Rasool Jalili

According to our database1, Rasool Jalili authored at least 76 papers between 1994 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
New Constructions for Forward and Backward Private Symmetric Searchable Encryption.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
HB2DS: A behavior-driven high-bandwidth network mining system.
Journal of Systems and Software, 2017

Statistical Disclosure: Improved, Extended, and Resisted.
CoRR, 2017

Enforcing Access Control Policies over Data Stored on Untrusted Server.
Proceedings of the 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2017

2016
Uncertainty in Trust: A Risk-Aware Approach.
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2016

An efficient statistical zero-knowledge authentication protocol for smart cards.
Int. J. Comput. Math., 2016

Efficient Lattice-based Authenticated Encryption: A Practice-Oriented Provable Security Approach.
IACR Cryptology ePrint Archive, 2016

TIRIAC: A trust-driven risk-aware access control framework for Grid environments.
Future Generation Comp. Syst., 2016

Access control aware data retrieval for secret sharing based database outsourcing.
Distributed and Parallel Databases, 2016

2015
On Constrained Implementation of Lattice-Based Cryptographic Primitives and Schemes on Smart Cards.
ACM Trans. Embedded Comput. Syst., 2015

(t, k)-Hypergraph anonymization: an approach for secure data publishing.
Security and Communication Networks, 2015

Security and searchability in secret sharing-based data outsourcing.
Int. J. Inf. Sec., 2015

FORSAKES: A forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes.
Adv. in Math. of Comm., 2015

2014
FORSAKES: A Forward-Secure Authenticated Key Exchange Protocol Based on Symmetric Key-Evolving Schemes.
IACR Cryptology ePrint Archive, 2014

On Constrained Implementation of Lattice-based Cryptographic Primitives and Schemes on Smart Cards.
IACR Cryptology ePrint Archive, 2014

Implementation and Comparison of Lattice-based Identification Protocols on Smart Cards and Microcontrollers.
IACR Cryptology ePrint Archive, 2014

2013
An Algebraic Theory of Epistemic Processes.
J. UCS, 2013

Efficient Statistical Zero-Knowledge Authentication Protocols for Smart Cards Secure Against Active & Concurrent Quantum Attacks.
IACR Cryptology ePrint Archive, 2013

A Comprehensive Approach to Abusing Locality in Shared Web Hosting Servers.
Proceedings of the 12th IEEE International Conference on Trust, 2013

An efficient and provably-secure coercion-resistant e-voting protocol.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

A UC-Secure Authenticated Contributory Group Key Exchange Protocol Based on Discrete Logarithm.
Proceedings of the Information Systems Security - 9th International Conference, 2013

Alert Correlation Algorithms: A Survey and Taxonomy.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

2012
Two novel server-side attacks against log file in Shared Web Hosting servers.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

Correctness Verification in Database Outsourcing: A Trust-Based Fake Tuples Approach.
Proceedings of the Information Systems Security, 8th International Conference, 2012

AS5: A Secure Searchable Secret Sharing Scheme for Privacy Preserving Database Outsourcing.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012

k-Anonymity-Based Horizontal Fragmentation to Preserve Privacy in Data Outsourcing.
Proceedings of the Data and Applications Security and Privacy XXVI, 2012

Database as a Service: Towards a Unified Solution for Security Requirements.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012

Uncertainty in Probabilistic Trust Models.
Proceedings of the IEEE 26th International Conference on Advanced Information Networking and Applications, 2012

2011
Milder Definitions of Computational Approximability: The Case of Zero-Knowledge Protocols.
IACR Cryptology ePrint Archive, 2011

Access control enforcement on outsourced data ensuring privacy of access control policies.
Proceedings of the 2011 International Conference on High Performance Computing & Simulation, 2011

A Signature-Based Approach of Correctness Assurance in Data Outsourcing Scenarios.
Proceedings of the Information Systems Security - 7th International Conference, 2011

2010
GTHBAC: A Generalized Temporal History Based Access Control Model.
Telecommunication Systems, 2010

Multi-level authorisation model and framework for distributed semantic-aware environments.
IET Information Security, 2010

Vulnerability analysis of networks to detect multiphase attacks using the actor-based language Rebeca.
Computers & Electrical Engineering, 2010

2Ploc: Preserving Privacy in Location-based Services.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Specification of History Based Constraints for Access Control in Conceptual Level.
Proceedings of the Information Systems Security - 6th International Conference, 2010

2009
DRAPS: A Framework for Dynamic Reconfigurable Protocol Stacks.
J. Inf. Sci. Eng., 2009

Double Voting Problem of Some Anonymous E-Voting Schemes.
J. Inf. Sci. Eng., 2009

