Hamed Arshad

738 total citations
16 papers, 592 citations indexed

About

Hamed Arshad is a scholar working on Computer Networks and Communications, Information Systems and Artificial Intelligence. According to data from OpenAlex, Hamed Arshad has authored 16 papers receiving a total of 592 indexed citations (citations by other indexed papers that have themselves been cited), including 12 papers in Computer Networks and Communications, 12 papers in Information Systems and 6 papers in Artificial Intelligence. Recurrent topics in Hamed Arshad's work include Advanced Authentication Protocols Security (12 papers), User Authentication and Security Systems (11 papers) and Cryptography and Data Security (4 papers). Hamed Arshad is often cited by papers focused on Advanced Authentication Protocols Security (12 papers), User Authentication and Security Systems (11 papers) and Cryptography and Data Security (4 papers). Hamed Arshad collaborates with scholars based in Iran, Norway and Sweden. Hamed Arshad's co-authors include Morteza Nikooghadam, Xiong Li, Saru Kumari, Fan Wu, Muhammad Khurram Khan, Ashok Kumar Das, Dariush Abbasinezhad‐Mood, Arezou Ostad‐Sharif, Abbas Rasoolzadegan and Christian Johansen and has published in prestigious journals such as Information Sciences, Future Generation Computer Systems and Multimedia Tools and Applications.

In The Last Decade

Hamed Arshad

15 papers receiving 578 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Hamed Arshad Iran 9 507 462 198 130 67 16 592
Yanrong Lu China 14 525 1.0× 473 1.0× 209 1.1× 167 1.3× 59 0.9× 22 595
Guangsong Li China 10 526 1.0× 454 1.0× 241 1.2× 142 1.1× 48 0.7× 33 604
Tien‐Ho Chen Taiwan 7 627 1.2× 541 1.2× 177 0.9× 108 0.8× 40 0.6× 8 673
Fengtong Wen China 11 408 0.8× 387 0.8× 206 1.0× 116 0.9× 95 1.4× 24 497
Jaewook Jung South Korea 10 412 0.8× 385 0.8× 117 0.6× 120 0.9× 35 0.5× 30 479
Chi-Yao Weng Taiwan 14 513 1.0× 490 1.1× 177 0.9× 119 0.9× 113 1.7× 28 674
Changsha Ma United States 9 429 0.8× 391 0.8× 207 1.0× 79 0.6× 38 0.6× 12 538
Shuming Qiu China 6 245 0.5× 235 0.5× 161 0.8× 67 0.5× 40 0.6× 10 386
Zuowen Tan China 11 293 0.6× 271 0.6× 184 0.9× 73 0.6× 70 1.0× 42 393
Yue-Hsun Lin Taiwan 12 351 0.7× 213 0.5× 181 0.9× 84 0.6× 45 0.7× 22 508

Countries citing papers authored by Hamed Arshad

Since Specialization
Citations

This map shows the geographic impact of Hamed Arshad's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Hamed Arshad with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Hamed Arshad more than expected).

Fields of papers citing papers by Hamed Arshad

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Hamed Arshad. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Hamed Arshad. The network helps show where Hamed Arshad may publish in the future.

Co-authorship network of co-authors of Hamed Arshad

This figure shows the co-authorship network connecting the top 25 collaborators of Hamed Arshad. A scholar is included among the top collaborators of Hamed Arshad based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Hamed Arshad. Hamed Arshad is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

16 of 16 papers shown
1.
Arshad, Hamed, et al.. (2023). Attribute-based encryption with enforceable obligations. Journal of Cryptographic Engineering. 13(3). 343–371. 1 indexed citations
2.
Arshad, Hamed, et al.. (2022). Semantic Attribute-Based Encryption: A framework for combining ABE schemes with semantic technologies. Information Sciences. 616. 558–576. 3 indexed citations
3.
Arshad, Hamed, Christian Johansen, & Olaf Owe. (2022). Semantic Attribute-Based Access Control: A review on current status and future perspectives. Journal of Systems Architecture. 129. 102625–102625. 3 indexed citations
4.
Ostad‐Sharif, Arezou, Hamed Arshad, Morteza Nikooghadam, & Dariush Abbasinezhad‐Mood. (2019). Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme. Future Generation Computer Systems. 100. 882–892. 92 indexed citations
5.
Johansen, Christian, et al.. (2018). The Snowden Phone: A Comparative Survey of Secure Instant Messaging Mobile Applications (authors' version).. 1 indexed citations
6.
Irshad, Azeem, Saru Kumari, Xiong Li, et al.. (2017). An Improved SIP Authentication Scheme Based on Server-Oriented Biometric Verification. Wireless Personal Communications. 97(2). 2145–2166. 6 indexed citations
7.
Arshad, Hamed, et al.. (2017). Design and FPGA implementation of an efficient security mechanism for mobile pay‐TV systems. International Journal of Communication Systems. 30(15). 5 indexed citations
8.
Johansen, Christian, et al.. (2017). Comparing Implementations of Secure Messaging Protocols (long version). Duo Research Archive (University of Oslo). 2 indexed citations
9.
Arshad, Hamed & Abbas Rasoolzadegan. (2017). A secure authentication and key agreement scheme for roaming service with user anonymity. International Journal of Communication Systems. 30(18). 21 indexed citations
10.
Arshad, Hamed & Abbas Rasoolzadegan. (2016). Design of a Secure Authentication and Key Agreement Scheme Preserving User Privacy Usable in Telecare Medicine Information Systems. Journal of Medical Systems. 40(11). 237–237. 23 indexed citations
11.
Kumari, Saru, Xiong Li, Fan Wu, et al.. (2016). A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps. Future Generation Computer Systems. 63. 56–75. 145 indexed citations
12.
Nikooghadam, Morteza, et al.. (2016). A lightweight authentication and key agreement protocol preserving user anonymity. Multimedia Tools and Applications. 76(11). 13401–13423. 51 indexed citations
13.
Arshad, Hamed, et al.. (2015). On the Security of a Two-Factor Authentication and Key Agreement Scheme for Telecare Medicine Information Systems. Journal of Medical Systems. 39(8). 76–76. 29 indexed citations
14.
Arshad, Hamed & Morteza Nikooghadam. (2015). Security analysis and improvement of two authentication and key agreement schemes for session initiation protocol. The Journal of Supercomputing. 71(8). 3163–3180. 25 indexed citations
15.
Arshad, Hamed & Morteza Nikooghadam. (2014). Three-Factor Anonymous Authentication and Key Agreement Scheme for Telecare Medicine Information Systems. Journal of Medical Systems. 38(12). 136–136. 109 indexed citations
16.
Arshad, Hamed & Morteza Nikooghadam. (2014). An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC. Multimedia Tools and Applications. 75(1). 181–197. 76 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026