Private and efficient query processing on outsourced genomic databases R Ghasemi, MM Al Aziz, N Mohammed, MH Dehkordi, X Jiang IEEE journal of biomedical and health informatics 21 (5), 1466-1472, 2016 | 37 | 2016 |
Aftermath of bustamante attack on genomic beacon service MMA Aziz, R Ghasemi, M Waliullah, N Mohammed BMC medical genomics 10 (2), 43-54, 2017 | 30 | 2017 |
Privacy-Preserving Federated Learning Model for Healthcare Data TU Islam, R Ghasemi, N Mohammed 2022 IEEE 12th Annual Computing and Communication Workshop and Conference …, 2022 | 22 | 2022 |
Efficient multistage secret sharing scheme using bilinear map M Fatemi, R Ghasemi, T Eghlidos, MR Aref IET Information Security 8 (4), 224-229, 2014 | 22 | 2014 |
A lightweight public verifiable multi secret sharing scheme using short integer solution M Hadian Dehkordi, R Ghasemi Wireless Personal Communications 91, 1459-1469, 2016 | 19 | 2016 |
Resolving a common vulnerability in secret sharing scheme–based data outsourcing schemes R Ghasemi Concurrency and Computation: Practice and Experience 32 (2), e5363, 2020 | 11 | 2020 |
A new secure and searchable data outsourcing leveraging a Bucket-Chain index tree S Bahrami, R Ghasemi Journal of Information Security and Applications 67, 103206, 2022 | 6 | 2022 |
Efficient multisecret sharing scheme using new proposed computational security model R Ghasemi, A Safi, M Hadian Dehkordi International Journal of Communication Systems 31 (1), e3399, 2018 | 5 | 2018 |
A Sharding-Based Approach for Enhancing Efficiency in ISSDOs for Sharing Scattered Values R Ghasemi Cryptology ePrint Archive, 2023 | | 2023 |
A Post-Quantum Four-Party Outsourced Authentication R Ghasemi, A Küpçü Cryptology ePrint Archive, 2022 | | 2022 |