Majid Bayat
Majid Bayat
Associate Professor of Computer Engineering, Shahed University, Tehran, Iran
Verified email at
Cited by
Cited by
A secure authentication scheme for VANETs with batch verification
M Bayat, M Barmshoory, M Rahimi, MR Aref
Wireless networks 21, 1733-1743, 2015
A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT
M Fotouhi, M Bayat, AK Das, HAN Far, SM Pournaghi, MA Doostari
Computer Networks 177, 107333, 2020
NECPPA: A novel and efficient conditional privacy-preserving authentication scheme for VANET
SM Pournaghi, B Zahednejad, M Bayat, Y Farjami
Computer Networks 134, 78-92, 2018
MedSBA: a novel and secure scheme to share medical data based on blockchain technology and attribute-based encryption
SM Pournaghi, M Bayat, Y Farjami
Journal of Ambient Intelligence and Humanized Computing, 1-29, 2020
NERA: A new and efficient RSU based authentication scheme for VANETs
M Bayat, M Pournaghi, M Rahimi, M Barmshoory
Wireless Networks, 1-16, 2019
A secure ECC-based privacy preserving data aggregation scheme for smart grids
E Vahedi, M Bayat, MR Pakravan, MR Aref
Computer Networks 129, 28-36, 2017
LAPTAS: lightweight anonymous privacy-preserving three-factor authentication scheme for WSN-based IIoT
HAN Far, M Bayat, AK Das, M Fotouhi, SM Pournaghi, MA Doostari
Wireless Networks, 1-24, 2021
Vulnerability of two multiple-key agreement protocols
MS Farash, M Bayat, MA Attari
Computers & Electrical Engineering 37 (2), 199-204, 2011
A novel secure bilinear pairing based remote user authentication scheme with smart card
M Bayat, M Sabzinejad, A Movahed
2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing …, 2010
A new and efficient authentication scheme for vehicular ad hoc networks
M Bayat, M Barmshoory, SM Pournaghi, M Rahimi, Y Farjami, MR Aref
Journal of Intelligent Transportation Systems 24 (2), 171-183, 2020
A Lightweight and Efficient Data Sharing Scheme for Cloud Computing
S Rezaei, MA Doostari, M Bayat
I.J. of Electronics and Information Engineering 9 (2), 115-131, 2018
A Certificateless Multiple-key Agreement Protocol without Hash Functions Based on Bilinear Pairings
M Sabzinejad, MA Attari, M Bayat
International Journal of Engineering and Technology (IJET) 4 (3), 321-325, 2012
Verifiable ranked search over encrypted data with forward and backward privacy
A Najafi, HHS Javadi, M Bayat
Future Generation Computer Systems 101, 410-419, 2019
A lightweight hierarchical authentication scheme for internet of things
A Akbarzadeh, M Bayat, B Zahednejad, A Payandeh, MR Aref
Journal of Ambient Intelligence and Humanized Computing 10, 2607-2619, 2019
An Attribute Based Key Agreement Protocol Resilient to KCI Attack
M Bayat, MR Aref
International Journal of Electronics and Information Engineering 2 (1), 9-17, 2015
Detection of broken bars in induction motors using a neural network
M Moradian, M Ebrahimi, M Danesh, M Bayat
Journal of Power Electronics 6 (3), 245-252, 2006
A new provable hierarchical anonymous certificateless authentication protocol with aggregate verification in ADS-B systems
A Asari, MR Alagheband, M Bayat, MR Asaar
Computer Networks 185, 107599, 2021
Cryptanalysis and Improvement of a User Authentication Scheme for Internet of Things Using Elliptic Curve Cryptography.
M Bayat, M Beheshti-Atashgah, M Barari, MR Aref
Int. J. Netw. Secur. 21 (6), 897-911, 2019
Efficient and dynamic verifiable multi-keyword searchable symmetric encryption with full security
A Najafi, HHS Javadi, M Bayat
Multimedia Tools and Applications 80 (17), 26049-26068, 2021
A Secure and Efficient Chaotic Maps Based Authenticated Key-Exchange Protocol for Smart Grid
M Bayat, M Beheshti-Atashgah, MR Aref
Wireless Personal Communications, 1-29, 2017
The system can't perform the operation now. Try again later.
Articles 1–20