jalil taghia, Mohammadali Doostari, "Subband-Based Single-Channel Source Separation of Instantaneous Audio Mixtures", World Applied Science Journal, 2009/11/06, Issue:vOL 6 NUM 6 jalil taghia, Mohammadali Doostari, "A new algorithm in blind source separation for high dimensional data sets such as MEG data", Lecture Notes on Numerical Methods in Engineering and Sciences, 2009/06/06, Issue:2009, VIII, 434 p Mohammadali Doostari, mohandes Abbas Khodaverdi, Mohammad Mardani, "گذرنامه الکترونيکي و پياده سازي آن در ايران", گزارش کامپيوتر, 2009/06/25, Volume:, Issue: Mohammad Hassan Safavi Pour, Mohammadali Doostari, Javad Asgaripour, "Face Detection Using Fuzzy and Wavelet Neural Network", International Review on Computers and Software, 2011/03/21, Issue:Vol.6 N.2 Mohammad Hassan Safavi Pour, Mohammadali Doostari, "Diverse Comparision of Linear and Nonlinear Approaches & Efficency of Wavelet Nural Network Aaproche in Appearance-Based Identification", International Research Journal of Engineering and Technologies, 2012/08/22, Volume:Vol 4, Issue:No 6 Ramin Zeinali Tajani, Mohammadali Doostari, "Anomaly detection in cliques of online social networks using fuzzy node _ fuzzy graph", Journal of Basic and Applied Scientific Research , 2012/11/07, Volume:, Issue: Ramin Zeinali Tajani, Mohammadali Doostari, "Detection of Espionage Activities in Social Networks using Fuzzy Logic", رايانش نرم و فن اوري اطلاعات=Journal of Soft Computing and Information Technology, 2012/12/20, Volume:, Issue: sedigheh avalin cheharsoghi, Mohammadali Doostari, "ارزيابي ريسک امنيت اطلاعات با استفاده از شبکه هاي عصبي مصنوعي", پدافند الکترونيکي و سايبري , 2013/05/20, Volume:, Issue: Mohammadali Doostari, Atena Lotfi, "A New M-Payment Protocol Using Sign-Cryption & Elliptic Curve Cryptography", پدافند الکترونيکي و سايبري , 2013/10/22, Volume:3, Issue:سال اول شماره 3 Mostafa Mohammadpourfard, Mohammadali Doostari, M.B. Ghaznavi-Ghoushchi, Nafiseh Shakiba, "A new secure Internet voting protocol using Java Card 3 technology and Java information flow concept", Security and Communication Networks, 2013/10/22, Volume:, Issue: Mostafa Mohammadpourfard, Mohammadali Doostari, M.B. Ghaznavi-Ghoushchi, Hadi Mikaili, "Design and implementation of a novel secure internet voting protocol using Java Card 3 technology", International Journal of Business Information Systems, 2014/04/01, Volume:, Issue: Gholamreza Kiani, Mohammadali Doostari, "Toward PMI-Based access control and management framework for infrastructure as a service (IaaS) providers", Research-Technology Management, 2014/12/22, Volume:2015, Issue: Maryam Zarezadeh, Mohammadali Doostari, "Determining Threshold Value and Sharing Secret Updating Period in MANET", Advances in Computer Science: an International Journal, 2014/01/10, Volume:3, Issue:1 Maryam Zarezadeh, Mohammadali Doostari, "On the performance of SIFT algorithem on hidden finger print in electronic commerce transactions", صنايع الکترونيک, 2014/11/06, Volume:, Issue: Zahra Parsian, Mohammadali Doostari, ali parsian, "A Probabilistic Approach on the Composition of Cryptographic Systems", Research Journal of Fisheries and HydroBiology , 2015/05/10, Volume:10, Issue:9 Rahim Emami Shelloo, Mohammadali Doostari, Hajar Bigdely, "شاهد: راي گيري اينترنتي امن با بهره گيري از زيرساخت هاي بانکي", رايانش نرم و فن اوري اطلاعات=Journal of Soft Computing and Information Technology, 2015/04/04, Volume:4, Issue:2 M Pourmonfared Azimi, M.A. Doostdari, "Studying privacy in electronic voting protocols and comparing its methods of provision", Journal of Fundamental and Applied Sciences, 2016/03/21, Volume:8, Issue: 3S Special Issue Sadeq Haji Mohseni, Mohammadali