Reihaneh Safavi–naini
#154,371
Most Influential Person Now
Reihaneh Safavi–naini's AcademicInfluence.com Rankings
Reihaneh Safavi–nainimathematics Degrees
Mathematics
#7114
World Rank
#9737
Historical Rank
Measure Theory
#1878
World Rank
#2291
Historical Rank

Download Badge
Computer Science Mathematics
Reihaneh Safavi–naini's Degrees
- Bachelors Mathematics University of Tehran
Similar Degrees You Can Earn
Why Is Reihaneh Safavi–naini Influential?
(Suggest an Edit or Addition)Reihaneh Safavi–naini's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- An Efficient Signature Scheme from Bilinear Pairings and Its Applications (2004) (538)
- Public Key Encryption with Keyword Search Revisited (2008) (519)
- Digital Rights Management for Content Distribution (2003) (331)
- Privacy preserving EHR system using attribute-based infrastructure (2010) (311)
- Certificateless Public Key Encryption Without Pairing (2005) (237)
- Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems (2009) (214)
- Cancelable Key-Based Fingerprint Templates (2005) (186)
- Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption (2005) (179)
- Sequential traitor tracing (2000) (147)
- Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings (2003) (141)
- Advances in Cryptology – CRYPTO 2012 (2012) (126)
- On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search (2006) (122)
- A Survey of Identity-Based Cryptography (2004) (119)
- Efficient and Provably Secure Trapdoor-Free Group Signature Schemes from Bilinear Pairings (2004) (116)
- Dynamic k-Times Anonymous Authentication (2005) (114)
- Linear authentication codes: bounds and constructions (2001) (108)
- Broadcast anti-jamming systems (1999) (100)
- New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairing (2003) (92)
- Threshold Attribute-Based Signcryption (2010) (89)
- On multiple watermarking (2001) (81)
- Web filtering using text classification (2003) (77)
- Multireceiver Authentication Codes: Models, Bounds, Constructions, and Extensions (1999) (75)
- Secret Sharing in Multilevel and Compartmented Groups (1998) (74)
- RFID Privacy Models Revisited (2008) (73)
- Collusion Secure q-ary Fingerprinting for Perceptual Content (2001) (70)
- Information Security and Privacy, 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings (2006) (69)
- New Results on Multi-Receiver Authentication Codes (1998) (67)
- Changing Thresholds in the Absence of Secure Channels (1999) (64)
- LoSt: location based storage (2012) (61)
- ID-Based Chameleon Hashes from Bilinear Pairings (2003) (60)
- Verifiable Shuffles: A Formal Model and a Paillier-Based Efficient Construction with Provable Security (2004) (53)
- Automated Cryptanalysis of Substitution Ciphers (1993) (51)
- Import/export in digital rights management (2004) (51)
- New constructions for multicast re-keying schemes using perfect hash families (2000) (49)
- Automated Cryptanalysis of Transposition Ciphers (1994) (48)
- Conditionally secure secret sharing schemes with disenrollment capability (1994) (46)
- Recovering DC Coefficients in Block-Based DCT (2006) (46)
- New traitor tracing schemes using bilinear map (2003) (45)
- Short Pairing-Efficient Threshold-Attribute-Based Signature (2012) (44)
- Universal Designated Verifier Signature Proof (or How to Efficiently Prove Knowledge of a Signature) (2005) (44)
- Traitor Tracing for Shortened and Corrupted Fingerprints (2002) (43)
- Bounds and Techniques for Efficient Redistribution of Secret Shares to New Access Structures (1999) (43)
- Towards defining semantic foundations for purpose-based privacy policies (2011) (43)
- High-capacity steganography using a shared colour palette (2005) (41)
- Case-based reasoning for intrusion detection (1996) (41)
- New Privacy Results on Synchronized RFID Authentication Protocols against Tag Tracing (2009) (40)
- Attribute-Based Encryption with Key Cloning Protection (2008) (40)
- Securing wavelet compression with random permutations (2000) (38)
- Scalable fragile watermarking for image authentication (2013) (36)
- Multi-party Concurrent Signatures (2006) (35)
- Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures (2008) (35)
- Distributing the Encryption and Decryption of a Block Cipher (2005) (33)
- Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability (2006) (33)
- New results on frame-proof codes and traceability schemes (2001) (33)
- Keyed Hash Functions (1995) (31)
- X2Rep: Enhanced Trust Semantics for the XRep Protocol (2004) (31)
- Partial belief and probabilistic reasoning in the analysis of secure protocols (1992) (30)
