What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Reihaneh Safavi-Naini
Google Scholar
149
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/fc
Short Paper: Breaking X-VRF, A Post-quantum Verifiable Random Function.
Omid Bodaghi
Reihaneh Safavi-Naini
2024
conf/acns
Fair Private Set Intersection Using Smart Contracts.
Sepideh Avizheh
Reihaneh Safavi-Naini
2023
conf/cans
Lower Bounds on the Share Size of Leakage Resilient Cheating Detectable Secret Sharing.
Sabyasachi Dutta
Shaoquan Jiang
Reihaneh Safavi-Naini
2022
journals/popets
Privacy-preserving FairSwap: Fairness and privacy interplay.
Sepideh Avizheh
Preston Haffey
Reihaneh Safavi-Naini
2022
conf/ccs
On Randomization in MTD Systems.
Majid Ghaderi
Samuel Jero
Cristina Nita-Rotaru
Reihaneh Safavi-Naini
2022
conf/fc
Fides: A System for Verifiable Computation Using Smart Contracts.
Mahmudun Nabi
Sepideh Avizheh
Reihaneh Safavi-Naini
2022
conf/cns
Securing Communication Against Leaky Switches.
Leila Rashidi
Sogand SadrHaghighi
Majid Ghaderi
Cristina Nita-Rotaru
Reihaneh Safavi-Naini
2021
conf/acisp
Leakage Resilient Cheating Detectable Secret Sharing Schemes.
Sabyasachi Dutta
Reihaneh Safavi-Naini
2021
conf/fc
Privacy-Preserving Resource Sharing Using Permissioned Blockchains - (The Case of Smart Neighbourhood).
Sepideh Avizheh
Mahmudun Nabi
Saoreen Rahman
Setareh Sharifian
Reihaneh Safavi-Naini
2021
conf/ccsw-ws
Privacy-enhanced OptiSwap.
Sepideh Avizheh
Preston Haffey
Reihaneh Safavi-Naini
2021
conf/acns
Password Protected Secret Sharing from Lattices.
Partha Sarathi Roy
Sabyasachi Dutta
Willy Susilo
Reihaneh Safavi-Naini
2021
conf/esorics
Smart Contracts for Incentivized Outsourcing of Computation.
Alptekin Küpçü
Reihaneh Safavi-Naini
2021
conf/ndss
More than a Fair Share: Network Data Remanence Attacks against Secret Sharing-based Schemes.
Leila Rashidi
Daniel Kostecki
Alexander James
Anthony Peterson
Majid Ghaderi
Samuel Jero
Cristina Nita-Rotaru
Hamed Okhravi
Reihaneh Safavi-Naini
2021
conf/pkc
Group Encryption: Full Dynamicity, Message Filtering and Code-Based Instantiation.
Khoa Nguyen
Reihaneh Safavi-Naini
Willy Susilo
Huaxiong Wang
Yanhong Xu
Neng Zeng
2021
conf/iwsec
An Intermediate Secret-Guessing Attack on Hash-Based Signatures.
Roland Booth
Yanhong Xu
Sabyasachi Karati
Reihaneh Safavi-Naini
2020
conf/sec
Fuzzy Vault for Behavioral Authentication System.
Md. Morshedul Islam
Reihaneh Safavi-Naini
2020
conf/fc
A Blockchain Based Approach to Resource Sharing in Smart Neighbourhoods.
Kumaramangalam Muni Venkateswarlu
Sepideh Avizheh
Reihaneh Safavi-Naini
2019
journals/compsec
Outsourcing scheme of ABE encryption secure against malicious adversary.
Go Ohtake
Reihaneh Safavi-Naini
Liang Feng Zhang
2019
conf/ccs
Verifiable Computation using Smart Contracts.
Sepideh Avizheh
Mahmudun Nabi
Reihaneh Safavi-Naini
Muni Venkateswarlu K.
2019
conf/ccs
K2SN-MSS: An Efficient Post-Quantum Signature.
Sabyasachi Karati
Reihaneh Safavi-Naini
2019
conf/fc
Game-Theoretic Analysis of an Incentivized Verifiable Computation System.
Mahmudun Nabi
Sepideh Avizheh
Muni Venkateswarlu Kumaramangalam
Reihaneh Safavi-Naini
2018
conf/ccs
Post-quantum Security using Channel Noise.
