Follow
Mohammad hassan Ameri
Mohammad hassan Ameri
Computer Science at Purdue University
Verified email at purdue.edu - Homepage
Title
Cited by
Cited by
Year
A key-policy attribute-based temporary keyword search scheme for secure cloud storage
MH Ameri, M Delavar, J Mohajeri, M Salmasizadeh
IEEE Transactions on Cloud Computing 8 (3), 660-671, 2018
682018
PUF‐based solutions for secure communications in Advanced Metering Infrastructure (AMI)
M Delavar, S Mirzakuchaki, MH Ameri, J Mohajeri
International Journal of Communication Systems 30 (9), e3195, 2017
412017
A secure and privacy-preserving protocol for holding double auctions in smart grid
R Sarenche, M Salmasizadeh, MH Ameri, MR Aref
Information Sciences 557, 108-129, 2021
292021
Provably secure and efficient PUF‐based broadcast authentication schemes for smart grid applications
MH Ameri, M Delavar, J Mohajeri
International Journal of Communication Systems, 2019
152019
An efficient and secure data sharing in Smart Grid: Ciphertext-policy attribute-based signcryption
SM Sedaghat, MH Ameri, J Mohajeri, MR Aref
2017 Iranian Conference on Electrical Engineering (ICEE), 2003-2008, 2017
122017
A verifiable delegated set intersection without pairing
MM Oliaiy, MH Ameri, J Mohajeri, MR Aref
2017 Iranian Conference on Electrical Engineering (ICEE), 2047-2051, 2017
92017
A secure attribute based keyword search scheme against keyword guessing attack
V Yousefipoor, MH Ameri, J Mohajeri, T Eghlidos
2016 8th International Symposium on Telecommunications (IST), 124-128, 2016
92016
An attribute-based anonymous broadcast encryption scheme with adaptive security in the standard model
R Rabaninejad, MH Ameri, M Delavar, J Mohajeri
Scientia Iranica 26 (3), 1700-1713, 2019
72019
An Efficient and Secure Attribute-Based Signcryption Scheme for Smart Grid Applications
SM Sedaghat, MH Ameri, M Delavar, J Mohajeri, MR Aref
72018
A provably secure code‐based concurrent signature scheme
M Rajabzadeh Asaar, MH Ameri, M Salmasizadeh, MR Aref
IET Information Security 12 (1), 34-41, 2018
62018
HACCLE: metaprogramming for secure multi-party computation
Y Bao, K Sundararajah, R Malik, Q Ye, C Wagner, N Jaber, F Wang, ...
Proceedings of the 20th ACM SIGPLAN International Conference on Generative …, 2021
52021
Computationally Data-Independent Memory Hard Functions
MH Ameri, J Blocki, S Zhou
ITCS 2020, 2019
52019
On the security of O-PSI a delegated private set intersection on outsourced datasets
MM Oliaee, M Delavar, MH Ameri, J Mohajeri, MR Aref
2017 14th International ISC (Iranian Society of Cryptology) Conference on …, 2017
52017
A multi sender attribute-based broadcast authentication scheme
S Aghapour, MH Ameri, J Mohajeri
2016 8th International Symposium on Telecommunications (IST), 78-83, 2016
52016
A generic construction for verifiable attribute-based keyword search schemes
MH Ameri, MR Assar, J Mohajeri, M Salmasizadeh
Cryptology ePrint Archive, 2015
52015
On the security of YRL, an anonymous broadcast encryption scheme
R Rabaninejad, MH Ameri, M Delavar, J Mohajeri
2016 8th International Symposium on Telecommunications (IST), 752-755, 2016
42016
Verifiable identity-based mix network
MA Ekhtiarabadi, HA Yajam, J Mohajeri, M Salmasizadeh
2015 23rd Iranian Conference on Electrical Engineering, 406-409, 2015
42015
Efficient and Provable Secure Anonymous Hierarchical Identity-based Broadcast Encryption (HIBBE) Scheme without Random Oracle
MH Ameri, J Mohajeri, M Salmasizadeh
3*
Memory-hard puzzles in the standard model with applications to memory-hard functions and resource-bounded locally decodable codes
MH Ameri, AR Block, J Blocki
International Conference on Security and Cryptography for Networks, 45-68, 2022
22022
A secure attribute-based keyword search scheme against keyword guessing and chosen keyword attacks
V Yousefipoor, MH Ameri, J Mohajeri, T Eghlidos
International Journal of Information and Communication Technology Research …, 2018
22018
The system can't perform the operation now. Try again later.
Articles 1–20