Follow
Maede Ashouri-Talouki
Maede Ashouri-Talouki
Associate Professor of Computer Engineering, University of Isfahan
Verified email at eng.ui.ac.ir - Homepage
Title
Cited by
Cited by
Year
Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks
AH Adavoudi-Jolfaei, M Ashouri-Talouki, SF Aghili
Peer-to-Peer Networking and Applications, 2017
742017
DoS, impersonation and de-synchronization attacks against an ultra-lightweight RFID mutual authentication protocol for IoT
SF Aghili, M Ashouri-Talouki, H Mala
The Journal of Supercomputing 74, 509-525, 2018
542018
Anonymous decentralized attribute-based access control for cloud-assisted IoT
H Nasiraee, M Ashouri-Talouki
Future Generation Computer Systems 110, 45-56, 2020
332020
GLP: A cryptographic approach for group location privacy
M Ashouri-Talouki, A Baraani-Dastjerdi, AA Selçuk
Computer Communications 35 (12), 1527-1533, 2012
332012
Multi-keyword ranked searchable encryption scheme with access control for cloud storage
M Zarezadeh, H Mala, M Ashouri-Talouki
Peer-to-Peer Networking and Applications 13 (1), 207-218, 2020
242020
Privacy-preserving distributed data access control for CloudIoT
H Nasiraee, M Ashouri-Talouki
IEEE Transactions on Dependable and Secure Computing 19 (4), 2476-2487, 2021
202021
SeVR+ :Secure and Privacy-Aware Cloud-Assisted Video Reporting in 5G Enabled Vehicular Networks
A Mohseni-Ejiyeh, M Ashouri-Talouki
Electrical Engineering (ICEE), 2017 25th Iranian Conference on, 2017
18*2017
The Cloaked-Centroid protocol: location privacy protection for a group of users of location-based services
M Ashouri-Talouki, A Baraani-Dastjerdi, AA Selçuk
Knowledge and Information Systems 45 (3), 589-615, 2015
152015
Homomorphic encryption to preserve location privacy
M Ashouri-Talouki, A Baraani-Dastjerdi
International Journal of Security and Its Applications 6 (4), 183-189, 2012
152012
An efficient privacy-preserving data aggregation scheme in smart grid
A Karampour, M Ashouri-Talouki, BT Ladani
2019 27th Iranian Conference on Electrical Engineering (ICEE), 1967-1971, 2019
142019
Blockchain for steganography: advantages, new algorithms and open challenges
O Torki, M Ashouri-Talouki, M Mahdavi
18th International ISC Conference on Information Security and Cryptology …, 2021
102021
Developing Ghasedak: a mobile application to improve the quality of cancer palliative care
N Salimian, A Ehteshami, M Ashouri-Talouki
Acta Informatica Medica 27 (1), 19, 2019
102019
An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks
A Mohseni-Ejiyeh, M Ashouri-Talouki, M Mahdavi
The ISC Int'l Journal of Information Security (ISeCure) 10, 15-27, 2018
92018
Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems.
M Zarezadeh, MA Taluki, M Siavashi
ISeCure 12 (2), 2020
72020
K-anonymity privacy protection using ontology
MA Talouki, M NematBakhsh, A Baraani
2009 14th International CSI Computer Conference, 682-685, 2009
72009
A white-box generator membership inference attack against generative models
M Azadmanesh, BS Ghahfarokhi, MA Talouki
2021 18th International ISC Conference on Information Security and …, 2021
62021
ADAM-DPGAN: a differential private mechanism for generative adversarial network
M Azadmanesh, BS Ghahfarokhi, MA Talouki
Applied Intelligence 53 (9), 11142-11161, 2023
52023
A lightweight and secure data sharing protocol for D2D communications
A Mohseni-Ejiyeh, M Ashouri-Talouki, M Mahdavi
2017 14th International ISC (Iranian Society of Cryptology) Conference on …, 2017
52017
Cryptographic collusion-resistant protocols for secure sum
M Ashouri-Talouki, A Baraani-Dastjerdi
International Journal of Electronic Security and Digital Forensics 9 (1), 19-34, 2017
42017
Anonymous electronic voting protocol with deniable authentication for mobile ad hoc networks
M Ashouri-Talouki, A Baraani-Dastjerdi
International Journal of Multimedia and Ubiquitous Engineering 9 (1), 361-368, 2014
42014
The system can't perform the operation now. Try again later.
Articles 1–20