Doostari, Mohammad Bagher Ghaznavi Ghushchi, "Classification of Hardware Trojans and a new method for their detection", فناوري اطلاعات و ارتباطات ايران, 2016/03/20, Volume:000000, Issue:1395 Mohammed Gharib, Zahra Moradlou, Mohammadali Doostari, Ali Movaghar, "Fully distributed ECC-based key management for mobile ad hoc networks", Computer Networks:The International Journal of Computer and Telecommunications, 2017/02/11, Volume:, Issue:1389-1286 Maryam Zarezadeh, Mohammadali Doostari, Hamid Haj Seyyed Javadi, "Determining the Number of Accusations for Decision Making in Key Revocation Protocol for MANET", Journal of Computing and Security, 2017/03/20, Volume:3, Issue:1 S. Kaedi, Mohammadali Doostari, M.B. Ghaznavi-Ghoushchi, "NEMR: A Nonequidistant DPA Attack-Proof of Modular Reduction in a CRT Implementation of RSA", Journal of Circuits, Systems and Computers, 2018/02/23, Volume:1233, Issue:12 Majid Bayat, Mohammadali Doostari, Saeed Rezaei, "A review on feature based access control in cloud environment ", منادي امنيت فضاي توليد و تبادل اطلاعات, 2017/02/19, Volume:9, Issue:1 Mohammadali Doostari, Mohammad Khadivi Kashani, "A review on privacy and security enhancement in identification management systems", منادي امنيت فضاي توليد و تبادل اطلاعات, 2017/02/19, Volume:10, Issue:2 Nafiseh Mohamadishakiba, Mohammadali Doostari, Shahin Norouzi, "I-FOO: An Enhancement to FOO Protocol", International Journal of Computer Applications, 2013/05/01, Volume:70, Issue:No.3 Hamid Yazdani, Mohammadali Doostari, Vahid Yazdani, "A New Method to Persian Text Watermarking Using Curvaceous Letters", Journal of Basic and Applied Scientific Research , 2013/04/01, Volume:3, Issue:4 Mostafa Noorbakhsh, Mohammadali Doostari, "Analysis of environmental factors on strategic planning for governmental management issues", مطالعات دفاعي استراتژيک- تغيير عنوان يافته, 2006/06/21, Volume:25, Issue:1385 Saman Kaedi, Mohammadali Doostari, M.B. Ghaznavi-Ghoushchi, "Low-complexity and differential power analysis (DPA)-resistant two-folded power-aware Rivest–Shamir–Adleman (RSA) security schema implementation for IoT-connected devices", IET Computers & Digital Techniques, 2018/09/12, Volume:12, Issue:6 S. Kaedi, Mohammadali Doostari, M.B. Ghaznavi-Ghoushchi, "A DPA Attack on IOA Data-Dependent Delay Countermeasure Based on an Inherent Tempo-Spatial Data Dependency", IEEE Transactions on Circuits and Systems II: Express Briefs, 2018/10/16, Volume:2018, Issue:First Online Accepted Majid Bayat, Mohammadali Doostari, Saeed Rezaei, "A Lightweight and Efficient Data Sharing Scheme for Cloud Computing", International Journal of Electronics and Information Engineering, 2018/12/01, Volume:9, Issue:2 S. Kaedi, M. B. Ghaznavi-Ghoushchi, H. Yusefi, Mohammadali Doostari, "A New Side-Channel Attack on Reduction of RSA CRT Montgomery Method Based", Journal of Circuits, Systems and Computers, 2020/05/25, Volume:2020, Issue:Early Access Majid Bayat, Ashok Kumar Das, Morteza Pournaghi, Hossein Abdi Nasib Far, Mahdi Fotuhi, Mohammadali Doostari, "A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT", Computer Networks:The International Journal of Computer and Telecommunications, 2020/05/25, Volume:1, Issue:1 Majid Bayat, Mohammadali Doostari, Hossein Abdi Nasib Far, Ashok Kumar Das, Mahdi Fotuhi, Morteza Pournaghi, "LAPTAS: lightweight anonymous privacy-preserving three-factor authentication scheme for WSN-based IIoT", Wireless Networks, 2021/01/02, Volume:1, Issue:1 S. Kaedi, Mohammadali Doostari, H. Yusefi, M. B. Ghaznavi-Ghoushchi, "A New Side-Channel Attack on Reduction of RSA-CRT Montgomery Method Based", Journal of circuit, system and computer, 2020/05/17, Volume:111, Issue:111