Setareh Sharifian
Reihaneh Safavi-Naini
Fuchun Lin
2018
conf/ccs
A Discussion on Security Education in Academia.
Kevin R. B. Butler
Robert K. Cunningham
Paul C. van Oorschot
Reihaneh Safavi-Naini
Ashraf Matrawy
Jeremy Clark
2018
conf/acisp
New Attacks and Secure Design for Anonymous Distance-Bounding.
Ahmad Ahmadi
Reihaneh Safavi-Naini
Md. Mamunur Rashid Akand
2018
conf/fc
A New Look at the Refund Mechanism in the Bitcoin Payment Protocol.
Sepideh Avizheh
Reihaneh Safavi-Naini
Siamak F. Shahandashti
2018
conf/acns
In-Region Authentication.
Md. Mamunur Rashid Akand
Reihaneh Safavi-Naini
2017
conf/ccs
A Secure Event Logging System for Smart Homes.
Sepideh Avizheh
Tam Thanh Doan
Xi Liu
Reihaneh Safavi-Naini
2017
conf/ccs
Path Hopping: an MTD Strategy for Quantum-safe Communication.
Reihaneh Safavi-Naini
Alireza Poostindouz
Viliam Lisý
2017
conf/sec
Privacy-Enhanced Profile-Based Authentication Using Sparse Random Projection.
Somayeh Taheri
Md. Morshedul Islam
Reihaneh Safavi-Naini
2017
conf/fc
Economically Optimal Variable Tag Length Message Authentication.
Reihaneh Safavi-Naini
Viliam Lisý
Yvo Desmedt
2016
conf/ccs
POSTER: Privacy Enhanced Secure Location Verification.
Md. Mamunur Rashid Akand
Reihaneh Safavi-Naini
2016
conf/ccs
POSTER: A Behavioural Authentication System for Mobile Users.
Md. Morshedul Islam
Reihaneh Safavi-Naini
2016
conf/ccs
Privacy and Utility of Inference Control Mechanisms for Social Computing Applications.
Seyed Hossein Ahmadinejad
Philip W. L. Fong
Reihaneh Safavi-Naini
2015
journals/compsec
Reconciling user privacy and implicit authentication for mobile devices.
Siamak Fayyaz Shahandashti
Reihaneh Safavi-Naini
Nashad Ahmed Safa
2015
conf/ccs
Performance Analysis of Linux RNG in Virtualized Environments.
Rashmi Kumari
Mohsen Alimomeni
Reihaneh Safavi-Naini
2015
conf/fc
User Authentication Using Human Cognitive Abilities.
Asadullah Al Galib
Reihaneh Safavi-Naini
2015
conf/esorics
Batch Verifiable Computation of Polynomials on Outsourced Data.
Liang Feng Zhang
Reihaneh Safavi-Naini
2015
conf/cns
Adversarial wiretap channel with public discussion.
Pengwei Wang
Reihaneh Safavi-Naini
2015
conf/sacrypt
An Efficient Post-Quantum One-Time Signature Scheme.
Kassem Kalach
Reihaneh Safavi-Naini
2014
conf/ccs
Generalized homomorphic MACs with efficient verification.
Liang Feng Zhang
Reihaneh Safavi-Naini
2014
conf/ccs
Verifiable local computation on distributed data.
Liang Feng Zhang
Reihaneh Safavi-Naini
Xiao Wei Liu
2014
conf/ccs
CCSW 2014: Sixth ACM Cloud Computing Security Workshop.
Alina Oprea
Reihaneh Safavi-Naini
2014
conf/sec
Privacy-Preserving Implicit Authentication.
Nashad Ahmed Safa
Reihaneh Safavi-Naini
Siamak Fayyaz Shahandashti
2014
conf/acns
Verifiable Multi-server Private Information Retrieval.
Liang Feng Zhang
Reihaneh Safavi-Naini
2014
conf/acns
Private Message Transmission Using Disjoint Paths.
Hadi Ahmadi
Reihaneh Safavi-Naini
2014
conf/esorics
Verifiable Delegation of Computations with Storage-Verification Trade-off.
Liang Feng Zhang
Reihaneh Safavi-Naini
2014
conf/icics
Distance Lower Bounding.
