Mohsen Minaei

Orcid: 0009-0001-3899-697X

According to our database1, Mohsen Minaei authored at least 32 papers between 2013 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Lite-PoT: Practical Powers-of-Tau Setup Ceremony.
CoRR, March, 2025

DTL: Data Tumbling Layer. A Composable Unlinkability for Smart Contracts.
CoRR, March, 2025

AUPCH: Auditable Unlinkable Payment Channel Hubs.
IACR Cryptol. ePrint Arch., 2025

Web3 Recovery Mechanisms and User Preferences.
IACR Cryptol. ePrint Arch., 2025

SoK: Fully-homomorphic encryption in smart contracts.
IACR Cryptol. ePrint Arch., 2025

A Composability Analysis Framework for Web3 Wallet Recovery Mechanisms.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

DTL: Data Tumbling Layer A Composable Unlinkability for Smart Contracts.
Proceedings of the 20th ACM Asia Conference on Computer and Communications Security, 2025

2024
Exploring the Interplay Between Interaction Experience and Security Perception of Payment Authentication in Virtual Reality.
Proceedings of the IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops, 2024

A Plug-and-Play Long-Range Defense System for Proof-of-Stake Blockchains.
Proceedings of the Computer Security - ESORICS 2024, 2024

Programmable Payment Channels.
Proceedings of the Applied Cryptography and Network Security, 2024

2023
Off-Chain Programmability at Scale.
IACR Cryptol. ePrint Arch., 2023

Scalable Off-Chain Auctions.
IACR Cryptol. ePrint Arch., 2023

SoK: Web3 Recovery Mechanisms.
IACR Cryptol. ePrint Arch., 2023

"I Want the Payment Process to be Cool": Understanding How Interaction Factors into Security and Privacy Perception of Authentication in Virtual Reality.
CoRR, 2023

Unlinkability and Interoperability in Account-Based Universal Payment Channels.
Proceedings of the Financial Cryptography and Data Security. FC 2023 International Workshops, 2023

Uncovering Impact of Mental Models towards Adoption of Multi-device Crypto-Wallets.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Empirical Understanding of Deletion Privacy: Experiences, Expectations, and Measures.
Proceedings of the 31st USENIX Security Symposium, 2022

Towards Overcoming the Undercutting Problem.
Proceedings of the Financial Cryptography and Data Security, 2022

2021
Universal Payment Channels: An Interoperability Platform for Digital Currencies.
CoRR, 2021

Deceptive Deletions for Protecting Withdrawn Posts on Social Media Platforms.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

All your Credentials are Belong to Us: On Insecure WPA2-Enterprise Configurations.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
MoneyMorph: Censorship Resistant Rendezvous using Permissionless Cryptocurrencies.
Proc. Priv. Enhancing Technol., 2020

A Tale of Two Trees: One Writes, and Other Reads.
Proc. Priv. Enhancing Technol., 2020

Towards a Two-Tier Hierarchical Infrastructure: An Offline Payment System for Central Bank Digital Currencies.
CoRR, 2020

"My Friend Wanted to Talk About It and I Didn't": Understanding Perceptions of Deletion Privacy in Social Platforms.
CoRR, 2020

Undercutting Bitcoin Is Not Profitable.
CoRR, 2020

Deceptive Deletions for Protecting Withdrawn Posts on Social Platforms.
CoRR, 2020

2019
Lethe: Conceal Content Deletion from Persistent Observers.
Proc. Priv. Enhancing Technol., 2019

A Tale of Two Trees: One Writes, and Other Reads. Optimized Oblivious Accesses to Large-Scale Blockchains.
CoRR, 2019

2018
R3C3: Cryptographically secure Censorship Resistant Rendezvous using Cryptocurrencies.
IACR Cryptol. ePrint Arch., 2018

2017
Forgetting the Forgotten with Letheia, Concealing Content Deletion from Persistent Observers.
CoRR, 2017

2013
Expert key selection impact on the MANETs' performance using probabilistic key management algorithm.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013


  Loading...