Login / Signup
Mohammad Ali
ORCID
Publication Activity (10 Years)
Years Active: 2018-2024
Publications (10 Years): 19
Top Topics
Access Control
Encryption Scheme
Lightweight
Keyword Search
Top Venues
CoRR
ISC Int. J. Inf. Secur.
Sensors
ISCISC
</>
Publications
</>
Zahra Seyedi
,
Farhad Rahmati
,
Mohammad Ali
,
Ximeng Liu
Verifiable and privacy-preserving fine-grained data management in vehicular fog computing: A game theory-based approach.
Peer Peer Netw. Appl.
17 (1) (2024)
Amin Hosseingholizadeh
,
Farhad Rahmati
,
Mohammad Ali
,
Hamid Damadi
,
Ximeng Liu
Privacy-Preserving Joint Data and Function Homomorphic Encryption for Cloud Software Services.
IEEE Internet Things J.
11 (1) (2024)
Mohammad Ali
,
Amin Hosseingholizadeh
,
Ximeng Liu
Data Inspection and Access Control for 5G Edge Computing-Enabled Internet of Medical Things.
IEEE Trans. Netw. Sci. Eng.
11 (5) (2024)
Mostafa Chegenizadeh
,
Mohammad Ali
,
Javad Mohajeri
,
Mohammad Reza Aref
HUAP: Practical Attribute-Based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices.
ISC Int. J. Inf. Secur.
16 (1) (2024)
Zahra Seyedi
,
Farhad Rahmati
,
Mohammad Ali
,
Ximeng Liu
A fully decentralized auditing approach for edge computing: A Game-Theoretic Perspective.
CoRR
(2023)
Mohammad Ali
,
Ximeng Liu
Federated Online/Offline Remote Data Inspection for Distributed Edge Computing.
CoRR
(2023)
Mohammad Ali
,
Mohammad-Reza Sadeghi
,
Ximeng Liu
,
Athanasios V. Vasilakos
Anonymous Aggregate Fine-Grained Cloud Data Verification System for Smart Health.
IEEE Trans. Cloud Comput.
11 (3) (2023)
Mohammad Ali
,
Ximeng Liu
Lightweight verifiable data management system for cloud-assisted wireless body area networks.
Peer-to-Peer Netw. Appl.
15 (4) (2022)
Mohammad Ali
,
Mohammadreza Sadeghi
,
Ximeng Liu
,
Yinbin Miao
,
Athanasios V. Vasilakos
Verifiable online/offline multi-keyword search for cloud-assisted Industrial Internet of Things.
J. Inf. Secur. Appl.
65 (2022)
Mohammad Ali
Attribute-Based Remote Data Auditing and User Authentication for Cloud Storage Systems.
ISC Int. J. Inf. Secur.
14 (3) (2022)
Mohammad Ali
,
Mohammad-Reza Sadeghi
Provable secure lightweight attribute-based keyword search for cloud-based Internet of Things networks.
Trans. Emerg. Telecommun. Technol.
32 (5) (2021)
Mostafa Chegenizadeh
,
Mohammad Ali
,
Javad Mohajeri
,
Mohammad Reza Aref
HUAP: Practical Attribute-based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices.
CoRR
(2021)
Mohammad Ali
,
Javad Mohajeri
,
Mohammad-Reza Sadeghi
,
Ximeng Liu
A fully distributed hierarchical attribute-based encryption scheme.
Theor. Comput. Sci.
815 (2020)
Mohammad Ali
,
Mohammad-Reza Sadeghi
,
Ximeng Liu
Lightweight Revocable Hierarchical Attribute-Based Encryption for Internet of Things.
IEEE Access
8 (2020)
Mohammad Ali
,
Mohammad-Reza Sadeghi
,
Ximeng Liu
Lightweight Fine-Grained Access Control for Wireless Body Area Networks.
Sensors
20 (4) (2020)
Mohammad Ali
,
Javad Mohajeri
,
Mohammad-Reza Sadeghi
,
Ximeng Liu
Attribute-based fine-grained access control for outscored private set intersection computation.
Inf. Sci.
536 (2020)
Mostafa Chegenizadeh
,
Mohammad Ali
,
Javad Mohajeri
,
Mohammad Reza Aref
An Anonymous Attribute-based Access Control System Supporting Access Structure Update.
ISCISC
(2019)
Mohammad Ali
,
Javad Mohajeri
,
Mohammad-Reza Sadeghi
On the security of the hierarchical attribute based encryption scheme proposed by Wang et al.
CoRR
(2018)
Mohammad Ali
,
Javad Mohajeri
,
Mohammad-Reza (Rafsanjani) Sadeghi
A fully distributed revocable ciphertext-policy hierarchical attribute-based encryption without pairing.
IACR Cryptol. ePrint Arch.
2018 (2018)