
Cryptanalysis and Improvement of a User Authentication Scheme for Internet of Things Using Elliptic Curve Cryptography.
Int. J. Netw. Secur.
21 (6) (2019)
Seyed Morteza Pournaghi
,
Behnam Zahednejad
,
Majid Bayat
,
Yaghoub Farjami
NECPPA: A novel and efficient conditional privacy-preserving authentication scheme for VANET.
Comput. Networks
134 (2018)
Behnam Zahednejad
,
Majid Bayat
,
Ashok Kumar Das
On the Design of a Secure Proxy Signature-based Handover Authentication Scheme for LTEWireless Networks.
IACR Cryptol. ePrint Arch.
2018 (2018)
Erfaneh Vahedi
,
Majid Bayat
,
Mohammad Reza Pakravan
,
Mohammad Reza Aref
A secure ECC-based privacy preserving data aggregation scheme for smart grids.
Comput. Networks
129 (2017)
Majid Bayat
,
Mohammad Beheshti-Atashgah
,
Mohammad Reza Aref
A Secure and Efficient Chaotic Maps Based Authenticated Key-Exchange Protocol for Smart Grid.
Wirel. Pers. Commun.
97 (2) (2017)
Majid Bayat
,
Mohammad Reza Aref
An attribute-based tripartite key agreement protocol.
Int. J. Commun. Syst.
28 (8) (2015)
Majid Bayat
,
Hamid Reza Arkian
,
Mohammad Reza Aref
A revocable attribute based data sharing scheme resilient to DoS attacks in smart grid.
Wirel. Networks
21 (3) (2015)
Majid Bayat
,
Mostafa Barmshoory
,
Majid Rahimi
,
Mohammad Reza Aref
A secure authentication scheme for VANETs with batch verification.
Wirel. Networks
21 (5) (2015)
Majid Bayat
,
Mohammad Reza Aref
A Secure and efficient elliptic curve based authentication and key agreement protocol suitable for WSN.
IACR Cryptol. ePrint Arch.
2013 (2013)
Mohammad Beheshti-Atashgah
,
Majid Bayat
,
Mahmoud Gardeshi
,
Mohammad Reza Aref
Designated Verifier Threshold Proxy Signature Scheme without Random Oracles.
IACR Cryptol. ePrint Arch.
2012 (2012)
Mohammad Sabzinejad Farash
,
Mahmoud Ahmadian-Attari
,
Majid Bayat
A Certificateless Multiple-key Agreement Protocol Based on Bilinear Pairings.
IACR Cryptol. ePrint Arch.
2012 (2012)
Mohammad Sabzinejad Farash
,
Majid Bayat
,
Mahmoud Ahmadian-Attari
Vulnerability of two multiple-key agreement protocols.
Comput. Electr. Eng.
37 (2) (2011)
Mohammad Beheshti-Atashgah
,
Mahmoud Gardeshi
,
Majid Bayat
A Designated Verifier Proxy Signature Scheme with Fast Revocation without Random Oracles.
DICTAP (1)
(2011)
Mohammad Sabzinejad Farash
,
Mahmoud Ahmadian-Attari
,
Majid Bayat
Security of Multiple-Key Agreement Protocols and Propose an Enhanced Protocol.
IACR Cryptol. ePrint Arch.
2011 (2011)
Majid Bayat
,
Mohammad Sabzinejad Farash
,
Amirvala Movahed
A Novel Secure Bilinear Pairing Based Remote User Authentication Scheme with Smart Card.
EUC
(2010)