Follow
Majid Bakhtiari
Title
Cited by
Cited by
Year
Security issues and attacks in wireless sensor network
RW Anwar, M Bakhtiari, A Zainal, AH Abdullah, KN Qureshi
World Applied Sciences Journal 30 (10), 1224-1227, 2014
832014
Security Issues and Attacks in Wireless Sensor Network
AHAKNQ Raja Waseem Anwar, Majid Bakhtiari, Anazida Zainal
World Applied Sciences Journal 10 (30), 1224-1227, 2014
83*2014
Cryptanalysis and improvement of a robust smart card secured authentication scheme on SIP using elliptic curve cryptography
MS Farash, S Kumari, M Bakhtiari
Multimedia Tools and Applications 75 (8), 4485-4504, 2016
382016
Serious security weakness in RSA cryptosystem
M Bakhtiari, MA Maarof
International Journal of Computer Science Issues (IJCSI) 9 (1), 175, 2012
332012
Keystroke dynamic authentication in mobile cloud computing
M Babaeizadeh, M Bakhtiari, MA Maarof
Universiti Teknologi Malaysia, 2014
292014
Enhanced trust aware routing against wormhole attacks in wireless sensor networks
RW Anwar, M Bakhtiari, A Zainal, AH Abdullah, KN Qureshi
2015 International Conference on Smart Sensors and Application (ICSSA), 56-59, 2015
242015
Authentication methods in cloud computing: A survey
M Babaeizadeh, M Bakhtiari, AM Mohammed
Research Journal of Applied Sciences, Engineering and Technology 9 (8), 655-664, 2015
242015
An efficient stream cipher algorithm for data encryption
M Bakhtiari, MA Maarof
International Journal of Computer Science Issues (IJCSI) 8 (3), 247, 2011
232011
Biometric encryption to enhance confidentiality in Cloud computing
MN Omar, M Salleh, M Bakhtiari
2014 International symposium on biometrics and security technologies (ISBAST …, 2014
202014
Authentication method through keystrokes measurement of mobile users in cloud environment
M Babaeizadeh, M Bakhtiari, MA Maarof
Int. J. Advance Soft Compu. Appl 6 (3), 94-112, 2014
172014
Printed document integrity verification using barcode
A Husain, M Bakhtiari, A Zainal
Jurnal Teknologi 70 (1), 2014
172014
A survey of wireless sensor network security and routing techniques
RW Anwar, M Bakhtiari, A Zainal, KN Qureshi
Research Journal of Applied Sciences, Engineering and Technology 9 (11 …, 2015
132015
JPEG mage encryption with Elliptic Curve Cryptography
S Bakhtiari, S Ibrahim, M Salleh, M Bakhtiari
2014 International Symposium on Biometrics and Security Technologies (ISBAST …, 2014
122014
Agent-based approach for modeling evacuee uncertainty behavior using game theory model
H Chizari, F Malekinezhad, MR Embi, YM Yatim, SA Razak, ...
Life Science Journal 10 (3), 1350-1355, 2013
112013
A comprehensive literature review of asymmetric key cryptography algorithms for establishment of the existing gap
AMM Juliet N. Gaithuru , Majid Bakhtiari, Mazleena Saleh
2015 9th Malaysian Software Engineering Conference (MySEC), 236-244, 2015
102015
Insight into the operation of NTRU and a comparative study of NTRU, RSA and ECC public key cryptosystems
JN Gaithuru, M Bakhtiari
2014 8th. Malaysian Software Engineering Conference (MySEC), 273-278, 2014
102014
Malicious node detection through trust aware routing in wireless sensor networks
N QURESHI
Journal of Theoretical and Applied Information Technology 74 (1), 2015
82015
Performance evaluation of routing protocol on aodv and dsr under wormhole attack
MG Sanaei, IF Isnin, M Bakhtiari
International Journal of Computer Networks and Communications Security 1, 2013
82013
Wireless sensor network performance analysis and effect of blackhole and sinkhole attacks
RW Anwar, M Bakhtiari, A Zainal, KN Qureshi
Jurnal Teknologi 78 (4-3), 2016
72016
An HTTPS approach to resist man in the middle attack in secure SMS using ECC and RSA
MM Khan, M Bakhtiari, S Bakhtiari
2013 13th International Conference on Intellient Systems Design and …, 2013
72013
The system can't perform the operation now. Try again later.
Articles 1–20