Xifan Zheng
Reihaneh Safavi-Naini
Hadi Ahmadi
2014
conf/icics
MOVTCHA: A CAPTCHA Based on Human Cognitive and Behavioral Features Analysis.
Asadullah Al Galib
Reihaneh Safavi-Naini
2014
conf/icics
Privacy-Preserving Distance-Bounding Proof-of-Knowledge.
Ahmad Ahmadi
Reihaneh Safavi-Naini
2013
journals/istr
Message transmission and key establishment: General equality for weak and strong capacities.
Hadi Ahmadi
Reihaneh Safavi-Naini
2013
conf/ccs
RAFR: remote assessment of file redundancy.
Sumanta Sarkar
Reihaneh Safavi-Naini
Liang Feng Zhang
2013
conf/fc
Unconditionally-Secure Robust Secret Sharing with Minimum Share Size.
Mahabir Prasad Jhanwar
Reihaneh Safavi-Naini
2013
conf/cns
Efficient codes for Limited View adversarial channels.
Reihaneh Safavi-Naini
Pengwei Wang
2013
conf/cans
Private Outsourcing of Polynomial Evaluation and Matrix Multiplication Using Multilinear Maps.
Liang Feng Zhang
Reihaneh Safavi-Naini
2012
conf/ccs
LoSt: location based storage.
Gaven J. Watson
Reihaneh Safavi-Naini
Mohsen Alimomeni
Michael E. Locasto
Shivaramakrishnan Narayan
2012
conf/ccs
An information theoretic framework for web inference detection.
Hoi Le Thi
Reihaneh Safavi-Naini
2012
conf/acisp
Private Fingerprint Matching.
Siamak Fayyaz Shahandashti
Reihaneh Safavi-Naini
Philip Ogunbona
2012
conf/acns
A General Construction for 1-Round δ-RMT and (0, δ)-SMT.
Reihaneh Safavi-Naini
Mohammed Ashraful Tuhin
Pengwei Wang
2012
conf/africacrypt
Bounds and Constructions for 1-Round (0, δ)-Secure Message Transmission against Generalized Adversary.
Reihaneh Safavi-Naini
Mohammed Ashraful Tuhin
2011
conf/ccs
Optimal message transmission protocols with flexible parameters.
Reihaneh Safavi-Naini
Mohammed Ashraful Tuhin
Hongsong Shi
2011
conf/fc
Optimal One Round Almost Perfectly Secure Message Transmission (Short Paper).
Mohammed Ashraful Tuhin
Reihaneh Safavi-Naini
2011
conf/esorics
Secure Localization Using Dynamic Verifiers.
Nashad Ahmed Safa
Saikat Sarkar
Reihaneh Safavi-Naini
Majid Ghaderi
2011
conf/wisa
Exploiting Routing Tree Construction in CTP.
Islam Hegazy
Reihaneh Safavi-Naini
Carey Williamson
2011
conf/eurocrypt
Secret Keys from Channel Noise.
Hadi Ahmadi
Reihaneh Safavi-Naini
2010
conf/ccs
Privacy preserving EHR system using attribute-based infrastructure.
Shivaramakrishnan Narayan
Martin Gagné
Reihaneh Safavi-Naini
2010
conf/ccs
Securing wireless sensor networks against large-scale node capture attacks.
Tuan Manh Vu
Reihaneh Safavi-Naini
Carey Williamson
2010
conf/uss
Securing Medical Research Data with a Rights Management System.
Mohammad Jafari
Reihaneh Safavi-Naini
Chad Saunders
Nicholas Paul Sheppard
2010
conf/africacrypt
Simple and Communication Complexity Efficient Almost Secure and Perfectly Secure Message Transmission Schemes.
Yvo Desmedt
Stelios Erotokritou
Reihaneh Safavi-Naini
2009
conf/esorics
Corruption-Localizing Hashing.
Giovanni Di Crescenzo
Shaoquan Jiang
Reihaneh Safavi-Naini
2009
conf/esorics
New Privacy Results on Synchronized RFID Authentication Protocols against Tag Tracing.
Ching Yu Ng
Willy Susilo
Yi Mu
Reihaneh Safavi-Naini
2009
conf/africacrypt
Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems.
Siamak Fayyaz Shahandashti
Reihaneh Safavi-Naini
2008
conf/ccs
Non-interactive conference key distribution and its applications.
