Certificateless aggregate signcryption: Security model and a concrete construction secure in the random oracle model Z Eslami, N Pakniat Journal of King Saud University-Computer and Information Sciences 26 (3 …, 2014 | 73 | 2014 |
Collocation method using sinc and Rational Legendre functions for solving Volterra’s population model K Parand, Z Delafkar, N Pakniat, A Pirkhedri, MK Haji Communications in Nonlinear Science and Numerical Simulation 16 (4), 1811-1819, 2011 | 58 | 2011 |
Certificateless authenticated encryption with keyword search: Enhanced security model and a concrete construction for industrial IoT N Pakniat, D Shiraly, Z Eslami Journal of Information Security and Applications 53, 102525, 2020 | 54 | 2020 |
Secret image sharing scheme with hierarchical threshold access structure N Pakniat, M Noroozi, Z Eslami Journal of Visual Communication and Image Representation 25 (5), 1093-1101, 2014 | 52 | 2014 |
Pairing-free certificateless authenticated encryption with keyword search D Shiraly, N Pakniat, M Noroozi, Z Eslami Journal of Systems Architecture 124, 102390, 2022 | 33 | 2022 |
Designated tester certificateless encryption with keyword search N Pakniat Journal of Information Security and Applications 49, 102394, 2019 | 21 | 2019 |
Distributed key generation protocol with hierarchical threshold access structure N Pakniat, M Noroozi, Z Eslami IET Information Security 9 (4), 248-255, 2015 | 21 | 2015 |
Cryptanalysis and improvement of a pairing-free certificateless signature scheme N Pakniat, B Abasi Vanda 15th International ISC (Iranian Society of Cryptology) Conference on …, 2018 | 19 | 2018 |
Comments on a chaos-based public key encryption with keyword search scheme M Noroozi, Z Eslami, N Pakniat Nonlinear Dynamics 94, 1127-1132, 2018 | 16 | 2018 |
A certificateless proxy signature scheme secure in standard model Z Eslami, N Pakniat International Conference on Latest Computational Technologies-ICLCT, 81-84, 2012 | 14 | 2012 |
Ideal social secret sharing using Birkhoff interpolation method Z Eslami, N Pakniat, M Nojoumian Security and Communication Networks 9 (18), 4973-4982, 2016 | 13* | 2016 |
Hierarchical threshold multi-secret sharing scheme based on birkhoff interpolation and cellular automata Z Eslami, N Pakniat, M Noroozi 2015 18th CSI International Symposium on Computer Architecture and Digital …, 2015 | 12 | 2015 |
Numerical solution of the Falkner-Skan equation with stretching boundary by collocation method K Parand, N Pakniat, Z Delafkar International Journal of Nonlinear Science 11 (3), 275-283, 2011 | 11 | 2011 |
Public key encryption with keyword search and keyword guessing attack: a survey N Pakniat 13th International Iranian Society of Cryptology Conference on Information …, 2016 | 10 | 2016 |
Cryptanalysis and improvement of a group RFID authentication protocol N Pakniat, Z Eslami Wireless Networks, 1-10, 2020 | 8 | 2020 |
Cryptanalysis of a certificateless aggregate signature scheme N Pakniat, M Noroozi 9th Conference of Command, Control, Communications and Computer Intelligence …, 2016 | 8 | 2016 |
A generic construction to build simple oblivious transfer protocols from homomorphic encryption schemes S Esmaeilzade, N Pakniat, Z Eslami The Journal of Supercomputing 78 (1), 72-92, 2022 | 6 | 2022 |
Reducing Multi-Secret Sharing Problem to Sharing a Single Secret Based on Cellular Automata N Pakniat, M Noroozi, Z Eslami Journal on Computer Science and Engineering 14 (1), 38-43, 2017 | 5 | 2017 |
Cryptanalysis of an attribute-based key agreement protocol Z Eslami, N Pakniat, M Noroozi International Journal of Computer & Information Technologies 2, 351-358, 2014 | 3 | 2014 |
A Proxy E-Raffle Protocol Based on Proxy Signatures. N Pakniat, Z Eslami J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 2 (3), 74-84, 2011 | 3 | 2011 |