- Dynamic Threshold Cryptosystems ( A New Scheme in Group Oriented Cryptography ) (1995) (30)
- Design Principles for Low Latency Anonymous Network Systems Secure against Timing Attacks (2007) (29)
- A 2-Secure Code with Efficient Tracing Algorithm (2002) (29)
- A practice-oriented framework for measuring privacy and utility in data sanitization systems (2010) (29)
- Privacy-Preserving Implicit Authentication (2014) (28)
- Towards a Resilient Smart Home (2018) (28)
- Broadcast authentication for group communication (2001) (27)
- Private Fingerprint Matching (2012) (26)
- Practical RFID ownership transfer scheme (2011) (26)
- A Model for Adversarial Wiretap Channels (2016) (26)
- Resolution and quality scalable spread spectrum image watermarking (2005) (25)
- A rights management approach to protection of privacy in a cloud of electronic health records (2011) (25)
- Error-correcting codes for authentication and subliminal channels (1991) (25)
- Reconciling user privacy and implicit authentication for mobile devices (2015) (25)
- Attack on Han et al.'s ID-based confirmer (undeniable) signature at ACM-EC'03 (2005) (24)
- Using digital rights management for securing data in a medical research environment (2010) (24)
- Breaking and Mending Resilient Mix-Nets (2003) (23)
- Protecting Privacy with the MPEG-21 IPMP Framework (2006) (23)
- A Message Authentication Code Based on Latin Squares (1997) (23)
- Compression tolerant DCT based image hash (2003) (22)
- An information theoretic privacy and utility measure for data sanitization mechanisms (2012) (22)
- A Group Key Distribution Scheme with Decentralised User Join (2002) (22)
- ReDiSen: Reputation-based secure cooperative sensing in distributed cognitive radio networks (2013) (22)
- Distributed Detection of Wormhole Attacks in Wireless Sensor Networks (2009) (22)
- Enforcing P3P Policies Using a Digital Rights Management System (2007) (21)
- Privacy Consensus in Anonymization Systems via Game Theory (2012) (21)
- Verifiable shuffles: a formal model and a Paillier-based three-round construction with provable security (2006) (21)
- A New and Efficient Fail-stop Signature Scheme (2000) (21)
- Ranking Attack Graphs with Graph Neural Networks (2009) (21)
- Secret Keys from Channel Noise (2011) (21)
- A Practical Electronic Voting Protocol Using Threshold Schemes (2008) (21)
- Attribute-based encryption without key cloning (2012) (20)
- Token-Controlled Public Key Encryption (2005) (20)
- Private Outsourcing of Polynomial Evaluation and Matrix Multiplication Using Multilinear Maps (2013) (20)
- Verifiable Delegation of Computations with Storage-Verification Trade-off (2014) (20)
- Threshold MACs (2002) (20)
- General Group Authentication Codes and Their Relation to "Unconditionally-Secure Signatures" (2004) (20)
- Some New Proxy Signature Schemes from Pairings (2004) (19)
- A Secure Re-keying Scheme with Key Recovery Property (2002) (19)
- Unconditionally Secure Approximate Message Authentication (2009) (19)
- Compression performance of JPEG encryption scheme (2002) (19)
- Some Remarks on the Logic of Gong, Needham and Yahalom (1994) (18)
- Coefficient Selection Methods for Scalable Spread Spectrum Watermarking (2003) (18)
- Optimal Parallel I/O for Range Queries through Replication (2002) (18)
- Enforcing purpose of use via workflows (2009) (18)
- Efficient Identity-Based Conference Key Distribution Protocols (1998) (18)
- RSA-based fail-stop signature schemes (1999) (18)
- Classification of the Deletion Correcting Capabilities of Reed–Solomon Codes of Dimension $2$ Over Prime Fields (2007) (17)
- Security and privacy in the smart grid (2012) (17)
- Characterization of Optimal Authentication Codes with Arbitration (1999) (17)
- Guessing Secrecy (2012) (17)
- A Digital Rights Management Model for Healthcare (2009) (17)
- Comments on Soviet Encryption Algorithm (1994) (17)
- An Efficient Deniable Key Exchange Protocol (Extended Abstract) (2008) (17)
- Detection of Algebraic Manipulation in the Presence of Leakage (2013) (17)
- Unconditionally-Secure Robust Secret Sharing with Minimum Share Size (2013) (16)
- New results on multireceiver authentication codes (1998) (16)
- Towards securing mintroute in wireless sensor networks (2010) (16)
- Self-organised group key management for ad hoc networks (2006) (16)
- Multisender authentication systems with unconditional security (1997) (16)
- Automated Security Proof for Symmetric Encryption Modes (2009) (16)
- Selected Areas in Cryptography, 16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers (2009) (16)
