Follow
Dr. Doostari
Dr. Doostari
Department of Computer Engineering, Shahed University
Verified email at shahed.ac.ir
Title
Cited by
Cited by
Year
A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT
M Fotouhi, M Bayat, AK Das, HAN Far, SM Pournaghi, MA Doostari
Computer Networks 177, 107333, 2020
1652020
LAPTAS: lightweight anonymous privacy-preserving three-factor authentication scheme for WSN-based IIoT
H Abdi Nasib Far, M Bayat, A Kumar Das, M Fotouhi, SM Pournaghi, ...
Wireless Networks 27 (2), 1389-1412, 2021
542021
Fully distributed ECC-based key management for mobile ad hoc networks
M Gharib, Z Moradlou, MA Doostari, A Movaghar
Computer Networks 113, 269-283, 2017
392017
An image watermarking method based on bidimensional empirical mode decomposition
J Taghia, MA Doostari, J Taghia
2008 Congress on Image and Signal Processing 5, 674-678, 2008
282008
A lightweight and efficient data sharing scheme for cloud computing
M Bayat, M Doostari, S Rezaei
International Journal of Electronics and Information Engineering 9 (2), 2018
262018
A simulation study on autonomous decentralized mechanism in fish behaviour model
N Sannomiya, MA Doustari
International journal of systems science 27 (10), 1001-1007, 1996
161996
Low‐complexity and differential power analysis (DPA)‐resistant two‐folded power‐aware Rivest–Shamir–Adleman (RSA) security schema implementation for IoT‐connected devices
S Kaedi, MA Doostari, MB Ghaznavi‐Ghoushchi
IET Computers & Digital Techniques 12 (6), 279-288, 2018
152018
A new method to persian text watermarking using curvaceous letters
H Yazdani, M Doostari, V Yazdani
Journal of Basic and Applied Scientific Research 3 (4), 2013
132013
ESIV: an end-to-end secure internet voting system
NM Shakiba, MA Doostari, M Mohammadpourfard
Electronic Commerce Research 17, 463-494, 2017
112017
A simulation study on schooling mechanism in fish behavior
MA Doustari, N Sannomiya
Transactions of the Institute of Systems, Control and Information Engineers …, 1992
111992
A hybrid approach to multimodal biometric recognition based on feature-level fusion of face, two irises, and both thumbprints
MH Safavipour, MA Doostari, H Sadjedi
Journal of Medical Signals & Sensors 12 (3), 177-191, 2022
102022
Subband-based single-channel source separation of instantaneous audio mixtures
J Taghia, MA Doostari
World Applied Sciences Journal 6 (6), 784-792, 2009
102009
Heuristic process model simplification in frequency response domain
M Shahbaz, M Shirvani, MA Doustary, Z Eksiri
International Journal of Engineering 17 (1), 19-39, 2004
102004
How does Fish School Change Form? A Hypothesis from Simulation Study
MA Doustari, N Sannomiya
Transactions of the Society of Instrument and Control Engineers 29 (12 …, 1993
81993
A new secure Internet voting protocol using Java Card 3 technology and Java information flow concept
M Mohammadpourfard, MA Doostari, MB Ghaznavi Ghoushchi, ...
Security and Communication Networks 8 (2), 261-283, 2015
72015
Fully distributed self certified key management for large-scale MANETs
Z Moradlu, MA Doostari, M Gharib, A Movaghar
2013 IEEE 10th International Conference on Ubiquitous Intelligence and …, 2013
62013
A new approach for secure and portable OS
HR Ghaleh, MA Doustari
2008 Second International Conference on Emerging Security Information …, 2008
62008
Irregularity Analysis of Iris Patterns.
A Golestani, A Ashouri, K Ahmadian, MR Jahed-Motlagh, MA Doostari
IPCV 8, 691-695, 2008
62008
Autonomous decentralized mechanism in fish behavior model
MA Doustari, N Sannomiya
Proceedings ISAD 93: International Symposium on Autonomous Decentralized …, 1993
61993
Differential power analysis in the smart card by data simulation
AZM Kootiani, M Doostari, A Golabpour, M Broujerdian
2008 International Conference on multimedia and information Technology, 817-821, 2008
52008
The system can't perform the operation now. Try again later.
Articles 1–20