Follow
Maede Ashouri-Talouki
Maede Ashouri-Talouki
Associate Professor of Computer Engineering, University of Isfahan
Verified email at eng.ui.ac.ir - Homepage
Title
Cited by
Cited by
Year
Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks
AH Adavoudi-Jolfaei, M Ashouri-Talouki, SF Aghili
Peer-to-Peer Networking and Applications, 2017
782017
DoS, impersonation and de-synchronization attacks against an ultra-lightweight RFID mutual authentication protocol for IoT
SF Aghili, M Ashouri-Talouki, H Mala
The Journal of Supercomputing 74, 509-525, 2018
562018
Anonymous decentralized attribute-based access control for cloud-assisted IoT
H Nasiraee, M Ashouri-Talouki
Future Generation Computer Systems 110, 45-56, 2020
402020
GLP: A cryptographic approach for group location privacy
M Ashouri-Talouki, A Baraani-Dastjerdi, AA Selçuk
Computer Communications 35 (12), 1527-1533, 2012
342012
Privacy-preserving distributed data access control for CloudIoT
H Nasiraee, M Ashouri-Talouki
IEEE Transactions on Dependable and Secure Computing 19 (4), 2476-2487, 2021
282021
Multi-keyword ranked searchable encryption scheme with access control for cloud storage
M Zarezadeh, H Mala, M Ashouri-Talouki
Peer-to-Peer Networking and Applications 13 (1), 207-218, 2020
252020
SeVR+ :Secure and Privacy-Aware Cloud-Assisted Video Reporting in 5G Enabled Vehicular Networks
A Mohseni-Ejiyeh, M Ashouri-Talouki
Electrical Engineering (ICEE), 2017 25th Iranian Conference on, 2017
20*2017
An efficient privacy-preserving data aggregation scheme in smart grid
A Karampour, M Ashouri-Talouki, BT Ladani
2019 27th Iranian Conference on Electrical Engineering (ICEE), 1967-1971, 2019
172019
The Cloaked-Centroid protocol: location privacy protection for a group of users of location-based services
M Ashouri-Talouki, A Baraani-Dastjerdi, AA Selçuk
Knowledge and Information Systems 45 (3), 589-615, 2015
152015
Homomorphic encryption to preserve location privacy
M Ashouri-Talouki, A Baraani-Dastjerdi
International Journal of Security and Its Applications 6 (4), 183-189, 2012
152012
Blockchain for steganography: advantages, new algorithms and open challenges
O Torki, M Ashouri-Talouki, M Mahdavi
18th International ISC Conference on Information Security and Cryptology …, 2021
112021
ADAM-DPGAN: a differential private mechanism for generative adversarial network
M Azadmanesh, BS Ghahfarokhi, MA Talouki
Applied Intelligence 53 (9), 11142-11161, 2023
102023
Developing Ghasedak: a mobile application to improve the quality of cancer palliative care
N Salimian, A Ehteshami, M Ashouri-Talouki
Acta Informatica Medica 27 (1), 19, 2019
102019
An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks
A Mohseni-Ejiyeh, M Ashouri-Talouki, M Mahdavi
The ISC Int'l Journal of Information Security (ISeCure) 10, 15-27, 2018
102018
Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems.
M Zarezadeh, MA Taluki, M Siavashi
ISeCure 12 (2), 2020
92020
A white-box generator membership inference attack against generative models
M Azadmanesh, BS Ghahfarokhi, MA Talouki
2021 18th International ISC Conference on Information Security and …, 2021
82021
K-anonymity privacy protection using ontology
MA Talouki, M NematBakhsh, A Baraani
2009 14th International CSI Computer Conference, 682-685, 2009
72009
Optimal black-box traceability in decentralized attribute-based encryption
H Nasiraee, M Ashouri-Talouki, X Liu
IEEE Transactions on Cloud Computing 11 (3), 2459-2472, 2022
52022
A lightweight and secure data sharing protocol for D2D communications
A Mohseni-Ejiyeh, M Ashouri-Talouki, M Mahdavi
2017 14th International ISC (Iranian Society of Cryptology) Conference on …, 2017
52017
On the local convergence of GANs with differential privacy: Gradient clipping and noise perturbation
M Azadmanesh, BS Ghahfarokhi, MA Talouki, H Eliasi
Expert Systems with Applications 224, 120006, 2023
42023
The system can't perform the operation now. Try again later.
Articles 1–20