- A scalable and oblivious digital watermarking for images (2004) (15)
- Codes for limited view adversarial channels (2013) (15)
- On password-based authenticated key exchange using collisionful hash functions (1996) (15)
- Implementing Trusted Terminals with a and SITDRM (2008) (15)
- Securing wireless sensor networks against large-scale node capture attacks (2010) (15)
- Remarks on the multiple assignment secret sharing scheme (1997) (15)
- Location constraints in digital rights management (2008) (14)
- Recursive Constructions of Secure Codes and Hash Families Using Difference Function Families (2006) (14)
- On Optimal Secure Message Transmission by Public Discussion (2009) (14)
- Simulation modeling of secure wireless sensor networks (2009) (14)
- Paillier-based publicly verifiable (non-interactive) secret sharing (2014) (14)
- Outsourcing Scheme of ABE Encryption Secure against Malicious Adversary (2019) (14)
- An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families (2006) (13)
- A New Identity-Based Key Exchange Protocol Minimizing Computation and Communication (1997) (13)
- Unconditionally Secure Encryption Under Strong Attacks (2004) (13)
- A Framework for Expressing and Enforcing Purpose-Based Privacy Policies (2014) (13)
- HCAP: A History-Based Capability System for IoT Devices (2018) (13)
- Sharing digital rights with domain licensing (2006) (13)
- An efficient code for Adversarial Wiretap channel (2014) (13)
- Construction of deletion correcting codes using generalized Reed–Solomon codes and their subcodes (2007) (12)
- Automated Verification of Block Cipher Modes of Operation, an Improved Method (2011) (12)
- A3-Codes under Collusion Attacks (1999) (12)
- A secure and flexible authentication system for digital images (2004) (12)
- Batch verifiable computation of outsourced functions (2015) (12)
- Verifiable Computation using Smart Contracts (2019) (11)
- Secret key establishment over a pair of independent broadcast channels (2010) (11)
- Explicit Construction of Secure Frameproof Codes (2005) (11)
- An Attack on the Privacy of Sanitized Data that Fuses the Outputs of Multiple Data Miners (2009) (11)
- Comparing and debugging firewall rule tables (2007) (11)
- A Multi-Level View Model for Secure Object-Oriented Databases (1997) (11)
- On the Maximal Codes of Length 3 with the 2-Identifiable Parent Property (2004) (11)
- On Construction of Cumulative Secret Sharing Schemes (1998) (11)
- A Secure Event Logging System for Smart Homes (2017) (11)
- Privacy preserving system for integrated broadcast-broadband services using attribute-based encryption (2015) (11)
- Secret sharing in hierarchical groups (1997) (11)
- Deletion Correcting Using Generalized Reed-Solomon Codes (2004) (11)
- Efficient Revocation Schemes for Secure Multicast (2001) (11)
- A Provably Secure and Efficient Verifiable Shuffle based on a Variant of the Paillier Cryptosystem (2005) (10)
- Bounds and Constructions for Multireceiver Authentication Codes (1998) (10)
- Incentivize cooperative sensing in distributed cognitive radio networks with reputation-based pricing (2014) (10)
- Utility of Knowledge Extracted from Unsanitized Data when Applied to Sanitized Data (2008) (10)
- Remark on self-certified group-oriented cryptosystem without combiner (1999) (10)
- Transport Layer Identification of Skype Traffic (2008) (10)
- Breaking and Repairing an Approximate Message Authentication Scheme (2011) (10)
- Financial Cryptography and Data Security - 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers (2014) (10)
- Radio Networks with Reliable Communication (2005) (10)
- Non-interactive Manual Channel Message Authentication Based on eTCR Hash Functions (2007) (10)
- Towards securing 3G mobile phones (2001) (10)
- Server-Aided RSA Key Generation Against Collusion Attack (2005) (10)
- Simple and Communication Complexity Efficient Almost Secure and Perfectly Secure Message Transmission Schemes (2010) (9)
- A Model for Adversarial Wiretap Channels and its Applications (2015) (9)
- A Model for Adversarial Wiretap Channel (2013) (9)
- Efficient codes for Limited View adversarial channels (2013) (9)
- X2BT Trusted Reputation System: A Robust Mechanism for P2P Networks (2006) (9)
- Non-Malleable Secret Sharing against Affine Tampering (2019) (9)
- A Rights Management Approach to Securing Data Distribution in Coalitions (2010) (9)
- On selectable collisionful hash functions (1996) (9)
- A Review of Internet Payments Schemes (1996) (9)
- Key Management for Secure Multicast with Dynamic Controller (2000) (8)
