Yashar SalamiQazvin Islamic Azad University | QIAU · Faculty of Electrical Engineering, Computer and Information Technology
Yashar Salami
Doctor of Philosophy of Computer Networks
Security & Privacy, Fog & Cloud computing, Internet of things, Blockchain & Distributed System
About
23
Publications
25,266
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
70
Citations
Introduction
I have actively contributed to the field with numerous publications in prestigious journals such as Nature, Springer, IEEE, John Wiley and Hindawi. I have amassed over 100 citations and achieved a notable h-index of 7 . Notably, I had the opportunity to publish an article in the 5th most cited journal in the world. Additionally, I have the honor of being the first student to have their doctoral thesis published in the esteemed journal Nature, marking a globally recognized achievement.
Additional affiliations
Education
October 2015 - September 2017
February 2012 - February 2015
Independent Researcher
Field of study
- Software Technology Engineering
February 2010 - February 2012
Publications
Publications (23)
Internet of Vehicles (IOV) is a section of the Internet of Things (IoT) which makes road transportation smart and provides security for the passengers traveling along the roads. Fog computation can be considered as a complement for IOV because it is close to the user and can communicate with Road Side Units (RSU) and process information with low la...
Security in cyberspace has become an important problem in the modern world. Security threats are a disadvantage for jobbers on cloud computing, thus using different levels of information security in different contexts, is required more than ever. In distributed systems, encryption and key exchange are used to create security. The Diffie–Hellman pro...
The fog computing architecture allows data exchange with the vehicle network, sensor networks, etc. However, before exchanging data, the nodes need to know each other and key exchange. Yashar et al. recently proposed a secure key exchange scheme for the fog federation. However, their proposed scheme has a high computational overhead and is not suit...
Increasing contrast is one of the vital issues in meteorological image processing, which is crucial for improving image quality and weather condition detection. One of the most common methods for enhancing contrast in digital images is histogram equalization. This method is simple and effective, but it often leads to illogical contrast enhancement...
Today, with the advancement of blockchain and Internet of Things (IoT) technologies, there is a growing need for authentication protocols and key exchanges to facilitate communication between these diverse technologies. Authentication and key exchange protocols are designed using symmetric and asymmetric encryption methods, each with varying comput...
The Internet of Vehicles (IoV) plays a crucial role in advancing intelligent transportation systems. However, due to limited processing power, IoV faces challenges in independently handling large volumes of data, necessitating the use of offloading as a solution. Offloading data in wireless environments raises security concerns, highlighting the ne...
— The spread of the Internet of Things has led to the emergence of smart homes, smart cars, and intelligent cities, positively impacting human life. This development has also affected Unmanned Aerial Vehicles and has given Unmanned Aerial Vehicles a special place in the military, cinema, and urban traffic management industries. However, one of the...
The Internet of Things (IoT) is growing and has significantly impacted today's life. Although the IoT plays an essential role in human life, it has processing limitations, and this has caused it to not perform well in the face of extensive processing. To solve this limitation in the IoT, the offloading technique is used. Due to the nature of wirele...
The security of communication between Internet of Things devices is a big concern in this field, and with the increase in the number of devices and users, the current architecture and communication protocols cannot adequately respond to the system's needs, such as authentication and access authorization. One of the important solutions to this probl...
The Internet of Things allows vehicles to communicate with their surroundings and send various traffic and road conditions to other vehicles, making driving better. Data received from other vehicles sometimes need to be processed. In this state, the data should be sent to the Roadside unit for processing and fog if necessary. The source and destina...
The ever-increasing growth of the population and their concentration in cities has destructive and often catastrophic effects on natural habitats and human life and exposes cities to painful crises, including environmental and human destruction, which has caused humans to turn to technologies emerging to reduce environmental risks. Blockchain is a...
Considering that in automatic weather station systems, raw data is collected by sensors by AWSs, and these sensors themselves cannot process raw data. The data is sent to the CPS unsafely for processing, considering that the raw data in the wireless network is sent. No encryption operation or key exchange has been performed between the communicatio...
Information security has become an important issue in the modern world due to its increasing popularity in Internet commerce and communication technologies such as the Internet of Things. Future media actors are considered a threat to security. Therefore, the need to use different levels of information security in different fields is more needed. A...
Today, with the development of blockchain and Internet of Things technologies, we need authentication protocols and key exchanges to communicate with these different technologies. Symmetric and asymmetric encryption methods are used to design authentication and key exchange protocols, each of which has different computation costs. In the Internet o...
Intelligent driving has reduced traffic and accidents, which has increased road safety. One of the advantages of Smart vehicles is communication with the environment, communication with the environment makes the driver aware of the traffic situation and accidents, and other things. However, the vehicle needs to be able to authenticate the other par...
The public key encryption is one of the most widely used methods based on mathematical
complexity, which is used for protecting transferred messages between the two communicative
sides. Many encryption systems work on the basis of Prime numbers, which obtaining these
numbers is difficult for modern computers. But with the advent of quantum compu...
Questions
Questions (44)
Can the use of ChatGPT and other AI technologies pose a threat to human jobs, or can this technology be seen as a complement to enhance productivity and creativity in the workforce?