Reihaneh Safavi-Naini
Shaoquan Jiang
2008
conf/fc
An Efficient Deniable Key Exchange Protocol (Extended Abstract).
Shaoquan Jiang
Reihaneh Safavi-Naini
2008
conf/esorics
RFID Privacy Models Revisited.
Ching Yu Ng
Willy Susilo
Yi Mu
Reihaneh Safavi-Naini
2008
conf/pkc
Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures.
Siamak Fayyaz Shahandashti
Reihaneh Safavi-Naini
2007
conf/ccs
Concurrently-secure credential ownership proofs.
Siamak Fayyaz Shahandashti
Reihaneh Safavi-Naini
Joonsang Baek
2007
conf/ccs
Combinatorial characterizations of authentication codes in verification oracle model.
Dongvu Tonien
Reihaneh Safavi-Naini
Peter R. Wild
2007
conf/ccs
Unconditionally secure ring authentication.
Reihaneh Safavi-Naini
Shuhong Wang
Yvo Desmedt
2007
conf/acisp
Non-interactive Manual Channel Message Authentication Based on eTCR Hash Functions.
Mohammad Reza Reyhanitabar
Shuhong Wang
Reihaneh Safavi-Naini
2007
conf/acns
An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme.
Liang Lu
Reihaneh Safavi-Naini
Jeffrey Horton
Willy Susilo
2007
conf/cans
Achieving Mobility and Anonymity in IP-Based Networks.
Rungrat Wiangsripanawan
Willy Susilo
Reihaneh Safavi-Naini
2006
conf/ccs
Self-organised group key management for ad hoc networks.
Ling Luo
Reihaneh Safavi-Naini
Joonsang Baek
Willy Susilo
2006
conf/acns
An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families.
Dongvu Tonien
Reihaneh Safavi-Naini
2006
conf/wisa
Distributed Management of OMA DRM Domains.
Harikrishna Vasanta
Reihaneh Safavi-Naini
Nicholas Paul Sheppard
Jan Martin Surminen
2006
conf/acsac
Detecting Policy Violations through Traffic Analysis.
Jeffrey Horton
Reihaneh Safavi-Naini
2006
conf/cans
X<sup>2BT</sup> Trusted Reputation System: A Robust Mechanism for P2P Networks.
Lan Yu
Willy Susilo
Reihaneh Safavi-Naini
2005
conf/sec
A License Transfer System for Supporting Content Portability in Digital Rights Management.
Qiong Liu
Reihaneh Safavi-Naini
Nicholas Paul Sheppard
2005
conf/acisp
Cancelable Key-Based Fingerprint Templates.
Russell Ang
Reihaneh Safavi-Naini
Luke McAven
2005
conf/acns
Dynamic k-Times Anonymous Authentication.
Lan Nguyen
Reihaneh Safavi-Naini
2005
conf/pkc
Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption.
Joonsang Baek
Reihaneh Safavi-Naini
Willy Susilo
2005
conf/asiacrypt
Universal Designated Verifier Signature Proof (or How to Efficiently Prove Knowledge of a Signature).
Joonsang Baek
Reihaneh Safavi-Naini
Willy Susilo
2005
conf/cans
On Securing RTP-Based Streaming Content with Firewalls.
Liang Lu
Reihaneh Safavi-Naini
Jeffrey Horton
Willy Susilo
2004
conf/acisp
Linear Code Implies Public-Key Traitor Tracing with Revocation.
Vu Dong Tô
Reihaneh Safavi-Naini
2004
conf/acisp
Unconditionally Secure Encryption Under Strong Attacks.
Luke McAven
Reihaneh Safavi-Naini
Moti Yung
2004
conf/acns
X<sup>2</sup>Rep: Enhanced Trust Semantics for the XRep Protocol.
Nathan Curtis
Reihaneh Safavi-Naini
Willy Susilo
2004
conf/acns
Verifiable Shuffles: A Formal Model and a Paillier-Based Efficient Construction with Provable Security.
Lan Nguyen
Reihaneh Safavi-Naini
Kaoru Kurosawa
2004
conf/pkc
An Efficient Signature Scheme from Bilinear Pairings and Its Applications.
Fangguo Zhang
Reihaneh Safavi-Naini
Willy Susilo
2004
conf/pkc
General Group Authentication Codes and Their Relation to "Unconditionally-Secure Signatures".