- Concurrently-secure credential ownership proofs (2007) (8)
- Secret key agreement using a virtual wiretap channel (2017) (8)
- Weighted Segmented Digital Watermarking (2004) (8)
- Privacy-Preserving Distance-Bounding Proof-of-Knowledge (2014) (8)
- Location privacy in mobile IP (2005) (8)
- Combinatorial Structure of A-codes with r-fold Security (1994) (8)
- Secure Multimedia Authoring with Dishonest Collaborators (2004) (8)
- A General Construction for Fail-Stop Signature using Authentication Codes (2001) (8)
- A Proposal for a Canadian CBDC (2021) (8)
- Leakage-Resilient Secret Sharing in Non-Compartmentalized Models (2020) (8)
- User Authentication Using Human Cognitive Abilities (2015) (8)
- Proceedings of the First international conference on Digital Rights Management: technologies, Issues, Challenges and Systems (2005) (8)
- Generalized homomorphic MACs with efficient verification (2014) (8)
- New Results on Unconditionally Secure Multi-receiver Manual Authentication (2009) (8)
- On (In)security of "A Robust Image Authentication Method" (2002) (8)
- How to Compare Image Watermarking Algorithms (2009) (8)
- On the operational semantics of rights expression languages (2009) (8)
- Distance Lower Bounding (2014) (8)
- Achieving Mobility and Anonymity in IP-Based Networks (2007) (7)
- Generic constructions for universal designated-verifier signatures and identitybased signatures from standard signatures (2009) (7)
- Region-Based Watermarking for Images (1999) (7)
- Secret Sharing with Binary Shares (2018) (7)
- Practical and Secure Message Authentication (1995) (7)
- New Results on Multi-receiver Authentication Codes New Results on Multi-receiver Authentication Code (1998) (7)
- Cryptography based on transcendental numbers (1996) (7)
- An Efficient Post-Quantum One-Time Signature Scheme (2015) (7)
- A New Look at the Refund Mechanism in the Bitcoin Payment Protocol (2018) (7)
- Secure authorization, access control and data integrity in Bluetooth (2002) (7)
- Three Systems for Shared Generation of Authenticators (1996) (7)
- Performance Measurement of Watermark Embedding Patterns (2003) (7)
- Secure Obfuscation of Authoring Style (2015) (7)
- An Efficient Verifiable Shuffle with Perfect Zero-knowledge Proof System (2004) (7)
- Evidential reasoning in network intrusion detection systems (1996) (7)
- Optimal secure message transmission by public discussion (2009) (7)
- A True Random Generator Using Human Gameplay (2013) (7)
- Families of threshold schemes (1994) (7)
- Human Assisted Randomness Generation Using Video Games (2013) (7)
- Directional Distance-Bounding Identification (2017) (7)
- Non-interactive conference key distribution and its applications (2008) (7)
- An MPEG tolerant authentication system for video data (2004) (7)
- An Efficient Fail-Stop Signature Scheme Based on Factorization (2002) (6)
- Proofs of Retrievability via Fountain Code (2012) (6)
- A Dynamic Group Key Distribution Scheme with Flexible User Join (2002) (6)
- Corruption-Localizing Hashing (2009) (6)
- Verifiable Multi-server Private Information Retrieval (2014) (6)
- Detecting Policy Violations through Traffic Analysis (2006) (6)
- POSTER: A Behavioural Authentication System for Mobile Users (2016) (6)
- Fuzzy Universal Hashing and Approximate Authentication (2011) (6)
- Compact Accumulator Using Lattices (2015) (6)
- Privacy and Utility of Inference Control Mechanisms for Social Computing Applications (2016) (6)
- Verifiable local computation on distributed data (2014) (6)
- Authentication codes in plaintext and chosen-content attacks (1996) (6)
- Detecting Algebraic Manipulation in Leaky Storage Systems (2016) (6)
- Erasure adversarial wiretap channels (2015) (6)
- Digital watermarks for copyright protection (2002) (6)
- Advances in cryptology, ASIACRYPT '94 : 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28-December 1, 1994 : proceedings (1995) (5)
- Cryptosystems for hierarchical groups (1996) (5)
- An Efficient Construction for Fail-Stop Signature for Long Messages (2001) (5)
- Secret sharing schemes with partial broadcast channels (2006) (5)
- Further Comments on the Soviet Encryption Algorithm (1994) (5)
- On the Share Efficiency of Robust Secret Sharing and Secret Sharing with Cheating Detection (2013) (5)
- Unconditionally Secure Conference Key Distribution: Security Notions, Bounds and Constructions (2011) (5)
- Hash-then-Encode: A Modular Semantically Secure Wiretap Code (2017) (5)
- Batch Verifiable Computation of Polynomials on Outsourced Data (2015) (5)
- On Applicability of Random Graphs for Modeling Random Key Predistribution for Wireless Sensor Networks (2010) (5)