A semantic-based access control mechanism using semantic technologies.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009

AFMAP: Anonymous Forward-Secure Mutual Authentication Protocols for RFID Systems.
Proceedings of the Third International Conference on Emerging Security Information, 2009

A Temporal Description Logic Based Access Control Model for Expressing History Constrained Policies in Semantic Web.
Proceedings of the POLICY 2009, 2009

Handling Context in a Semantic-Based Access Control Framework.
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009

2008
Topological Analysis of Multi-phase Attacks using Expert Systems.
J. Inf. Sci. Eng., 2008

A Context-Aware Mandatory Access Control Model for Multilevel Security Environments.
Proceedings of the Computer Safety, 2008

A Logic for Multi-domain Authorization Considering Administrators.
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008

A Semantic aware Access Control model with real time constraints on history of accesses.
Proceedings of the International Multiconference on Computer Science and Information Technology, 2008

FLMAP: A fast lightweight mutual authentication protocol for RFID systems.
Proceedings of the 16th International Conference on Networks, 2008

Trust Inference in Web-Based Social Networks Using Resistive Networks.
Proceedings of the Third International Conference on Internet and Web Applications and Services, 2008

Protecting Location Privacy through a Graph-Based Location Representation and a Robust Obfuscation Technique.
Proceedings of the Information Security and Cryptology, 2008

A Formalism for Recongurability Analysis in Distributed Non-Blocking Components.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008

A Semantic-Aware Ontology-Based Trust Model for Pervasive Computing Environments.
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008

Self-reconfiguration in Highly Available Pervasive Computing Systems.
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008

PTO: A Trust Ontology for Pervasive Environments.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Vulnerability Take Grant (VTG): An efficient approach to analyze network vulnerabilities.
Computers & Security, 2007

Vulnerability Analysis in VGBPS Using Prolog.
Proceedings of the International Symposium on Fundamentals of Software Engineering, 2007

Design and Implementation of a Dynamic-Reconfigurable Architecture for Protocol Stack.
Proceedings of the International Symposium on Fundamentals of Software Engineering, 2007

Formalizing Compatibility and Substitutability in Communication Protocols Using I/O-Constraint Automata.
Proceedings of the International Symposium on Fundamentals of Software Engineering, 2007

Improved User Identity Confidentiality for UMTS Mobile Networks.
Proceedings of the Fourth European Conference on Universal Multiservice Networks (ECUMN 2007), 2007

A Dynamic-Reconfigurable Architecture for Protocol Stacks of Networked Systems.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007

Conflict Detection and Resolution in Context-Aware Authorization.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

Trust-Based User-Role Assignment in Role-Based Access Control.
Proceedings of the 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 2007

Enhancing Role-Based Access Control Model through Fuzzy Relations.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

Separation of Duty in Role-Based Access Control Model through Fuzzy Relations.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

2006
On Validity Assurance of Dynamic Reconfiguration for Component-based Programs.
Electr. Notes Theor. Comput. Sci., 2006

RT-UNNID: A practical solution to real-time network-based intrusion detection using unsupervised neural networks.
Computers & Security, 2006

Security Enhancement for a Low Computation Cost User Authentication Scheme.
Proceedings of the SECRYPT 2006, 2006

Using Description Logics for Network Vulnerability Analysis.
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006

Context-Aware Provisional Access Control.
Proceedings of the Information Systems Security, Second International Conference, 2006

An Access Control Framework for Pervasive Computing Environments.
Proceedings of the 2006 International Conference on Pervasive Systems & Computing, 2006

An Architecture for a Context-aware Service Broker in Ubiquitous Computing Environments.
Proceedings of the 2006 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2006), 2006

2005
Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks.
Proceedings of the Information Security Practice and Experience, 2005

Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG).
Proceedings of the Information and Communications Security, 7th International Conference, 2005

2002
Specification and Verification of Security Policies in Firewalls.
Proceedings of the EurAsia-ICT 2002: Information and Communication Technology, 2002

1995
Using directed graphs to describe entity dependency in stable distributed persistent stores.
Proceedings of the 28th Annual Hawaii International Conference on System Sciences (HICSS-28), 1995

1994
Operating system support for object dependencies in persistent object stores.
Proceedings of WORDS '94. The First Workshop on Object-Oriented Real-Time Dependable Systems, 1994

Hardware Support for Stability in a Persistent Architecture.
Proceedings of the Persistent Object Systems, 1994


  Loading...