Reihaneh Safavi-Naini
Luke McAven
Moti Yung
2004
conf/asiacrypt
Efficient and Provably Secure Trapdoor-Free Group Signature Schemes from Bilinear Pairings.
Lan Nguyen
Reihaneh Safavi-Naini
2002
conf/ccs
Traitor Tracing for Shortened and Corrupted Fingerprints.
Reihaneh Safavi-Naini
Yejing Wang
2002
conf/acisp
A Secure Re-keying Scheme with Key Recovery Property.
Hartono Kurnio
Reihaneh Safavi-Naini
Huaxiong Wang
2002
conf/fc
Redistribution of Mechanical Secret Shares.
Yvo Desmedt
Reihaneh Safavi-Naini
Huaxiong Wang
2002
conf/icisc
An Efficient Fail-Stop Signature Scheme Based on Factorization.
Willy Susilo
Reihaneh Safavi-Naini
2002
conf/icisc
Threshold MACs.
Keith M. Martin
Josef Pieprzyk
Reihaneh Safavi-Naini
Huaxiong Wang
Peter R. Wild
2002
conf/icisc
A Dynamic Group Key Distribution Scheme with Flexible User Join.
Hartono Kurnio
Luke McAven
Reihaneh Safavi-Naini
Huaxiong Wang
2001
conf/ccs
Collusion Secure q-ary Fingerprinting for Perceptual Content.
Reihaneh Safavi-Naini
Yejing Wang
2001
conf/acisp
How to Construct Fail-Stop Confirmer Signature Schemes.
Reihaneh Safavi-Naini
Willy Susilo
Huaxiong Wang
2001
conf/acisp
On Classifying Conference Key Distribution Protocols.
Shahrokh Saeednia
Reihaneh Safavi-Naini
Willy Susilo
2001
conf/icisc
Efficient Revocation Schemes for Secure Multicast.
Hartono Kurnio
Reihaneh Safavi-Naini
Huaxiong Wang
2000
conf/ccs
New constructions for multicast re-keying schemes using perfect hash families.
Reihaneh Safavi-Naini
Huaxiong Wang
2000
conf/acisp
Key Management for Secure Multicast with Dynamic Controller.
Hartono Kurnio
Reihaneh Safavi-Naini
Willy Susilo
Huaxiong Wang
2000
conf/crypto
Sequential Traitor Tracing.
Reihaneh Safavi-Naini
Yejing Wang
1999
conf/acisp
Fail-Stop Threshold Signature Schemes Based on Elliptic Curves.
Willy Susilo
Reihaneh Safavi-Naini
Josef Pieprzyk
1999
conf/acisp
Characterization of Optimal Authentication Codes with Arbitration.
Dingyi Pei
Yuqiang Li
Yejing Wang
Reihaneh Safavi-Naini
1999
conf/acisp
Changing Thresholds in the Absence of Secure Channels.
Keith M. Martin
Josef Pieprzyk
Reihaneh Safavi-Naini
Huaxiong Wang
1999
conf/icisc
A New Approach to Robust Threshold RSA Signature Schemes.
Reihaneh Safavi-Naini
Huaxiong Wang
Kwok-Yan Lam
1999
conf/asiacrypt
A<sup>3</sup>-Codes under Collusion Attacks.
Yejing Wang
Reihaneh Safavi-Naini
1999
conf/asiacrypt
Broadcast Authentication in Group Communication.
Reihaneh Safavi-Naini
Huaxiong Wang
1998
conf/fse
MRD Hashing.
Reihaneh Safavi-Naini
Shahram Bakhtiari
Chris Charnes
1998
conf/acisp
On Construction of Cumulative Secret Sharing Schemes.
Hossein Ghodosi
Josef Pieprzyk
Reihaneh Safavi-Naini
Huaxiong Wang
1998
conf/acisp
Secret Sharing in Multilevel and Compartmented Groups.
Hossein Ghodosi
Josef Pieprzyk
Reihaneh Safavi-Naini
1998
conf/acisp
Efficient Identity-Based Conference Key Distribution Protocols.
Shahrokh Saeednia
Reihaneh Safavi-Naini
1998
conf/acisp
Bounds and Constructions for A<sup>3</sup>-code with Multi-senders.
