Shahed University

 

Mohammadali Doostari

Associate Professor


School of : Faculty of Engineering
Department : Computer Engineering
Room number :
Email :
Office Tel :
Links :

Journal Papers (33)   Download XML   Download TXT

●  LAPTAS: lightweight anonymous privacy-preserving three-factor authentication scheme for WSN-based IIoT
   ◂ Majid Bayat, Mohammadali Doostari, Hossein Abdi Nasib Far, Ashok Kumar Das, Mahdi Fotuhi, Morteza Pournaghi
   ✔ 2021/01/02  1399/10/13
    Wireless Networks

●  A New Side-Channel Attack on Reduction of RSA CRT Montgomery Method Based
   ◂ S. Kaedi, M. B. Ghaznavi-Ghoushchi, H. Yusefi, Mohammadali Doostari
   ✔ 2020/05/25  1399/03/05
    Journal of Circuits, Systems and Computers

●  A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT
   ◂ Majid Bayat, Ashok Kumar Das, Morteza Pournaghi, Hossein Abdi Nasib Far, Mahdi Fotuhi, Mohammadali Doostari
   ✔ 2020/05/25  1399/03/05
    Computer Networks:The International Journal of Computer and Telecommunications

●  A New Side-Channel Attack on Reduction of RSA-CRT Montgomery Method Based
   ◂ S. Kaedi, Mohammadali Doostari, H. Yusefi, M. B. Ghaznavi-Ghoushchi
   ✔ 2020/05/17  1399/02/28
    Journal of circuit, system and computer

●  A Lightweight and Efficient Data Sharing Scheme for Cloud Computing
   ◂ Majid Bayat, Mohammadali Doostari, Saeed Rezaei
   ✔ 2018/12/01  1397/09/10
    International Journal of Electronics and Information Engineering
   ❖ PDF

●  A DPA Attack on IOA Data-Dependent Delay Countermeasure Based on an Inherent Tempo-Spatial Data Dependency
   ◂ S. Kaedi, Mohammadali Doostari, M.B. Ghaznavi-Ghoushchi
   ✔ 2018/10/16  1397/07/24
    IEEE Transactions on Circuits and Systems II: Express Briefs

●  Low-complexity and differential power analysis (DPA)-resistant two-folded power-aware Rivest–Shamir–Adleman (RSA) security schema implementation for IoT-connected devices
   ◂ Saman Kaedi, Mohammadali Doostari, M.B. Ghaznavi-Ghoushchi
   ✔ 2018/09/12  1397/06/21
    IET Computers & Digital Techniques

●  NEMR: A Nonequidistant DPA Attack-Proof of Modular Reduction in a CRT Implementation of RSA
   ◂ S. Kaedi, Mohammadali Doostari, M.B. Ghaznavi-Ghoushchi
   ✔ 2018/02/23  1396/12/04
    Journal of Circuits, Systems and Computers

●  Determining the Number of Accusations for Decision Making in Key Revocation Protocol for MANET
   ◂ Maryam Zarezadeh, Mohammadali Doostari, Hamid Haj Seyyed Javadi
   ✔ 2017/03/20  1395/12/30
    Journal of Computing and Security

●  A review on feature based access control in cloud environment
   ◂ Majid Bayat, Mohammadali Doostari, Saeed Rezaei
   ✔ 2017/02/19  1395/12/01
    منادی امنیت فضای تولید و تبادل اطلاعات



Conference Papers (32)   Download XML   Download TXT

●  Hardware Trojan detection based on power analysis using PCA and artificial network MLP
   ◂ Ali Fereidooni, Mohammadali Doostari, Hamed Yousefi
   ✔ 2019/08/28  1398/06/06
    شانزدهمین کنفرانس بین الملل انجمن رمز ایران
   ❖ PDF

●  A comparison of methods of sole control over digital signature using AHP technique
   ◂ Samira Razgardani, Mohammadali Doostari
   ✔ 2018/05/16  1397/02/26
    چهارمین کنفرانس ملی علوم و مهندسی کامپیوتر و فناوری اطلاعات
   ❖ PDF

●  A DPA attack on RSM resistant of improved AES
   ◂ Mojtaba Gazmeh, Mohammadali Doostari, Hamed Yusefi
   ✔ 2018/10/25  1397.08.03
    سومین کنفرانس بین المللی مهندسی برق
   ❖ PDF

