Hossein Ghodosi

Orcid: 0000-0001-9222-2118

According to our database1, Hossein Ghodosi authored at least 43 papers between 1996 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Security and privacy problems in voice assistant applications: A survey.
Comput. Secur., November, 2023

Security and Privacy Problems in Voice Assistant Applications: A Survey.
CoRR, 2023

Fair Distributed Oblivious Polynomial Evaluation via Bitcoin Deposits: Compute-as-a-Service.
Proceedings of the Secure IT Systems - 28th Nordic Conference, NordSec 2023, Oslo, Norway, 2023

Outsourcing Verifiable Distributed Oblivious Polynomial Evaluation from Threshold Cryptography.
Proceedings of the Information and Communications Security - 25th International Conference, 2023

2022
Improving Network-Based Anomaly Detection in Smart Home Environment.
Sensors, 2022

Unconditionally Secure Oblivious Polynomial Evaluation: A Survey and New Results.
J. Comput. Sci. Technol., 2022

Efficient Distributed Keys Generation of Threshold Paillier Cryptosystem.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2022

Verifiable DOPE from Somewhat Homomorphic Encryption, and the Extension to DOT.
Proceedings of the Science of Cyber Security - 4th International Conference, 2022

2021
Outsourced cheating detection for secret sharing.
Int. J. Inf. Sec., 2021

2018
Efficient Information Theoretic Multi-Party Computation from Oblivious Linear Evaluation.
IACR Cryptol. ePrint Arch., 2018

Improvements to Almost Optimum Secret Sharing with Cheating Detection.
Proceedings of the Advances in Information and Computer Security, 2018

Unconditionally Secure Distributed Oblivious Polynomial Evaluation.
Proceedings of the Information Security and Cryptology - ICISC 2018, 2018

2014
Security Analysis of Polynomial Interpolation-Based Distributed Oblivious Transfer Protocols.
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014

2013
Analysis of an Unconditionally Secure Distributed Oblivious Transfer.
J. Cryptol., 2013

A Verifiable 1-out-of-n Distributed Oblivious Transfer Protocol.
IACR Cryptol. ePrint Arch., 2013

2012
Multi-party computation with conversion of secret sharing.
Des. Codes Cryptogr., 2012

T-out-of-n Distributed Oblivious Transfer Protocols in Non-adaptive and Adaptive Settings.
Proceedings of the Information Security Practice and Experience, 2012

An Information-Theoretically Secure Threshold Distributed Oblivious Transfer Protocol.
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012

2011
Comments on Harn-Lin's cheating detection scheme.
Des. Codes Cryptogr., 2011

Privacy and Anonymity in Untrusted Data Stores.
Proceedings of the Twenty-Second Australasian Database Conference, 2011

A Verifiable Distributed Oblivious Transfer Protocol.
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

2010
Scalar Product-Based Distributed Oblivious Transfer.
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010

2009
Multi-Party Computation with Omnipresent Adversary.
Proceedings of the Public Key Cryptography, 2009

A Proactive Approach to Preventing Phishing Attacks Using Pshark.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

2008
Cryptanalysis of MV3 Stream Cipher.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

2007
On insecurity of Naor-Pinkas' distributed oblivious transfer.
Inf. Process. Lett., 2007

2006
Comments on the '<i>m</i> out of <i>n</i> oblivious transfer'.
Inf. Process. Lett., 2006

Privacy and Security Enhanced Offline Oblivious Transfer for Massive Data Distribution.
Proceedings of the Intelligence and Security Informatics, International Workshop, 2006

An Ideal and Robust Threshold RSA.
Proceedings of the Progressin Cryptology, 2006

An Efficient Public Key Cryptosystem Secure Against Chosen Ciphertext Attack.
Proceedings of the Information Systems Security, Second International Conference, 2006

An Anonymous and Secure Continuous Double Auction Scheme.
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006

2005
Design issues for electronic auctions.
Proceedings of the ICETE 2005, 2005

2004
A Modification to the 'Authentication of Concast Communication'.
Proceedings of the Cryptographic Algorithms and their Uses, 2004

2002
Authentication of Concast Communication.
Proceedings of the Progress in Cryptology, 2002

2001
Democratic Systems.
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001

2000
Cheating Prevention in Secret Sharing.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

1999
A Self-Certified Group-Oriented Cryptosystem Without a Combiner.
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999

Repudiation of Cheating and Non-repudiation of Zhang's Proxy Signature Schemes.
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999

1998
On Construction of Cumulative Secret Sharing Schemes.
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998

Secret Sharing in Multilevel and Compartmented Groups.
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998

1997
Remarks on the multiple assignment secret sharing scheme.
Proceedings of the Information and Communication Security, First International Conference, 1997

1996
Cryptography based on transcendental numbers.
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996

Cryptosystems for hierarchical groups.
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996


  Loading...