Reihaneh Safavi-Naini
Yejing Wang
1998
conf/pkc
On the Security of Girault's Identification Scheme.
Shahrokh Saeednia
Reihaneh Safavi-Naini
1998
conf/eurocrypt
New Results on Multi-Receiver Authentication Codes.
Reihaneh Safavi-Naini
Huaxiong Wang
1998
conf/asiacrypt
Bounds and Constructions for Multireceiver Authentication Codes.
Reihaneh Safavi-Naini
Huaxiong Wang
1997
conf/acisp
A Message Authentication Code Based on Latin Squares.
Shahram Bakhtiari
Reihaneh Safavi-Naini
Josef Pieprzyk
1997
conf/acisp
Democratic Key Escrow Scheme.
Chor Wah Man
Reihaneh Safavi-Naini
1997
conf/icics
Remarks on the multiple assignment secret sharing scheme.
Hossein Ghodosi
Josef Pieprzyk
Reihaneh Safavi-Naini
1997
conf/icics
Secret sharing in hierarchical groups.
Chris Charnes
Keith M. Martin
Josef Pieprzyk
Reihaneh Safavi-Naini
1997
conf/icics
Multisender authentication systems with unconditional security.
Keith M. Martin
Reihaneh Safavi-Naini
1996
conf/acisp
Modeling a multi-level secure object-oriented database using views.
Ahmad Baraani-Dastjerdi
Josef Pieprzyk
Reihaneh Safavi-Naini
1996
conf/acisp
Evidential reasoning in network intrusion detection systems.
Mansour Esmaili
Reihaneh Safavi-Naini
Josef Pieprzyk
1996
conf/acisp
On selectable collisionful hash functions.
Shahram Bakhtiari
Reihaneh Safavi-Naini
Josef Pieprzyk
1996
conf/acisp
Cryptosystems for hierarchical groups.
Hossein Ghodosi
Josef Pieprzyk
Chris Charnes
Reihaneh Safavi-Naini
1996
conf/acisp
Cryptography based on transcendental numbers.
Josef Pieprzyk
Hossein Ghodosi
Chris Charnes
Reihaneh Safavi-Naini
1996
conf/acisp
On password-based authenticated key exchange using collisionful hash functions.
Shahram Bakhtiari
Reihaneh Safavi-Naini
Josef Pieprzyk
1996
conf/acsac
Case-Based Reasoning for Intrusion Detection.
Mansour Esmaili
Bala Balachandran
Reihaneh Safavi-Naini
Josef Pieprzyk
1994
conf/ccs
Conditionally Secure Secret Sharing Schemes with Disenrollment Capability.
Chris Charnes
Josef Pieprzyk
Reihaneh Safavi-Naini
1994
conf/ccs
-Fold Secure Against Spoofing.
Leonid M. Tombak
Reihaneh Safavi-Naini
1994
conf/eurocrypt
Comments on Soviet Encryption Algorithm.
Chris Charnes
Luke O'Connor
Josef Pieprzyk
Reihaneh Safavi-Naini
Yuliang Zheng
1994
conf/eurocrypt
Authentication Codes in Plaintext and Chosen-content Attacks.
Reihaneh Safavi-Naini
Leonid M. Tombak
1994
conf/asiacrypt
Combinatorial Structure of A-codes with r-fold Security.
Reihaneh Safavi-Naini
Leonid M. Tombak
1993
conf/eurocrypt
Optimal Authentication Systems.
Reihaneh Safavi-Naini
Leonid M. Tombak
1992
conf/asiacrypt
Authentication Codes with Perfect Protection.
Leonid M. Tombak
Reihaneh Safavi-Naini
1992
conf/asiacrypt
Authentication Codes under Impersonation Attack.
Reihaneh Safavi-Naini
Leonid M. Tombak
1991
conf/eurocrypt
Randomized Authentication Systems.
Josef Pieprzyk
Reihaneh Safavi-Naini
1991
conf/asiacrypt
Feistel Type Authentication Codes.
Reihaneh Safavi-Naini
1990
conf/asiacrypt
Parallel Generation of Pseudo-Random Sequences.
