Follow
Majid Bakhtiari
Title
Cited by
Cited by
Year
Security Issues and Attacks in Wireless Sensor Network
AHAKNQ Raja Waseem Anwar, Majid Bakhtiari, Anazida Zainal
World Applied Sciences Journal 10 (30), 1224-1227, 2014
97*2014
Cryptanalysis and improvement of a robust smart card secured authentication scheme on SIP using elliptic curve cryptography
MS Farash, S Kumari, M Bakhtiari
Multimedia Tools and Applications 75, 4485-4504, 2016
442016
Serious security weakness in RSA cryptosystem
M Bakhtiari, MA Maarof
International Journal of Computer Science Issues (IJCSI) 9 (1), 175, 2012
402012
Authentication methods in cloud computing: A survey
M Babaeizadeh, M Bakhtiari, AM Mohammed
Research Journal of Applied Sciences, Engineering and Technology 9 (8), 655-664, 2015
332015
Keystroke dynamic authentication in mobile cloud computing
M Babaeizadeh, M Bakhtiari, MA Maarof
Universiti Teknologi Malaysia, 2014
302014
Enhanced trust aware routing against wormhole attacks in wireless sensor networks
RW Anwar, M Bakhtiari, A Zainal, AH Abdullah, KN Qureshi
2015 International Conference on Smart Sensors and Application (ICSSA), 56-59, 2015
292015
An efficient stream cipher algorithm for data encryption
M Bakhtiari, MA Maarof
International Journal of Computer Science Issues (IJCSI) 8 (3), 247, 2011
262011
Biometric encryption to enhance confidentiality in Cloud computing
MN Omar, M Salleh, M Bakhtiari
2014 International symposium on biometrics and security technologies (ISBAST …, 2014
252014
A comprehensive literature review of asymmetric key cryptography algorithms for establishment of the existing gap
AMM Juliet N. Gaithuru , Majid Bakhtiari, Mazleena Saleh
2015 9th Malaysian Software Engineering Conference (MySEC), 236-244, 2015
212015
Printed document integrity verification using barcode
A Husain, M Bakhtiari, A Zainal
Journal Teknologi (Sciences and Eng, 99-106, 2014
192014
Research Article A Survey of Wireless Sensor Network Security and Routing Techniques
RW Anwar, M Bakhtiari, A Zainal, KN Qureshi
Research Journal of Applied Sciences, Engineering and Technology 9 (11 …, 2015
182015
Authentication method through keystrokes measurement of mobile users in cloud environment
M Babaeizadeh, M Bakhtiari, MA Maarof
Int. J. Advance Soft Compu. Appl 6 (3), 94-112, 2014
182014
Insight into the operation of NTRU and a comparative study of NTRU, RSA and ECC public key cryptosystems
JN Gaithuru, M Bakhtiari
2014 8th. Malaysian Software Engineering Conference (MySEC), 273-278, 2014
162014
Agent-based approach for modeling evacuee uncertainty behavior using game theory model
H Chizari, F Malekinezhad, MR Embi, YM Yatim, SA Razak, ...
Life Science Journal 10 (3), 1350-1355, 2013
142013
JPEG mage encryption with Elliptic Curve Cryptography
S Bakhtiari, S Ibrahim, M Salleh, M Bakhtiari
2014 International Symposium on Biometrics and Security Technologies (ISBAST …, 2014
132014
Performance evaluation of routing protocol on aodv and dsr under wormhole attack
MG Sanaei, IF Isnin, M Bakhtiari
International Journal of Computer Networks and Communications Security 1 (1), 2013
112013
An HTTPS approach to resist man in the middle attack in secure SMS using ECC and RSA
MM Khan, M Bakhtiari, S Bakhtiari
2013 13th International Conference on Intellient Systems Design and …, 2013
92013
Wireless sensor network performance analysis and effect of blackhole and sinkhole attacks
RW Anwar, M Bakhtiari, A Zainal, KN Qureshi
Jurnal Teknologi (Science & Engineering) 78 (4-3), 75-81, 2016
82016
Malicious node detection through trust aware routing in wireless sensor networks
N QURESHI
Journal of Theoretical and Applied Information Technology 74 (1), 2015
82015
Advanced Persistent Threat Detection Based On Network Traffic Noise Pattern and Analysis
SCY Ng, M Bakhtiarib
Journal of Advanced Research in Computing and Applications 2 (1), 1-18, 2016
72016
The system can't perform the operation now. Try again later.
Articles 1–20