Mojtaba Alizadeh
Citado por
Citado por
Authentication in mobile cloud computing: A survey
M Alizadeh, S Abolfazli, M Zamani, S Baharun, K Sakurai
Journal of Network and Computer Applications, 2016
An experimental analysis on cloud-based mobile augmentation in mobile cloud computing
S Abolfazli, Z Sanaei, M Alizadeh, A Gani, F Xia
IEEE Transactions on Consumer Electronics 60 (1), 146-154, 2014
Energy Efficient Routing in Wireless Sensor Networks Based on Fuzzy Ant Colony Optimization
E Amiri, H Keshavarz, M Alizadeh, M Zamani, T Khodadadi
International Journal of Distributed Sensor Networks 2014, 2014
The application of internet of things in healthcare: a systematic literature review and classification
H Ahmadi, G Arji, L Shahmoradi, R Safdari, M Nilashi, M Alizadeh
Universal Access in the Information Society, 1-33, 2019
Challenges and Opportunities of Mobile Cloud Computing
M Alizadeh, W Haslina Hassan
The International Wireless Communications and Mobile Computing Conference …, 2013
Associated risks of cloud computing for SMEs
A Azarnik, J Shayan
Open International Journal of Informatics (OIJI) 1 (1), 37-45, 2012
Security and Performance Evaluation of Lightweight Cryptographic Algorithms in RFID
M Alizadeh, M Salleh, M Zamani, J Shayan, S Karamizadeh
Recent Researches in Communications and Computers, Kos Island, Greece, 45-50, 2012
Identifying Benefits and risks associated with utilizing cloud computing
J Shayan, A Azarnik, S Chuprat, S Karamizadeh, M Alizadeh
The International Journal of Soft Computing and Software Engineering 3 (3 …, 2013
Implementation and Evaluation of Lightweight Encryption Algorithms Suitable for RFID
M Alizadeh, WH Hassan, M Zamani, E Ghazizadeh, S Karamizadeh
Journal of Next Generation Information Technology 4 (1), 65-77, 2013
Trusted computing strengthens cloud authentication
E Ghazizadeh, M Zamani, J Ab Manan, M Alizadeh
The Scientific World Journal 2014, 2014
Designing precision fuzzy controller for load swing of an overhead crane
L Ranjbari, AH Shirdel, M Aslahi-Shahri, S Anbari, A Ebrahimi, M Darvishi, ...
Neural Computing and Applications, 1-6, 2015
A Survey on Attacks in RFID Networks
M Alizadeh, M Zamani, A Rafiei Shahemabadi, J Shayan, A Azarnik
Open International Journal of Informatics (OIJI) 1 (1), 15-24, 2012
Exploring potential factors in total hospital information system adoption
H Ahmadi, M Nilashi, O Ibrahim, T Ramayah, MW Wong, M Alizadeh, ...
Journal of Soft Computing and Decision Support Systems 2 (1), 52-59, 2015
Multi-level model for the adoption of hospital information system: a case on Malaysia
H Ahmadi, M Nilashi, A Almaee, M Soltani, M Zare, AB Sangar, M Osmani, ...
Journal of Soft Computing and Decision Support Systems 3 (1), 61-74, 2016
Cryptanalysis and Improvement of" A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks".
M Alizadeh, M Zamani, S Baharun, MA Abdul, K Sakurai, H Anada, ...
PloS one 10 (11), e0142716-e0142716, 2015
The moderating effect of hospital size on inter and intra-organizational factors of Hospital Information System adoption
H Ahmadi, M Nilashi, L Shahmoradi, O Ibrahim, F Sadoughi, M Alizadeh, ...
Technological Forecasting and Social Change 134, 124-149, 2018
An evaluation model for the implementation of hospital information system in public hospitals using multi-criteria-decision-making (MCDM) approaches
AA Esfahani, H Ahmadi, M Nilashi, M Alizadeh, A Bashiri, ...
International Journal of Engineering & Technology 7 (1), 1-18, 2017
Fuzzy multi-criteria approaches for evaluating the critical factors of electronic medical record adoption
H Ahmadi, M Nilashi, M Darvishi, O Ibrahim, R Zakaria, H Zolghadri, ...
Review of Contemporary Business Research 3 (2), 01-24, 2014
Code Analysis of Lightweight Encryption Algorithms Using in RFID Systems to Improve Cipher Performance
M Alizadeh, Z Mazdak, S Jafar, K Touraj
IEEE Conference on Open Systems (ICOS), Kuala Lumpur, Malaysia, 1-6, 2012
A Prospective Study of Mobile Cloud Computing
M Alizadeh, WH Hassan, M Zamani, T Khodadai, S Chaeikar
International Journal of Advanced Computer Technology 5 (11), 198-210, 2013
O sistema não pode executar a operação agora. Tente novamente mais tarde.
Artigos 1–20