A survey on security issues of federated identity in the cloud computing E Ghazizadeh, M Zamani, A Pashang 4th IEEE International Conference on Cloud Computing Technology and Science …, 2012 | 71 | 2012 |
Implementation and evaluation of lightweight encryption algorithms suitable for RFID M Alizadeh, WH Hassan, M Zamani, S Karamizadeh, E Ghazizadeh Journal of Next Generation Information Technology 4 (1), 65, 2013 | 40 | 2013 |
Trusted computing strengthens cloud authentication E Ghazizadeh, M Zamani, J Ab Manan, M Alizadeh The Scientific World Journal 2014 (1), 260187, 2014 | 36 | 2014 |
A trust based model for federated identity architecture to mitigate identity theft E Ghazizadeh, M Zamani, R Khaleghparast, A Taherian 2012 International Conference for Internet Technology and Secured …, 2012 | 25 | 2012 |
Evaluating single sign-on security failure in cloud services B Cusack, E Ghazizadeh Business Horizons 59 (6), 605-614, 2016 | 20 | 2016 |
Causes of delay in smart and complex construction projects K Radman, M Babaeian Jelodar, E Ghazizadeh, S Wilkinson Journal of Legal Affairs and Dispute Resolution in Engineering and …, 2021 | 19 | 2021 |
A systematic literature review of natural language processing: Current state, challenges and risks E Ghazizadeh, P Zhu Proceedings of the future technologies conference, 634-647, 2020 | 18 | 2020 |
Digital technologies and data-driven delay management process for construction projects K Radman, MB Jelodar, R Lovreglio, E Ghazizadeh, S Wilkinson Frontiers in Built Environment 8, 1029586, 2022 | 9 | 2022 |
Paint-doctored JPEG image forensics based on blocking artifacts A Ebrahimi, S Ibrahim, E Ghazizadeh, M Alizadeh 2015 International Conference and Workshop on Computing and Communication …, 2015 | 8 | 2015 |
Secure openID authentication model by using trusted computing E Ghazizadeh, ZS Shams Dolatabadi, R Khaleghparast, M Zamani, ... Abstract and Applied Analysis 2014 (1), 561487, 2014 | 8 | 2014 |
IT Service Management and Incident Management: Literature Review and a Case Study E Ghazizadeh, M Jeong, JP Angel, Y Que | 7 | 2019 |
Defining cloud identity security and privacy issues: A Delphi method B Cusack, E Ghazizadeh | 4 | 2019 |
Real-time project productivity tracking system: Practical case in smart construction projects K Radman, MB Jelodar, R Lovreglio, S Wilkinson, E Ghazizadeh 7TH New Zealand built environment research symposium, 409, 2022 | 3 | 2022 |
Trust Assessment for Cloud Identity Providers Using Analytical Hierarchy Process E Ghazizadeh, B Cusack 2017 International Conference on Computational Science and Computational …, 2017 | 3 | 2017 |
A systematic literature review of smart contract applications E Ghazizadeh, T Sun Proceedings of the Future Technologies Conference, 877-888, 2020 | 2 | 2020 |
Cloud surfing: A general comparison of cloud identity guidelines E Ghazizadeh, H Deylami, A Shahzad, B Cusack | 2 | 2020 |
Evaluation theory for characteristics of cloud identity trust framework E Ghazizadeh, B Cusack Cloud Computing-Technology and Practices, 2018 | 2 | 2018 |
Formulating Methodology to Build a Trust Framework for Cloud Identity Management. B Cusack, E Ghazizadeh AMCIS, 2016 | 2* | 2016 |
Satisfying Secure Load Balancing Expectations in the Cloud B Cusack, E Ghazizadeh Twenty-fourth Americas Conference on Information Systems, New Orleans, 2018 …, 2018 | 1 | 2018 |
Analysing Trust Issues in Cloud Identity Environments B Cusack, E Ghazizadeh | 1 | 2016 |