Follow
Hamed Arshad
Hamed Arshad
PhD in Information Security, University of Oslo
Verified email at ifi.uio.no - Homepage
Title
Cited by
Cited by
Year
A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps
S Kumari, X Li, F Wu, AK Das, H Arshad, MK Khan
Future Generation Computer Systems 63, 56-75, 2016
1732016
Three-factor anonymous authentication and key agreement scheme for telecare medicine information systems
H Arshad, M Nikooghadam
Journal of medical systems 38, 1-12, 2014
1552014
An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC
H Arshad, M Nikooghadam
Multimedia Tools and Applications 75 (1), 181-197, 2016
1142016
Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme
A Ostad-Sharif, H Arshad, M Nikooghadam, D Abbasinezhad-Mood
Future Generation Computer Systems 100, 882-892, 2019
1022019
A lightweight authentication and key agreement protocol preserving user anonymity
M Nikooghadam, R Jahantigh, H Arshad
Multimedia Tools and Applications 76 (11), 13401-13423, 2017
662017
On the security of a two-factor authentication and key agreement scheme for telecare medicine information systems
H Arshad, V Teymoori, M Nikooghadam, H Abbassi
Journal of medical systems 39, 1-10, 2015
612015
Design of a secure authentication and key agreement scheme preserving user privacy usable in telecare medicine information systems
H Arshad, A Rasoolzadegan
Journal of medical systems 40, 1-19, 2016
322016
Security analysis and improvement of two authentication and key agreement schemes for session initiation protocol
H Arshad, M Nikooghadam
The Journal of Supercomputing 71 (8), 3163-3180, 2015
312015
A secure authentication and key agreement scheme for roaming service with user anonymity
H Arshad, A Rasoolzadegan
International Journal of Communication Systems 30 (18), e3361, 2017
252017
The Snowden Phone: A Comparative Survey of Secure Instant Messaging Mobile Applications
C Johansen, A Mujaj, H Arshad, J Noll
Security and Communication Networks, 2021
19*2021
An improved SIP authentication scheme based on server-oriented biometric verification
A Irshad, S Kumari, X Li, F Wu, SA Chaudhry, H Arshad
Wireless Personal Communications 97, 2145-2166, 2017
112017
Design and FPGA implementation of an efficient security mechanism for mobile pay‐TV systems
H Arshad, M Nikooghadam, S Avezverdi, M Nazari
International Journal of Communication Systems 30 (15), e3305, 2017
92017
Semantic Attribute-Based Access Control: A review on current status and future perspectives
H Arshad, C Johansen, O Owe
Journal of Systems Architecture: Embedded Software Design (JSA) 129, 1-24, 2022
42022
Semantic Attribute-Based Encryption: A Framework for Combining ABE schemes with Semantic Technologies
H Arshad, C Johansen, O Owe, P Picazo-Sanchez, G Schneider
Information Sciences, 1-33, 2022
22022
Process Algebra Can Save Lives: Static Analysis of XACML Access Control Policies using mCRL2
H Arshad, R Horne, C Johansen, O Owe, T Willemse
Formal Techniques for Distributed Objects, Components, and Systems. FORTE …, 2022
12022
XACML2mCRL2: Automatic Transformation of XACML Policies into mCRL2 Specifications
H Arshad, R Horne, C Johansen, O Owe, TAC Willemse
Science of Computer Programming, 2024
2024
Attribute-Based Encryption with Enforceable Obligations
H Arshad, P Picazo-Sanchez, C Johansen, G Schneider
Journal of Cryptographic Engineering, 2023
2023
Toward Semantic Attribute-Based Access Control: Fine-grained protection of data in e-Health
H Arshad
University of Oslo, 2022
2022
A Survey of Semantic Attribute-Based Access Control Schemes
H Arshad
Workshop on Programming Theory, 13, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–19