●  A criterion for hardware trojan detection using leakage of cryptographic key
   ◂ Masoud Zivari Ekhlas, Mohammadali Doostari, Hamed Yusefi
   ✔ 2018/08/28  1397.06.06
    پانزدهمین کنفرانس بین المللی انجمن رمز ایران
   ❖ PDF

●  A survay on Multibiometric systems based on fusion on feature level
   ◂ Mohammadali Doostari, Naghibi Ferezghi, Mohammad Mahdi, Mohammad Hasan Safavipoor
   ✔ 2018/02/07  1396/11/18
    کنفرانس ملی مهندسی کامپیوتر، فناوری اطلاعاتو کاربردهای هوش مصنوعی
   ❖ PDF

●  A privacy and anonymity protocol for eHealth using PKI
   ◂ Mohammadali Doostari, Maryam meyayi, Massoud Momeni Tazangi
   ✔ 2016/11/10  1395/08/20
    4TH International Conference on Applied Research in Computer Engineering and Signal Processing
   ❖ PDF

●  A review of trusted computing new technologies and providing solutions for using these technologies in electronic health
   ◂ Mohammadali Doostari, Salimeh Yasari Zare, KhadijehSadat Hosseini, Maryam meyayi
   ✔ 2016/08/17  1395/05/27
    3rd International conference on Electrical, Electronic and Computer Engineering
   ❖ PDF

●  A New Secure e-Health Structure Based On Mobile Trusted Computing
   ◂ Mohammadali Doostari, Salimeh Yasari Zare
   ✔ 2016/07/12  1395/04/22
    1st international conference new perspective in Electrical and computer Engineering
   ❖ PDF

●  A comprehensive system of E_health for secure access to personal health records(PHR) using Mobile technology
   ◂ Salim Yasari Zare, Mohamad Ali Distari, Samini Taremi
   ✔ 2015/09/10  1394/06/19
    کنفرانس بین المللی یافته های نوین پژوهشی در مهندسی برق و علوم کامپیوتر
   ❖ PDF

●  Fully Distributed Self Certified Key Management for Large-Scale MANETs
   ◂ Zahra Moradlu, Mohammadali Doostari, Mohammed Gharib, Ali Movaghar
   ✔ 2013/12/18  1392/09/27
    Ubiquitous Intelligence and Computing, 2012 IEEE 10th International Conference on and 10th International Conferencece on Automatic and trusted Computi
   ❖ PDF



Books

●  Advances in Face image Analysis: Theory and Applications (Chapter 5: Face recognition using 3D face rectification)
   ◂ علیرضا بساق زاده، محمد علی دوستاری، علیرضا بهراد

Thesis

●  A framework to improve mobile security using SIM-based trusted computing and mobile cloud computing infrastructure
   ◂ معصومه فهیدصابر

●  یک طرح احراز هویت در فناوری خانه هوشمند بر پایه فناوری بلاک چین
   ◂ افشین حشمتی

●  Design and Implementation of a countermeasure method against DPA on McEliece Post Quantum Cryptosystem
   ◂ زینب حاج حسینی

●  ارایه یک پروتکل احراز هویت سبک وزن مبتنی بر توابع درهمساز در شبکه های سنسور بی سیم در حوزه سلامت الکترونیک
   ◂ مهدی فتوحی

●  ارائه یک پروتکل احراز هویت سبک وزن مبتنی بر شبکه های حسگر بی سیم در اینترنت اشیا
   ◂ حسین عبدی نصیب فر

●  ارایه یک پروتکل توافق کلید سبک وزن در سلامت الکترونیکی مبتنی بر نگاشت اشوبی
   ◂ معصومه اژنگ

●  یک روش نوین برای تشخیص تروجان سخت افزاری با تحلیل توان مصرفی پویا و ایستا
   ◂ علی فریدونی

●  A differential power analysis attack on the mask RSM implemented on the AES encryption algorithm
   ◂ مجتبی گزمه

●  Improvement in Mobile Payment Security Using Trusted Computing Infrastructures
   ◂ حامد اعظمی

●  Power Analysis Side Channel Attack Countermeasure on RSA Cryptography Algorithm with Logical and Physical Wrapper
   ◂ سامان کاییدی



H-Index Chart