Follow
Majid Bakhtiari
Title
Cited by
Cited by
Year
Security issues and attacks in wireless sensor network
RW Anwar, M Bakhtiari, A Zainal, AH Abdullah, KN Qureshi
World Applied Sciences Journal 30 (10), 1224-1227, 2014
962014
Security Issues and Attacks in Wireless Sensor Network
AHAKNQ Raja Waseem Anwar, Majid Bakhtiari, Anazida Zainal
World Applied Sciences Journal 10 (30), 1224-1227, 2014
96*2014
Cryptanalysis and improvement of a robust smart card secured authentication scheme on SIP using elliptic curve cryptography
MS Farash, S Kumari, M Bakhtiari
Multimedia Tools and Applications 75, 4485-4504, 2016
442016
Serious security weakness in RSA cryptosystem
M Bakhtiari, MA Maarof
International Journal of Computer Science Issues (IJCSI) 9 (1), 175, 2012
402012
Authentication methods in cloud computing: A survey
M Babaeizadeh, M Bakhtiari, AM Mohammed
Research Journal of Applied Sciences, Engineering and Technology 9 (8), 655-664, 2015
322015
Keystroke dynamic authentication in mobile cloud computing
M Babaeizadeh, M Bakhtiari, MA Maarof
Universiti Teknologi Malaysia, 2014
302014
Enhanced trust aware routing against wormhole attacks in wireless sensor networks
RW Anwar, M Bakhtiari, A Zainal, AH Abdullah, KN Qureshi
2015 International Conference on Smart Sensors and Application (ICSSA), 56-59, 2015
282015
An efficient stream cipher algorithm for data encryption
M Bakhtiari, MA Maarof
International Journal of Computer Science Issues (IJCSI) 8 (3), 247, 2011
262011
Biometric encryption to enhance confidentiality in Cloud computing
MN Omar, M Salleh, M Bakhtiari
2014 International symposium on biometrics and security technologies (ISBAST …, 2014
252014
A comprehensive literature review of asymmetric key cryptography algorithms for establishment of the existing gap
AMM Juliet N. Gaithuru , Majid Bakhtiari, Mazleena Saleh
2015 9th Malaysian Software Engineering Conference (MySEC), 236-244, 2015
192015
Printed document integrity verification using barcode
A Husain, M Bakhtiari, A Zainal
Journal Teknologi (Sciences and Eng, 99-106, 2014
192014
Research Article A Survey of Wireless Sensor Network Security and Routing Techniques
RW Anwar, M Bakhtiari, A Zainal, KN Qureshi
Research Journal of Applied Sciences, Engineering and Technology 9 (11 …, 2015
182015
Authentication method through keystrokes measurement of mobile users in cloud environment
M Babaeizadeh, M Bakhtiari, MA Maarof
Int. J. Advance Soft Compu. Appl 6 (3), 94-112, 2014
182014
Insight into the operation of NTRU and a comparative study of NTRU, RSA and ECC public key cryptosystems
JN Gaithuru, M Bakhtiari
2014 8th. Malaysian Software Engineering Conference (MySEC), 273-278, 2014
162014
JPEG mage encryption with Elliptic Curve Cryptography
S Bakhtiari, S Ibrahim, M Salleh, M Bakhtiari
2014 International Symposium on Biometrics and Security Technologies (ISBAST …, 2014
132014
Agent-based approach for modeling evacuee uncertainty behavior using game theory model
H Chizari, F Malekinezhad, MR Embi, YM Yatim, SA Razak, ...
Life Science Journal 10 (3), 1350-1355, 2013
132013
Performance evaluation of routing protocol on aodv and dsr under wormhole attack
MG Sanaei, IF Isnin, M Bakhtiari
International Journal of Computer Networks and Communications Security 1 (1), 2013
112013
An HTTPS approach to resist man in the middle attack in secure SMS using ECC and RSA
MM Khan, M Bakhtiari, S Bakhtiari
2013 13th International Conference on Intellient Systems Design and …, 2013
92013
Wireless sensor network performance analysis and effect of blackhole and sinkhole attacks
RW Anwar, M Bakhtiari, A Zainal, KN Qureshi
Jurnal Teknologi (Science & Engineering) 78 (4-3), 75-81, 2016
82016
Malicious node detection through trust aware routing in wireless sensor networks
N QURESHI
Journal of Theoretical and Applied Information Technology 74 (1), 2015
82015
The system can't perform the operation now. Try again later.
Articles 1–20