- On the Weakness of Gong's Collisionful Hash Functions (1997) (5)
- Attack on Liu/Farrell/Boyd Arithmetic Coding Encryption Scheme (1999) (5)
- Fail-Stop Threshold Signature Schemes Based on Elliptic Curves (1999) (5)
- Information Theoretic Bounds on Authentication Systems in Query Model (2008) (5)
- A Model of Authorization for Object-Oriented Databases based on Object Views (1995) (5)
- On the Security of Girault's Identification Scheme (1998) (5)
- Path Hopping: an MTD Strategy for Quantum-safe Communication (2017) (5)
- Symmetric Authentication Codes with Secrecy and Unconditionally Secure Authenticated Encryption (2004) (5)
- Distance-bounding Identification (2017) (5)
- Proceedings of the 4th International Symposium on Information, Computer, and Communications Security (2009) (5)
- Optimal Authentication Systems (1994) (5)
- A General Construction for 1-Round δ-RMT and (0, δ)-SMT (2012) (5)
- Leakage-Resilient Non-Malleable Secret Sharing in Non-compartmentalized Models (2019) (5)
- How to Prevent to Delegate Authentication (2015) (5)
- Democratic Key Escrow Scheme (1997) (5)
- Authentication codes that are r-fold secure against spoofing (1994) (5)
- Broadcast Authentication in Group Communication (1999) (4)
- Authentication Codes under Impersonation Attack (1992) (4)
- Multipath Private Communication: An Information Theoretic Approach (2014) (4)
- A Code for Sequential Traitor Tracing (2002) (4)
- Automated Proofs of Block Cipher Modes of Operation (2015) (4)
- On a method to authenticate and verify digital streams (2002) (4)
- Authentication Codes with Perfect Protection (1992) (4)
- Unconditionally-secure ideal robust secret sharing schemes for threshold and multilevel access structure (2013) (4)
- Generalized t-Designs and Weighted Majority Decoding (1979) (4)
- An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme (2007) (4)
- Fragile Watermark on Critical Points (2002) (4)
- Performance Analysis of Linux RNG in Virtualized Environments (2015) (4)
- Authentication Codes in Plaintext and Chosen-Content Attacks (1994) (4)
- Common Randomness and Secret Key Capacities of Two-Way Channels (2011) (4)
- Unconditionally secure ring authentication (2007) (4)
- Bounds on authentication systems in query model (2005) (4)
- New results on Secret Key Establishment over a pair of broadcast channels (2010) (4)
- More than a Fair Share: Network Data Remanence Attacks against Secret Sharing-based Schemes (2021) (4)
- A new QIM-based image watermarking method and system (2005) (4)
- Adversarial wiretap channel with public discussion (2014) (4)
- Privacy-Enhanced Profile-Based Authentication Using Sparse Random Projection (2017) (4)
- Game-Theoretic Analysis of an Incentivized Verifiable Computation System (2019) (4)
- Implementing Trusted Terminals with a TPM and SITDRM (2010) (4)
- Digital Rights Management: Technologies, Issues, Challenges and Systems (Lecture Notes in Computer Science) (2006) (4)
- Wiretap Secret Key Capacity of Tree-PIN (2019) (4)
- Decompression Quines and Anti-Viruses (2017) (4)
- Three Systems for Threshold Generation of Authenticators (1998) (4)
- Linear Code Implies Public-Key Traitor Tracing with Revocation (2004) (3)
- Special issue on recent advances in physical-layer security (2016) (3)
- Protecting data privacy in publicly verifiable delegation of matrix and polynomial functions (2020) (3)
- Group Encryption: Full Dynamicity, Message Filtering and Code-Based Instantiation (2021) (3)
- Resilient Lkh: Secure Multicast Key Distribution Schemes (2006) (3)
- A Combinatorial Approach to Asymmetric Traitor Tracing (2000) (3)
- Threshold Fail-Stop Signature Schemes Based on Discrete Logarithm and Factorization (2000) (3)
- Randomized Authentication Systems (1991) (3)
- Secure Localization Using Dynamic Verifiers (2011) (3)
- Digital Rights Management: Technologies, Issues, Challenges and Systems, First International Conference, DRMTICS 2005, Sydney, Australia, October 31 - November 2, 2005, Revised Selected Papers (2006) (3)
- Secure Distance Bounding Verification using Physical-Channel Properties (2013) (3)
- Optimal One Round Almost Perfectly Secure Message Transmission (Short Paper) (2011) (3)
- A Model of Content-based Authorization in Object-Oriented Databases based on Object Views (1995) (3)
- Secret Key Establishment over Noisy Channels (2011) (3)
- Privacy-preserving FairSwap: Fairness and privacy interplay (2021) (3)
- Limited View Adversary Codes: Bounds, Constructions and Applications (2015) (3)
