AJ Akbarfam, H Maleki . SOK: Blockchain for Provenance Article Link
AJ Akbarfam, G Dorai, H Maleki . Secure Cross-Chain Provenance for Digital Forensics Collaboration. Article Link
M Heidaripour, L Kian, M Rezapour, M Holcomb, B Fuller, G Agrawal, H Maleki . Organizing Records for Retrieval in Multi-Dimensional Range Searchable Encryption. Article Link
AJ Akbarfam, M Heidaripour, H Maleki, G Dorai, G Agrawal .ForensiBlock: A Provenance-Driven Blockchain Framework for Data Forensics and Auditability. Article Link
AJ Akbarfam, S Barazandeh, D Gupta, H Maleki Deep Learning meets Blockchain for Automated and Secure Access Control. Article Link
M Hasan, H Maleki, G Agrawal . 2022. “Securing Pseudonym Schemes for Vehicular Privacy.” Publication Name. Article Link.
M van Dijk, F Regazzoni ." CCSW'22: The 2022 Cloud Computing Security Workshop". Article Link.
D Troyer, J Henry, H Maleki, G Dorai, B Sumner, G Agrawal, J Ingram. 2021. “Privacy-Preserving Framework to Facilitate Shared Data Access for Wearable Devices". Article Link.
R Canetti, M Van Dijk, H Maleki, U Rührmair, P Schaumont. 2020. “Using universal composition to design and analyze secure complex hardware systems ”. Article Link.
K Hogan, H Maleki, R Rahaeimehr, R Canetti, M Van Dijk, J Hennessey. 2019. “On the universally composable security of OpenStack”. Article Link.
H Maleki. Towards Security Analysis of OpenStack ”. Article Link.
M van Dijk, C Jin, H Maleki, PH Nguyen, R Rahaeimehr. 2018. “Weak-Unforgeable Tags for Secure Supply Chain Management .” Article Link.
H Maleki, R Rahaeimehr, M Van Dijk.2017 “SoK: RFID-based clone detection mechanisms for supply chains.” Article Link.
H Maleki, R Rahaeimehr, C Jin, M Van Dijk 2023. “New clone-detection approach for RFID-based supply chains ” Publication Name, January 1, 2023. Article Link.
H Maleki, S Valizadeh, W Koch, A Bestavros, M van Dijk . 2016. Markov modeling of moving target defense games .” Article Link.
H Maleki, R Rahaeimehr, M van Dijk . 2016. “Lightsource: Ultra lightweight clone detection of RFID tags from software unclonable responses .”Article Link.