Reihaneh Safavi-Naini
Coauthors
Ahmad Ahmadi
(2)
Ahmad Baraani-Dastjerdi
(1)
Alexander James
(1)
Alina Oprea
(1)
Alireza Poostindouz
(1)
Alptekin Küpçü
(1)
Anthony Peterson
(1)
Asadullah Al Galib
(2)
Ashraf Matrawy
(1)
Bala Balachandran
(1)
Carey Williamson
(2)
Chad Saunders
(1)
Ching Yu Ng
(2)
Chor Wah Man
(1)
Chris Charnes
(6)
Cristina Nita-Rotaru
(3)
Daniel Kostecki
(1)
Dingyi Pei
(1)
Dongvu Tonien
(2)
Fangguo Zhang
(1)
Fuchun Lin
(1)
Gaven J. Watson
(1)
Giovanni Di Crescenzo
(1)
Go Ohtake
(1)
Hadi Ahmadi
(4)
Hamed Okhravi
(1)
Harikrishna Vasanta
(1)
Hartono Kurnio
(4)
Hoi Le Thi
(1)
Hongsong Shi
(1)
Hossein Ghodosi
(5)
Huaxiong Wang
(15)
Islam Hegazy
(1)
Jan Martin Surminen
(1)
Jeffrey Horton
(3)
Jeremy Clark
(1)
Joonsang Baek
(4)
Josef Pieprzyk
(18)
Kaoru Kurosawa
(1)
Kassem Kalach
(1)
Keith M. Martin
(4)
Kevin R. B. Butler
(1)
Khoa Nguyen
(1)
Kumaramangalam Muni Venkateswarlu
(1)
Kwok-Yan Lam
(1)
Lan Nguyen
(3)
Lan Yu
(1)
Leila Rashidi
(2)
Leonid M. Tombak
(6)
Liang Feng Zhang
(8)
Liang Lu
(2)
Ling Luo
(1)
Luke McAven
(4)
Luke O'Connor
(1)
Mahabir Prasad Jhanwar
(1)
Mahmudun Nabi
(4)
Majid Ghaderi
(4)
Mansour Esmaili
(2)
Martin Gagné
(1)
Md. Mamunur Rashid Akand
(3)
Md. Morshedul Islam
(3)
Michael E. Locasto
(1)
Mohammad Jafari
(1)
Mohammad Reza Reyhanitabar
(1)
Mohammed Ashraful Tuhin
(4)
Mohsen Alimomeni
(2)
Moti Yung
(2)
Muni Venkateswarlu K.
(1)
Muni Venkateswarlu Kumaramangalam
(1)
Nashad Ahmed Safa
(3)
Nathan Curtis
(1)
Neng Zeng
(1)
Nicholas Paul Sheppard
(3)
Omid Bodaghi
(1)
Partha Sarathi Roy
(1)
Paul C. van Oorschot
(1)
Pengwei Wang
(3)
Peter R. Wild
(2)
Philip Ogunbona
(1)
Philip W. L. Fong
(1)
Preston Haffey
(2)
Qiong Liu
(1)
Rashmi Kumari
(1)
Reihaneh Safavi-Naini
(149)
Robert K. Cunningham
(1)
Roland Booth
(1)
Rungrat Wiangsripanawan
(1)
Russell Ang
(1)
Sabyasachi Dutta
(3)
Sabyasachi Karati
(2)
Saikat Sarkar
(1)
Samuel Jero
(2)
Saoreen Rahman
(1)
Sepideh Avizheh
(10)
Setareh Sharifian
(2)
Seyed Hossein Ahmadinejad
(1)
Shahram Bakhtiari
(4)
Shahrokh Saeednia
(3)
Shaoquan Jiang
(4)
Shivaramakrishnan Narayan
(2)
Shuhong Wang
(2)
Siamak F. Shahandashti
(1)
Siamak Fayyaz Shahandashti
(6)
Sogand SadrHaghighi
(1)
Somayeh Taheri
(1)
Stelios Erotokritou
(1)
Sumanta Sarkar
(1)
Tam Thanh Doan
(1)
Tuan Manh Vu
(1)
Viliam Lisý
(2)
Vu Dong Tô
(1)
Willy Susilo
(18)
Xi Liu
(1)
Xiao Wei Liu
(1)
Xifan Zheng
(1)
Yanhong Xu
(2)
Yejing Wang
(6)
Yi Mu
(2)
Yuliang Zheng
(1)
Yuqiang Li
(1)
Yvo Desmedt
(4)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to