- Combinatorial characterizations of authentication codes in verification oracle model (2007) (3)
- A Cryptographic Solution to Discretionary Access Control in Structurally Object-Oriented Databases (1995) (3)
- Second-Order Asymptotics for One-way Secret Key Agreement (2021) (3)
- On Securing RTP-Based Streaming Content with Firewalls (2005) (3)
- Information security and privacy : 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003 : proceedings (2003) (3)
- Towards Securing 3G Mobile Phones (extended abstract) (2001) (3)
- A Capacity-achieving One-way Key Agreement with Improved Finite Blocklength Analysis (2020) (3)
- Outsourcing of Verifiable Attribute-Based Keyword Search (2017) (2)
- Utility of Knowledge Discovered from Sanitized Data (2008) (2)
- Parallel Generation of Pseudo-Random Sequences (1990) (2)
- Tracing traitors: a selective survey (2004) (2)
- Proceedings of the 5th ACM workshop on Digital rights management (2005) (2)
- A New Approach to Robust Threshold RSA Signature Schemes (1999) (2)
- Post-quantum Security using Channel Noise (2018) (2)
- K2SN-MSS: An Efficient Post-Quantum Signature (2019) (2)
- A Secure Electronic Healthcare Record Infrastructure in the Digital Rights Management Model (2009) (2)
- Distributed Management of OMA DRM Domains (2006) (2)
- A Channel Model of Transceivers for Multiterminal Secret Key Agreement (2020) (2)
- Economically Optimal Variable Tag Length Message Authentication (2017) (2)
- Crypto Topics and Applications II (1999) (2)
- Fail-Stop Signature for Long Messages (2000) (2)
- Computer Intrusion Detection and Incomplete Information (1996) (2)
- New Attacks and Secure Design for Anonymous Distance-Bounding (2018) (2)
- A Virtual Wiretap Channel for Secure Message Transmission (2016) (2)
- Cryptographic Hash Functions : A SurveyS (1995) (2)
- Perfect Authenticity and Optimal A-codes (1994) (2)
- Optimal message transmission protocols with flexible parameters (2011) (2)
- K2SN-MSS: An Efficient Post-Quantum Signature (Full Version) (2019) (2)
- Smart Contracts for Incentivized Outsourcing of Computation (2021) (2)
- Path Hopping: An MTD Strategy for Long-Term Quantum-Safe Communication (2018) (2)
- Financial Cryptography and Data Security (2014) (2)
- Authentication Techniques (1994) (2)
- Authentication Codes in the Query Model (2008) (2)
- Scalable Behavioral Authentication (2021) (2)
- Redistribution of Mechanical Secret Shares (2002) (2)
- Private Message Transmission Using Disjoint Paths (2014) (2)
- Robust Additive Secret Sharing Schemes over Zm (2001) (2)
- Pseudo-random sequence generators using structured noise (1991) (2)
- Practical Message Authentication Schemes (1995) (2)
- A generalised testbed for analysing block and stream ciphers (1991) (2)
- Securing random key predistribution against semi-honest adversaries (2009) (2)
- Exploiting Routing Tree Construction in CTP (2011) (2)
- On De-anonymization of Single Tweet Messages (2018) (2)
- HCAP (2018) (2)
- A Blockchain Based Approach to Resource Sharing in Smart Neighbourhoods (2020) (2)
- An information theoretic framework for web inference detection (2012) (2)
- A Pixel-Based Robust Imagewatermarking System (2006) (2)
- Codes for Detection of Limited View Algebraic Tampering (2016) (1)
- Bounds and Constructions for 1-Round (0, δ)-Secure Message Transmission against Generalized Adversary (2012) (1)
- Bounds on authentication systems in query mode (2014) (1)
- Authentication codes and plaintext attack (1994) (1)
- Sixth Annual Conference on Privacy, Security and Trust, PST 2008, October 1-3, 2008, Fredericton, New Brunswick, Canada (2008) (1)
- Almost Optimum Secret Sharing with Cheating Detection (2015) (1)
- Digital Rights Management (2010) (1)
- Securing mobile IP enabled laptop (2003) (1)
- Bounds and Constructions for A3-code with Multi-senders (1998) (1)
- Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009 (2009) (1)
- Non-Malleable Codes with Leakage and Applications to Secure Communication (2017) (1)
- Evaluating the optimal probability distribution for steganography under zero-error conditions (2003) (1)
- A Cryptographic Mechanism for Object-Instance-Based Authorization in Object-Oriented Database Systems (1995) (1)
- A License Transfer System for Supporting Content Portability in Digital Rights Management (2005) (1)
- Modeling a multi-level secure object-oriented database using views (1996) (1)
- Message Transmission and Key Establishment: Conditions for Equality of Weak and Strong Capacities (2012) (1)
- Applied Cryptography and Network Security (2013) (1)
