Majid Bakhtiari

Learn More
The session initiation protocol (SIP) has been receiving a lot of attention to provide security in the Voice over IP (VoIP) in Internet and mobility management. Recently, Yeh et al. proposed a smart card-based authentication scheme for SIP using elliptic curve cryptography (ECC). They claimed that their scheme is secure against known security attacks.(More)
Wireless sensor network is one of the most growing technology for sensing and performing the different tasks. Such networks are beneficial in many fields, such as emergencies, health monitoring, environmental control, military, industries and these networks prone to malicious users' and physical attacks due to radio range of network, un-trusted(More)
Mixed gases are used for massive gas injection disruption mitigation on Alcator C-Mod in order to optimize radiation efficiency, halo current reduction, and response time. Gas mixtures of helium and argon (argon fraction 0–50%) are investigated in detail, as well as mixtures of deuterium, argon, krypton, and helium. Experiments show that injecting He/Ar(More)
Information security has become a key concern for communication over public channels thus necessitating the use of cryptography to safeguard communication. In this paper, we present a comprehensive review of the asymmetric key algorithms, beginning from the inception of asymmetric cryptography in 1976 till the present day. This paper provides a description(More)
Wireless sensor network are constituted by a large number of tiny size sensors and distributed randomly for gathering information. These types of networks have remarkable applications and demand worldwide. The wireless sensor network has been suffered with variety of attacks because of its design and deployment nature. The previous traditional approaches(More)
Information is a fundamental part of the world today and with it has come the need for information security during communication over public channels so as to safeguard communication. There are various public key algorithms being implemented today, the most popular being RSA and ECC. Given the trend towards quantum computing systems, there is need to(More)
Virtualization technology is the base technology used in Cloud computing. Therefore, virtualization enables Cloud computing to provide hardware and software services to the users on demand. Actually, many companies migrates to the Cloud computing for many reasons such as capabilities of processor, bus speed, size of storage, memory and managed to reduce the(More)
Cloud computing offers a wide range of services such as user demand network, operating systems, hardware, software and resources. These encouraging facilities and hassle free management of computing resources have attracted many users to outsource their data to untrusted servers. Cloud server may leak documents to unauthorized parties. Therefore, all(More)