Javad Mohajeri

563 total citations
50 papers, 320 citations indexed

About

Javad Mohajeri is a scholar working on Artificial Intelligence, Computer Vision and Pattern Recognition and Computer Networks and Communications. According to data from OpenAlex, Javad Mohajeri has authored 50 papers receiving a total of 320 indexed citations (citations by other indexed papers that have themselves been cited), including 42 papers in Artificial Intelligence, 23 papers in Computer Vision and Pattern Recognition and 11 papers in Computer Networks and Communications. Recurrent topics in Javad Mohajeri's work include Cryptographic Implementations and Security (23 papers), Cryptography and Data Security (20 papers) and Chaos-based Image/Signal Encryption (19 papers). Javad Mohajeri is often cited by papers focused on Cryptographic Implementations and Security (23 papers), Cryptography and Data Security (20 papers) and Chaos-based Image/Signal Encryption (19 papers). Javad Mohajeri collaborates with scholars based in Iran, Belgium and Singapore. Javad Mohajeri's co-authors include Mahmoud Salmasizadeh, Mohammad‐Reza Sadeghi, Ximeng Liu, Mohammad Reza Aref, Sattar Mirzakuchaki, Zahra Ahmadian, Neda Rohani, Taraneh Eghlidos, Bart Preneel and Vincent Rijmen and has published in prestigious journals such as IEEE Access, Information Sciences and IEEE Transactions on Information Forensics and Security.

In The Last Decade

Javad Mohajeri

48 papers receiving 303 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Javad Mohajeri Iran 10 233 121 72 63 60 50 320
Keiichi Iwamura Japan 9 161 0.7× 94 0.8× 106 1.5× 46 0.7× 53 0.9× 86 295
Jo Vliegen Belgium 12 260 1.1× 128 1.1× 41 0.6× 129 2.0× 51 0.8× 37 333
Stefano Di Matteo Italy 12 168 0.7× 62 0.5× 105 1.5× 101 1.6× 52 0.9× 20 277
Naoya Torii Japan 6 222 1.0× 199 1.6× 82 1.1× 48 0.8× 40 0.7× 17 297
Miroslav Knežević Belgium 8 352 1.5× 112 0.9× 171 2.4× 113 1.8× 54 0.9× 18 411
Debapriya Basu Roy India 11 272 1.2× 99 0.8× 94 1.3× 150 2.4× 93 1.6× 46 396
Helena Handschuh France 11 168 0.7× 50 0.4× 93 1.3× 145 2.3× 95 1.6× 24 296
Erdem Alkım Türkiye 8 297 1.3× 101 0.8× 98 1.4× 36 0.6× 32 0.5× 16 364
Andy Rupp Germany 10 209 0.9× 89 0.7× 46 0.6× 37 0.6× 57 0.9× 23 274

Countries citing papers authored by Javad Mohajeri

Since Specialization
Citations

This map shows the geographic impact of Javad Mohajeri's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Javad Mohajeri with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Javad Mohajeri more than expected).

Fields of papers citing papers by Javad Mohajeri

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Javad Mohajeri. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Javad Mohajeri. The network helps show where Javad Mohajeri may publish in the future.

Co-authorship network of co-authors of Javad Mohajeri

This figure shows the co-authorship network connecting the top 25 collaborators of Javad Mohajeri. A scholar is included among the top collaborators of Javad Mohajeri based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Javad Mohajeri. Javad Mohajeri is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Salmasizadeh, Mahmoud, et al.. (2023). Two protocols for improving security during the authentication and key agreement procedure in the 3GPP networks. Computer Communications. 211. 286–301. 4 indexed citations
2.
Salmasizadeh, Mahmoud, et al.. (2022). A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis. Designs Codes and Cryptography. 90(8). 1797–1855. 4 indexed citations
3.
Mohajeri, Javad, et al.. (2021). Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT. 81–88. 4 indexed citations
4.
Mohajeri, Javad, et al.. (2020). A fully distributed hierarchical attribute-based encryption scheme. Theoretical Computer Science. 815. 25–46. 31 indexed citations
5.
Azimi, Amirreza, et al.. (2018). Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher (Extended Version). 10(1). 3–13. 1 indexed citations
6.
Mohajeri, Javad, et al.. (2017). On the Security of O-PSI a Delegated Private Set Intersection on Outsourced Datasets. 77–81. 2 indexed citations
7.
Salmasizadeh, Mahmoud, et al.. (2017). Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher. 99–104. 2 indexed citations
8.
Mohajeri, Javad, et al.. (2017). An Attribute-Based Anonymous Broadcast Encryption Scheme with Adaptive Security in the Standard Model. Scientia Iranica. 0(0). 0–0. 6 indexed citations
9.
Mirzakuchaki, Sattar, et al.. (2016). A Ring Oscillator-Based PUF With Enhanced Challenge-Response Pairs. Canadian Journal of Electrical and Computer Engineering. 39(2). 174–180. 18 indexed citations
10.
Mirzakuchaki, Sattar, et al.. (2016). PUF‐based solutions for secure communications in Advanced Metering Infrastructure (AMI). International Journal of Communication Systems. 30(9). 25 indexed citations
11.
Mohajeri, Javad, et al.. (2015). Identity-based universal re-encryption for mixnets. Security and Communication Networks. 8(17). 2992–3001. 1 indexed citations
12.
Mohajeri, Javad, et al.. (2013). Secure untraceable off-line electronic cash system. Scientia Iranica. 20(3). 637–646. 12 indexed citations
13.
Mohajeri, Javad, et al.. (2013). CRYPTANALYSIS OF GSM ENCRYPTION ALGORITHM A5/1. 4(2). 107–114. 1 indexed citations
14.
Mohajeri, Javad, et al.. (2011). Double voter perceptible blind signature based electronic voting protocol. 3(1). 43–50. 3 indexed citations
15.
Mohajeri, Javad, et al.. (2011). An improved attack on A5/1. 41–44. 1 indexed citations
16.
Rohani, Neda, et al.. (2011). Guess and Determine Attack on Bivium. Journal of Information Processing Systems. 7(1). 151–158. 1 indexed citations
17.
Rohani, Neda, et al.. (2010). Distinguishing Attack on Bivium. 1075–1078. 2 indexed citations
18.
Salmasizadeh, Mahmoud, et al.. (2009). A Related Key Attack on the Feistel Type Block Ciphers. International journal of network security. 8. 221–226. 1 indexed citations
19.
Mohajeri, Javad, et al.. (2008). Weak Composite Diffie-Hellman.. International journal of network security. 7. 383–387.
20.
Mohajeri, Javad, et al.. (2008). Security Modification for the Hwang-Wen-Hwang's E-voting Scheme.. Security and Management. 486–490. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026