- Anonymous Traceability Schemes with Unconditional Security (2000) (1)
- A Capacity-achieving One-message Key Agreement With Finite Blocklength Analysis. (2019) (1)
- RAFR: remote assessment of file redundancy (2013) (1)
- POSTER: Privacy Enhanced Secure Location Verification (2016) (1)
- Key Establishment in Heterogeneous Self-organized Networks (2007) (1)
- A Maximum Likelihood Watermark Decoding Scheme (2007) (1)
- An Algorithm for Data Hiding Using Median Cut Segmentation (2002) (1)
- Securing Medical Research Data with a Rights Management System (2010) (1)
- A scalable post-quantum hash-based group signature (2021) (1)
- Information-theoretically Secure Key Agreement over Partially Corrupted Channels (2016) (1)
- A Post-Quantum One Time Signature Using Bloom Filter (2017) (1)
- MOVTCHA: A CAPTCHA Based on Human Cognitive and Behavioral Features Analysis (2014) (1)
- Efficient Codes for Adversarial Wiretap Channels (2014) (1)
- Using Cryptographic Hash Functions for Discretionary Access Control in Object-Oriented Databases (1997) (1)
- Correspondence Recovering DC Coefficients in Block-Based DCT (2006) (1)
- A Discussion on Security Education in Academia (2018) (1)
- Secure Logging with Security against Adaptive Crash Attack (2019) (1)
- Privacy-Preserving Proof-of-Location With Security Against Geo-Tampering (2023) (1)
- Message transmission and key establishment: General equality for weak and strong capacities (2013) (1)
- A Modular Semantically Secure Wiretap Code with Shared Key for Weakly Symmetric Channels (2019) (1)
- Secure key distribution for Wireless Sensor Networks (2008) (1)
- Region-Based Watermarking by Distribution Adjustment (2000) (1)
- Directional Distance-Bounding Identification Protocols (2018) (1)
- Secure compression using adaptive Huffman coding (2000) (1)
- Application of PVM to Linear Cryptanalysis of DES (1994) (1)
- Design and implementation of a content filtering firewall (2001) (1)
- 2-secure codes from 2-SFP codes (2005) (1)
- Privacy-preserving verifiable delegation of polynomial and matrix functions (2020) (1)
- Anonymous Distance-Bounding Identification (2018) (1)
- Optimal Image Watermark Decoding (2006) (1)
- An Intermediate Secret-Guessing Attack on Hash-Based Signatures (2021) (0)
- Proceedings of the 4th International Conference on the Theory and Applications of Cryptology: Advances in Cryptology (1994) (0)
- Session details: Session 6B -- Cryptographic Obfuscation (2014) (0)
- Robust and Reusable Fuzzy Extractors and their Application to Authentication from Iris Data (2023) (0)
- Self-dual modular-graceful cyclic digraphs (2005) (0)
- Privacy-Preserving Resource Sharing Using Permissioned Blockchains - (The Case of Smart Neighbourhood) (2021) (0)
- DTLS with Post-quantum Secure Source Authentication and Message Integrity (2021) (0)
- (ε, 0)-Secure Message Transmission (2009) (0)
- Near-perfect protection and key strategies in authentication codes under spoofing attack of order r (1996) (0)
- J ul 2 01 9 Non-malleable Coding for Arbitrary Varying Channels (2019) (0)
- A Note on the Exposure Property of SBIBD (2003) (0)
- Towards securing 3 G mobile phones (2017) (0)
- Non-Malleable Codes against Active Physical Layer Adversary (2019) (0)
- Proceedings of the Seventh ACM Workshop on Digital Rights Management, Alexandria, VA, USA, October 29, 2007 (2005) (0)
- Secure Key Agreement over Partially Corrupted Channels (2018) (0)
- Information Theoretic Security, Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008, Proceedings (2008) (0)
- Using SITDRM for privacy rights management (2007) (0)
- ACSW Frontiers 2005, 2005 ACSW Workshops - the Australasian Workshop on Grid Computing and e-Research (AusGrid 2005) and the Third Australasian Information Security Workshop (AISW 2005), Newcastle, NSW, Australia, January/February 2005 (2005) (0)
- A New Bound for Substitution Attack (1993) (0)
- Unconditionally secure conference key distribution: Security definitions and their relations (2008) (0)
- Secret Key Capacity of Wiretapped Polytree-PIN (2021) (0)
- A Survey of Academic Use of Information Technology (2001) (0)
- SecuringWirelessSensorNetworks againstLarge-scaleNodeCaptureAttacks (2010) (0)
- Towards De(cid:28)ning Semantic Foundations for Purpose-Based Privacy Policies (2020) (0)
- Session details: Cryptography (2005) (0)
- Secret Key Agreement over a Pair of Independent Broadcast Channels (2010) (0)
- On "the Power of Verification Queries" in Unconditionally Secure Message Authentication (2011) (0)
- Model Inversion for Impersonation in Behavioral Authentication Systems (2021) (0)
- Privately Outsourcing Polynomial Evaluations and Matrix Multiplications using Multilinear Maps (2013) (0)
- Hybrid Encryption in Correlated Randomness Model (2021) (0)
- Proceedings of the 32nd Annual Cryptology Conference on Advances in Cryptology --- CRYPTO 2012 - Volume 7417 (2012) (0)
- Design and implementation of a content filtering (2017) (0)
- Information Security and Privacy: 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006Proceedings (Lecture Notes in Computer Science) (2006) (0)
- A Capability-based Distributed Authorization System to Enforce Context-aware Permission Sequences (2022) (0)
- Proceedings of the 8th Australasian conference on Information security and privacy (2003) (0)
- Modelling social networks as authorised domains with decay (2008) (0)
- Information-theoretic Key Encapsulation and its Application to Secure Communication (2021) (0)
- HKBU Institutional Repository (2009) (0)
- On Classifying Conference Key Distribution Protocols (2001) (0)
- Two-level security for message sequences (2016) (0)
- Session details: Privacy and authentication (2006) (0)
- MRD Hashing (1998) (0)
- Proceedings of the 11th international conference on Applied Cryptography and Network Security (2013) (0)
- Non-malleable Coding for Arbitrary Varying Channels (2019) (0)
- Batch verifiable computation of outsourced functions (2015) (0)
- Password Protected Secret Sharing from Lattices (2021) (0)
- Paillier-based publicly verifiable (non-interactive) secret sharing (2014) (0)
- A Digital Rights Management Model for Healthcare (Position Paper) (2009) (0)
- Traceable Policy-Based Signatures and Instantiation from Lattices (2020) (0)
- Protecting data privacy in publicly verifiable delegation of matrix and polynomial functions (2019) (0)
- Efficient 1-Round Almost-Perfect Secure Message Transmission Protocols with Flexible Connectivity (2012) (0)
- Causality, Partial Orders, and Lower Bounds on Rounds for a Class of Authentication Protocols (2007) (0)
- Privacy-enhanced OptiSwap (2021) (0)
- A New and EÆ ient Fail{Stop Signature S heme (2007) (0)
- Proceedings of the 4th Australasian Conference on Information Security and Privacy (1999) (0)
- 100101010010100110001010101001001001010100111110100100110100100110110010101010110 singapore 0 5 secure mobile ad-hoc networks and sensors Singapore . : . September 20-22 , 2005 presentation topics Welcome to (0)
- Proceedings of the 11th Australasian conference on Information Security and Privacy (2006) (0)
- A Workflow Reference Monitor for Enforcing Purpose-Based Policies (2013) (0)
- Bounds And Constructions For Threshold Shared Generation Of Authenticators (2002) (0)
- Payment systems for hypermedia information systems (1996) (0)
- The proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Hobart, Tasmania, Australia, January 2006 (2006) (0)
- Feistel Type Authentication Codes (1991) (0)
- Crypto Topics and Applications I (1999) (0)
- Proceedings of the 12th international conference on Information hiding (2010) (0)
- How to Construct Fail-Stop Confirmer Signature Schemes (2001) (0)
- Fail-stop signature for long messages: (Extended abstract) (2000) (0)
- Securing Communication Against Leaky Switches (2022) (0)
- Proceedings of the 3rd international conference on Information Theoretic Security (2008) (0)
- Leakage Resilient Cheating Detectable Secret Sharing Schemes (2021) (0)
- Proceedings of the 2005 Australasian workshop on Grid computing and e-research - Volume 44 (2005) (0)
- Interactive message transmission over adversarial wiretap channel II (2017) (0)
- On Randomization in MTD Systems (2022) (0)
- Deletion Correcting U sing Generalized Reed-Solomon Codes (2004) (0)
- Automated Proofs of Block Cipher Modes of Operation (2015) (0)
- Fuzzy Vault for Behavioral Authentication System (2020) (0)
- A One-Round Key Agreement Protocol with Information-Theoretic Security (2019) (0)
- Further Comments on theSoviet Encryption Algorithm (1994) (0)
- Information Security and Privacy: 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings (1999) (0)
- An almost optimal fail-stop signature scheme (2000) (0)
- 10 PSEUDO-RANDOM SEQUENCE GENERATORS USING STRUCTURED NOISE (2017) (0)
- CCSW 2014: Sixth ACM Cloud Computing Security Workshop (2014) (0)
- A One-way Secret Key Agreement with Security Against Active Adversaries (2023) (0)
- The Design of Distributed Hypermedia Information Systems (2007) (0)
- Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security (2014) (0)
- In-region Authentication (2018) (0)
This paper list is powered by the following services: