Reihaneh Safavi-Naini

Affiliations:
  • University of Calgary, Canada
  • University of Wollongong, Australia (former)


According to our database1, Reihaneh Safavi-Naini authored at least 362 papers between 1979 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Privacy-preserving FairSwap: Fairness and privacy interplay.
Proc. Priv. Enhancing Technol., 2022

2021
Group Encryption: Full Dynamicity, Message Filtering and Code-Based Instantiation.
IACR Cryptol. ePrint Arch., 2021

Smart Contracts for Incentivized Outsourcing of Computation.
IACR Cryptol. ePrint Arch., 2021

An Intermediate Secret-Guessing Attack on Hash-Based Signatures.
IACR Cryptol. ePrint Arch., 2021

Scalable Behavioral Authentication.
IEEE Access, 2021

Model Inversion for Impersonation in Behavioral Authentication Systems.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

More than a Fair Share: Network Data Remanence Attacks against Secret Sharing-based Schemes.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Hybrid Encryption in Correlated Randomness Model.
Proceedings of the IEEE Information Theory Workshop, 2021

Secret Key Capacity of Wiretapped Polytree-PIN.
Proceedings of the IEEE Information Theory Workshop, 2021

Information-theoretic Key Encapsulation and its Application to Secure Communication.
Proceedings of the IEEE International Symposium on Information Theory, 2021

Second-Order Asymptotics for One-way Secret Key Agreement.
Proceedings of the IEEE International Symposium on Information Theory, 2021

Privacy-Preserving Resource Sharing Using Permissioned Blockchains - (The Case of Smart Neighbourhood).
Proceedings of the Financial Cryptography and Data Security. FC 2021 International Workshops, 2021

Privacy-enhanced OptiSwap.
Proceedings of the CCSW@CCS '21: Proceedings of the 2021 on Cloud Computing Security Workshop, 2021

Password Protected Secret Sharing from Lattices.
Proceedings of the Applied Cryptography and Network Security, 2021

Leakage Resilient Cheating Detectable Secret Sharing Schemes.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021

2020
Privacy-preserving verifiable delegation of polynomial and matrix functions.
J. Math. Cryptol., 2020

Protecting data privacy in publicly verifiable delegation of matrix and polynomial functions.
Des. Codes Cryptogr., 2020

Traceable Policy-Based Signatures and Instantiation from Lattices.
CoRR, 2020

Fuzzy Vault for Behavioral Authentication System.
Proceedings of the ICT Systems Security and Privacy Protection, 2020

A Capacity-achieving One-way Key Agreement with Improved Finite Blocklength Analysis.
Proceedings of the International Symposium on Information Theory and Its Applications, 2020

A Channel Model of Transceivers for Multiterminal Secret Key Agreement.
Proceedings of the International Symposium on Information Theory and Its Applications, 2020

Leakage-Resilient Secret Sharing in Non-Compartmentalized Models.
Proceedings of the 1st Conference on Information-Theoretic Cryptography, 2020

A Blockchain Based Approach to Resource Sharing in Smart Neighbourhoods.
Proceedings of the Financial Cryptography and Data Security, 2020

2019
A Scalable Post-quantum Hash-Based Group Signature.
IACR Cryptol. ePrint Arch., 2019

K2SN-MSS: An Efficient Post-Quantum Signature (Full Version).
IACR Cryptol. ePrint Arch., 2019

A One-Round Key Agreement Protocol with Information-Theoretic Security.
CoRR, 2019

Non-Malleable Secret Sharing against Affine Tampering.
CoRR, 2019

Outsourcing scheme of ABE encryption secure against malicious adversary.
Comput. Secur., 2019

A Modular Semantically Secure Wiretap Code with Shared Key for Weakly Symmetric Channels.
Proceedings of the 2019 IEEE Information Theory Workshop, 2019

Non-malleable Coding for Arbitrary Varying Channels.
Proceedings of the 2019 IEEE Information Theory Workshop, 2019

Wiretap Secret Key Capacity of Tree-PIN.
Proceedings of the IEEE International Symposium on Information Theory, 2019

Non-Malleable Codes against Active Physical Layer Adversary.
Proceedings of the IEEE International Symposium on Information Theory, 2019

Secure Logging with Security Against Adaptive Crash Attack.
Proceedings of the Foundations and Practice of Security - 12th International Symposium, 2019

Game-Theoretic Analysis of an Incentivized Verifiable Computation System.
Proceedings of the Financial Cryptography and Data Security, 2019

K2SN-MSS: An Efficient Post-Quantum Signature.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

Verifiable Computation using Smart Contracts.
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, 2019

2018
Path Hopping: An MTD Strategy for Long-Term Quantum-Safe Communication.
Secur. Commun. Networks, 2018

Secret Sharing with Binary Shares.
IACR Cryptol. ePrint Arch., 2018

In-region Authentication.
IACR Cryptol. ePrint Arch., 2018

Anonymous Distance-Bounding Identification.
IACR Cryptol. ePrint Arch., 2018

Directional Distance-Bounding Identification Protocols.
IACR Cryptol. ePrint Arch., 2018

Towards a Resilient Smart Home.
Proceedings of the 2018 Workshop on IoT Security and Privacy, 2018

HCAP: A History-Based Capability System for IoT Devices.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018

Secure Key Agreement over Partially Corrupted Channels.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

A New Look at the Refund Mechanism in the Bitcoin Payment Protocol.
Proceedings of the Financial Cryptography and Data Security, 2018

On De-anonymization of Single Tweet Messages.
Proceedings of the Fourth ACM International Workshop on Security and Privacy Analytics, 2018

Post-quantum Security using Channel Noise.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

A Discussion on Security Education in Academia.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

New Attacks and Secure Design for Anonymous Distance-Bounding.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
A Virtual Wiretap Channel for Secure MessageTransmission.
IACR Cryptol. ePrint Arch., 2017

Non-Malleable Codes with Leakage and Applications to Secure Communication.
CoRR, 2017

Privacy-Enhanced Profile-Based Authentication Using Sparse Random Projection.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

A Post-Quantum One Time Signature Using Bloom Filter.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

Outsourcing of Verifiable Attribute-Based Keyword Search.
Proceedings of the Secure IT Systems, 2017

Interactive message transmission over adversarial wiretap channel II.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Secret key agreement using a virtual wiretap channel.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Directional Distance-Bounding Identification.
Proceedings of the Information Systems Security and Privacy, 2017

Distance-bounding Identification.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Economically Optimal Variable Tag Length Message Authentication.
Proceedings of the Financial Cryptography and Data Security, 2017

Decompression Quines and Anti-Viruses.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

Path Hopping: an MTD Strategy for Quantum-safe Communication.
Proceedings of the 2017 Workshop on Moving Target Defense, 2017

A Secure Event Logging System for Smart Homes.
Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, 2017

2016
A Model for Adversarial Wiretap Channels.
IEEE Trans. Inf. Theory, 2016

Two-level security for message sequences.
Secur. Commun. Networks, 2016

Automated Proofs of Block Cipher Modes of Operation.
J. Autom. Reason., 2016

Information-theoretically Secure Key Agreement over Partially Corrupted Channels.
CoRR, 2016

Special issue on recent advances in physical-layer security.
Comput. Networks, 2016

A Virtual Wiretap Channel for Secure Message Transmission.
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016

Detecting Algebraic Manipulation in Leaky Storage Systems.
Proceedings of the Information Theoretic Security - 9th International Conference, 2016

Codes for Detection of Limited View Algebraic Tampering.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

POSTER: A Behavioural Authentication System for Mobile Users.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

POSTER: Privacy Enhanced Secure Location Verification.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Privacy and Utility of Inference Control Mechanisms for Social Computing Applications.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Privacy preserving system for integrated broadcast-broadband services using attribute-based encryption.
IEEE Trans. Consumer Electron., 2015

A Model for Adversarial Wiretap Channels and its Applications.
J. Inf. Process., 2015

Reconciling User Privacy and Implicit Authentication for Mobile Devices.
IACR Cryptol. ePrint Arch., 2015

Batch verifiable computation of outsourced functions.
Des. Codes Cryptogr., 2015

Secure Obfuscation of Authoring Style.
Proceedings of the Information Security Theory and Practice, 2015

Almost Optimum Secret Sharing with Cheating Detection.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2015

How to Prevent to Delegate Authentication.
Proceedings of the Security and Privacy in Communication Networks, 2015

An Efficient Post-Quantum One-Time Signature Scheme.
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015

Limited View Adversary Codes: Bounds, Constructions and Applications.
Proceedings of the Information Theoretic Security - 8th International Conference, 2015

User Authentication Using Human Cognitive Abilities.
Proceedings of the Financial Cryptography and Data Security, 2015

Batch Verifiable Computation of Polynomials on Outsourced Data.
Proceedings of the Computer Security - ESORICS 2015, 2015

Adversarial wiretap channel with public discussion.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Performance Analysis of Linux RNG in Virtualized Environments.
Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop, 2015

Erasure adversarial wiretap channels.
Proceedings of the 53rd Annual Allerton Conference on Communication, 2015

2014
A Framework for Expressing and Enforcing Purpose-Based Privacy Policies.
ACM Trans. Inf. Syst. Secur., 2014

Distance Lower Bounding.
IACR Cryptol. ePrint Arch., 2014

Privacy-Preserving Implicit Authentication.
IACR Cryptol. ePrint Arch., 2014

Compact Accumulator using Lattices.
IACR Cryptol. ePrint Arch., 2014

Human Assisted Randomness Generation Using Video Games.
IACR Cryptol. ePrint Arch., 2014

Paillier-based publicly verifiable (non-interactive) secret sharing.
Des. Codes Cryptogr., 2014

Efficient Codes for Adversarial Wiretap Channels.
CoRR, 2014

Multipath Private Communication: An Information Theoretic Approach.
CoRR, 2014

An efficient code for Adversarial Wiretap channel.
Proceedings of the 2014 IEEE Information Theory Workshop, 2014

Incentivize cooperative sensing in distributed cognitive radio networks with reputation-based pricing.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

MOVTCHA: A CAPTCHA Based on Human Cognitive and Behavioral Features Analysis.
Proceedings of the Information and Communications Security - 16th International Conference, 2014

Privacy-Preserving Distance-Bounding Proof-of-Knowledge.
Proceedings of the Information and Communications Security - 16th International Conference, 2014

Verifiable Delegation of Computations with Storage-Verification Trade-off.
Proceedings of the Computer Security - ESORICS 2014, 2014

Verifiable local computation on distributed data.
Proceedings of the Second International Workshop on Security in Cloud Computing, 2014

Generalized homomorphic MACs with efficient verification.
Proceedings of the ASIAPKC'14, 2014

CCSW 2014: Sixth ACM Cloud Computing Security Workshop.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Verifiable Multi-server Private Information Retrieval.
Proceedings of the Applied Cryptography and Network Security, 2014

Private Message Transmission Using Disjoint Paths.
Proceedings of the Applied Cryptography and Network Security, 2014

2013
Unconditionally-secure ideal robust secret sharing schemes for threshold and multilevel access structure.
J. Math. Cryptol., 2013

Message transmission and key establishment: General equality for weak and strong capacities.
J. Inf. Secur. Appl., 2013

Scalable fragile watermarking for image authentication.
IET Inf. Secur., 2013

Detection of Algebraic Manipulation in the Presence of Leakage.
IACR Cryptol. ePrint Arch., 2013

Secure Distance Bounding Verification using Physical-Channel Properties
CoRR, 2013

Privately Outsourcing Polynomial Evaluations and Matrix Multiplications using Multilinear Maps.
CoRR, 2013

A Model for Adversarial Wiretap Channel.
CoRR, 2013

Codes for limited view adversarial channels.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

On the Share Efficiency of Robust Secret Sharing and Secret Sharing with Cheating Detection.
Proceedings of the Progress in Cryptology - INDOCRYPT 2013, 2013

ReDiSen: Reputation-based secure cooperative sensing in distributed cognitive radio networks.
Proceedings of IEEE International Conference on Communications, 2013

A True Random Generator Using Human Gameplay.
Proceedings of the Decision and Game Theory for Security - 4th International Conference, 2013

Unconditionally-Secure Robust Secret Sharing with Minimum Share Size.
Proceedings of the Financial Cryptography and Data Security, 2013

Efficient codes for Limited View adversarial channels.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

RAFR: remote assessment of file redundancy.
Proceedings of the 2013 International Workshop on Security in Cloud Computing, 2013

Private Outsourcing of Polynomial Evaluation and Matrix Multiplication Using Multilinear Maps.
Proceedings of the Cryptology and Network Security - 12th International Conference, 2013

2012
Attribute-based encryption without key cloning.
Int. J. Appl. Cryptogr., 2012

Private Fingerprint Matching.
IACR Cryptol. ePrint Arch., 2012

A General Construction for 1-round δ-RMT and (0, δ)-SMT.
IACR Cryptol. ePrint Arch., 2012

Short Pairing-Efficient Threshold-Attribute-Based Signature.
Proceedings of the Pairing-Based Cryptography - Pairing 2012, 2012

Guessing Secrecy.
Proceedings of the Information Theoretic Security - 6th International Conference, 2012

Proofs of Retrievability via Fountain Code.
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012

Message Transmission and Key Establishment: Conditions for Equality of Weak and Strong Capacities.
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012

Privacy Consensus in Anonymization Systems via Game Theory.
Proceedings of the Data and Applications Security and Privacy XXVI, 2012

An information theoretic privacy and utility measure for data sanitization mechanisms.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

LoSt: location based storage.
Proceedings of the 2012 ACM Workshop on Cloud computing security, 2012

An information theoretic framework for web inference detection.
Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, 2012

Bounds and Constructions for 1-Round (0, δ)-Secure Message Transmission against Generalized Adversary.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012

2011
On Optimal Secure Message Transmission by Public Discussion.
IEEE Trans. Inf. Theory, 2011

Practical RFID ownership transfer scheme.
J. Comput. Secur., 2011

Unconditionally Secure Conference Key Distribution: Security Notions, Bounds and Constructions.
Int. J. Found. Comput. Sci., 2011

Common Randomness and Secret Key Capacities of Two-way Channels.
IACR Cryptol. ePrint Arch., 2011

Secret Keys from Channel Noise.
IACR Cryptol. ePrint Arch., 2011

On "the Power of Verification Queries" in Unconditionally Secure Message Authentication.
Discret. Math. Algorithms Appl., 2011

Breaking and Repairing an Approximate Message Authentication Scheme.
Discret. Math. Algorithms Appl., 2011

Fuzzy Universal Hashing and Approximate Authentication.
Discret. Math. Algorithms Appl., 2011

Exploiting Routing Tree Construction in CTP.
Proceedings of the Information Security Applications - 12th International Workshop, 2011

Automated Verification of Block Cipher Modes of Operation, an Improved Method.
Proceedings of the Foundations and Practice of Security, 2011

Secret Key Establishment over Noisy Channels.
Proceedings of the Foundations and Practice of Security, 2011

Optimal One Round Almost Perfectly Secure Message Transmission (Short Paper).
Proceedings of the Financial Cryptography and Data Security, 2011

Secure Localization Using Dynamic Verifiers.
Proceedings of the Computer Security - ESORICS 2011, 2011

A rights management approach to protection of privacy in a cloud of electronic health records.
Proceedings of the 11th ACM Workshop on Digital Rights Management, 2011

Towards defining semantic foundations for purpose-based privacy policies.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

Optimal message transmission protocols with flexible parameters.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
Digital Rights Management.
Proceedings of the Handbook of Financial Cryptography and Security., 2010

Secret Key Agreement over a Pair of Independent Broadcast Channels
CoRR, 2010

Towards securing mintroute in wireless sensor networks.
Proceedings of the 11th IEEE International Symposium on a World of Wireless, 2010

Securing Medical Research Data with a Rights Management System.
Proceedings of the 1st USENIX Workshop on Health Security and Privacy, 2010

On Applicability of Random Graphs for Modeling Random Key Predistribution for Wireless Sensor Networks.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2010

Threshold Attribute-Based Signcryption.
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010

A Rights Management Approach to Securing Data Distribution in Coalitions.
Proceedings of the Fourth International Conference on Network and System Security, 2010

New results on Secret Key Establishment over a pair of broadcast channels.
Proceedings of the International Symposium on Information Theory and its Applications, 2010

Secret key establishment over a pair of independent broadcast channels.
Proceedings of the International Symposium on Information Theory and its Applications, 2010

A practice-oriented framework for measuring privacy and utility in data sanitization systems.
Proceedings of the 2010 EDBT/ICDT Workshops, Lausanne, Switzerland, March 22-26, 2010, 2010

Using digital rights management for securing data in a medical research environment.
Proceedings of the 10th ACM Workshop on Digital Rights Management, 2010

Securing wireless sensor networks against large-scale node capture attacks.
Proceedings of the 5th ACM Symposium on Information, 2010

Privacy preserving EHR system using attribute-based infrastructure.
Proceedings of the 2nd ACM Cloud Computing Security Workshop, 2010

Simple and Communication Complexity Efficient Almost Secure and Perfectly Secure Message Transmission Schemes.
Proceedings of the Progress in Cryptology, 2010

2009
How to Compare Image Watermarking Algorithms.
Trans. Data Hiding Multim. Secur., 2009

Generic constructions for universal designated-verifier signatures and identitybased signatures from standard signatures.
IET Inf. Secur., 2009

Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems.
IACR Cryptol. ePrint Arch., 2009

Enforcing purpose of use via workflows.
Proceedings of the 2009 ACM Workshop on Privacy in the Electronic Society, 2009

Simulation modeling of secure wireless sensor networks.
Proceedings of the 4th International Conference on Performance Evaluation Methodologies and Tools, 2009

A Digital Rights Management Model for Healthcare.
Proceedings of the POLICY 2009, 2009

Ranking Attack Graphs with Graph Neural Networks.
Proceedings of the Information Security Practice and Experience, 2009

An Attack on the Privacy of Sanitized Data that Fuses the Outputs of Multiple Data Miners.
Proceedings of the ICDM Workshops 2009, 2009

New Privacy Results on Synchronized RFID Authentication Protocols against Tag Tracing.
Proceedings of the Computer Security, 2009

Corruption-Localizing Hashing.
Proceedings of the Computer Security, 2009

On the operational semantics of rights expression languages.
Proceedings of the 9th ACM Workshop on Digital Rights Management, 2009

Unconditionally Secure Approximate Message Authentication.
Proceedings of the Coding and Cryptology, Second International Workshop, 2009

Automated Security Proof for Symmetric Encryption Modes.
Proceedings of the Advances in Computer Science, 2009

Distributed Detection of Wormhole Attacks in Wireless Sensor Networks.
Proceedings of the Ad Hoc Networks, First International Conference, 2009

2008
Information Theoretic Bounds on Authentication Systems in Query Model.
IEEE Trans. Inf. Theory, 2008

New Results on Unconditionally Secure Multireceiver Manual Authentication.
IACR Cryptol. ePrint Arch., 2008

Attribute-Based Encryption with Key Cloning Protection.
IACR Cryptol. ePrint Arch., 2008

Secure Random Key Pre-Distribution Against Semi-Honest Adversaries.
IACR Cryptol. ePrint Arch., 2008

Implementing Trusted Terminals with a and SITDRM.
Electron. Notes Theor. Comput. Sci., 2008

Location constraints in digital rights management.
Comput. Commun., 2008

Utility of Knowledge Extracted from Unsanitized Data when Applied to Sanitized Data.
Proceedings of the Sixth Annual Conference on Privacy, Security and Trust, 2008

An Efficient Deniable Key Exchange Protocol (Extended Abstract).
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008

RFID Privacy Models Revisited.
Proceedings of the Computer Security, 2008

Non-interactive conference key distribution and its applications.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

2007
Classification of the Deletion Correcting Capabilities of Reed-Solomon Codes of Dimension 2 Over Prime Fields.
IEEE Trans. Inf. Theory, 2007

Comparing and debugging firewall rule tables.
IET Inf. Secur., 2007

Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures.
IACR Cryptol. ePrint Arch., 2007

Noninteractive Manual Channel Message Authentication Based On eTCR Hash Functions.
IACR Cryptol. ePrint Arch., 2007

Construction of deletion correcting codes using generalized Reed-Solomon codes and their subcodes.
Des. Codes Cryptogr., 2007

Enforcing P3P Policies Using a Digital Rights Management System.
Proceedings of the Privacy Enhancing Technologies, 7th International Symposium, 2007

Transport Layer Identification of Skype Traffic.
Proceedings of the Information Networking. Towards Ubiquitous Networking and Services, 2007

A Maximum Likelihood Watermark Decoding Scheme.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

New Results on Unconditionally Secure Multi-receiver Manual Authentication.
Proceedings of the Information Theoretic Security - Second International Conference, 2007

Key Establishment in Heterogeneous Self-organized Networks.
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2007

Using SITDRM for privacy rights management.
Proceedings of the 1st ACM Symposium on Computer Human Interaction for Management of Information Technology, 2007

Combinatorial characterizations of authentication codes in verification oracle model.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

Concurrently-secure credential ownership proofs.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

Unconditionally secure ring authentication.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

Achieving Mobility and Anonymity in IP-Based Networks.
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007

Design Principles for Low Latency Anonymous Network Systems Secure against Timing Attacks.
Proceedings of the ACSW Frontiers 2007. Proceedings of the Fifth Australasian Symposium on Grid Computing and e-Research (AusGrid 2007), the Fifth Australasian Information Security Workshop (Privacy Enhancing Technologies) (AISW 2007), and the Australasian Workshop on Health Knowledge Management and Discovery (HKMD 2007). Proceedings, Ballarat, Victoria, Australia, January 30, 2007

An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007

Non-interactive Manual Channel Message Authentication Based on eTCR Hash Functions.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

2006
Recovering DC Coefficients in Block-Based DCT.
IEEE Trans. Image Process., 2006

Recursive constructions of secure codes and hash families using <i>difference function families</i>.
J. Comb. Theory, Ser. A, 2006

Verifiable shuffles: a formal model and a Paillier-based three-round construction with provable security.
Int. J. Inf. Sec., 2006

Resilient Lkh: Secure Multicast Key Distribution Schemes.
Int. J. Found. Comput. Sci., 2006

An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families.
IACR Cryptol. ePrint Arch., 2006

Secret sharing schemes with partial broadcast channels.
Des. Codes Cryptogr., 2006

Distributed Management of OMA DRM Domains.
Proceedings of the Information Security Applications, 7th International Workshop, 2006

Protecting Privacy with the MPEG-21 IPMP Framework.
Proceedings of the Privacy Enhancing Technologies, 6th International Workshop, 2006

Optimal Image Watermark Decoding.
Proceedings of the Advances in Multimedia Information Processing, 2006

Multi-party Concurrent Signatures.
Proceedings of the Information Security, 9th International Conference, 2006

On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search.
Proceedings of the Information Security, 9th International Conference, 2006

A Pixel-Based Robust Imagewatermarking System.
Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, 2006

Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability.
Proceedings of the Automata, Languages and Programming, 33rd International Colloquium, 2006

Self-organised group key management for ad hoc networks.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

X<sup>2BT</sup> Trusted Reputation System: A Robust Mechanism for P2P Networks.
Proceedings of the Cryptology and Network Security, 5th International Conference, 2006

Detecting Policy Violations through Traffic Analysis.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2005
A Provably Secure and Efficient Verifiable Shuffle based on a Variant of the Paillier Cryptosystem.
J. Univers. Comput. Sci., 2005

Explicit Construction of Secure Frameproof Codes.
IACR Cryptol. ePrint Arch., 2005

Recursive Constructions of Secure Codes and Hash Families Using Difference Function Families.
IACR Cryptol. ePrint Arch., 2005

Dynamic k-Times Anonymous Authentication.
IACR Cryptol. ePrint Arch., 2005

Public Key Encryption with Keyword Search Revisited.
IACR Cryptol. ePrint Arch., 2005

MRD Hashing.
Des. Codes Cryptogr., 2005

Distributing the Encryption and Decryption of a Block Cipher.
Des. Codes Cryptogr., 2005

Attack on Han et al.'s ID-based confirmer (undeniable) signature at ACM-EC'03.
Appl. Math. Comput., 2005

A License Transfer System for Supporting Content Portability in Digital Rights Management.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption.
Proceedings of the Public Key Cryptography, 2005

Resolution and quality scalable spread spectrum image watermarking.
Proceedings of the 7th workshop on Multimedia & Security, 2005

Server-Aided RSA Key Generation Against Collusion Attack.
Proceedings of the Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, 2005

Certificateless Public Key Encryption Without Pairing.
Proceedings of the Information Security, 8th International Conference, 2005

Token-Controlled Public Key Encryption.
Proceedings of the Information Security Practice and Experience, 2005

Bounds on authentication systems in query model.
Proceedings of the IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005

Radio Networks with Reliable Communication.
Proceedings of the Computing and Combinatorics, 11th Annual International Conference, 2005

On Securing RTP-Based Streaming Content with Firewalls.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005

Universal Designated Verifier Signature Proof (or How to Efficiently Prove Knowledge of a Signature).
Proceedings of the Advances in Cryptology, 2005

Cancelable Key-Based Fingerprint Templates.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

2004
On the Maximal Codes of Length 3 with the 2-Identifiable Parent Property.
SIAM J. Discret. Math., 2004

A secure and flexible authentication system for digital images.
Multim. Syst., 2004

Efficient and Provably Secure Trapdoor-free Group Signature Schemes from Bilinear Pairings.
IACR Cryptol. ePrint Arch., 2004

Secure Multimedia Authoring with Dishonest Collaborators.
EURASIP J. Adv. Signal Process., 2004

An Efficient Signature Scheme from Bilinear Pairings and Its Applications.
Proceedings of the Public Key Cryptography, 2004

General Group Authentication Codes and Their Relation to "Unconditionally-Secure Signatures".
Proceedings of the Public Key Cryptography, 2004

Weighted Segmented Digital Watermarking.
Proceedings of the Digital Watermarking, Third InternationalWorkshop, 2004

Symmetric Authentication Codes with Secrecy and Unconditionally Secure Authenticated Encryption.
Proceedings of the Progress in Cryptology, 2004

An MPEG tolerant authentication system for video data.
Proceedings of the 2004 IEEE International Conference on Multimedia and Expo, 2004

Import/export in digital rights management.
Proceedings of the 2004 ACM Workshop on Digital Rights Management 2004, Washington, 2004

Tracing traitors: a selective survey.
Proceedings of the 2004 ACM Workshop on Digital Rights Management 2004, Washington, 2004

An Efficient Verifiable Shuffle with Perfect Zero-knowledge Proof System.
Proceedings of the Cryptographic Algorithms and their Uses, 2004

Verifiable Shuffles: A Formal Model and a Paillier-Based Efficient Construction with Provable Security.
Proceedings of the Applied Cryptography and Network Security, 2004

X<sup>2</sup>Rep: Enhanced Trust Semantics for the XRep Protocol.
Proceedings of the Applied Cryptography and Network Security, 2004

Linear Code Implies Public-Key Traitor Tracing with Revocation.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

Unconditionally Secure Encryption Under Strong Attacks.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

2003
Linear authentication codes: bounds and constructions.
IEEE Trans. Inf. Theory, 2003

Sequential traitor tracing.
IEEE Trans. Inf. Theory, 2003

ID-Based Chameleon Hashes from Bilinear Pairings.
IACR Cryptol. ePrint Arch., 2003

New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairing.
IACR Cryptol. ePrint Arch., 2003

A Note on the Exposure Property of SBIBD.
Electron. Notes Discret. Math., 2003

Breaking and Mending Resilient Mix-Nets.
Proceedings of the Privacy Enhancing Technologies, Third International Workshop, 2003

Performance Measurement of Watermark Embedding Patterns.
Proceedings of the Digital Watermarking, Second International Workshop, 2003

Coefficient Selection Methods for Scalable Spread Spectrum Watermarking.
Proceedings of the Digital Watermarking, Second International Workshop, 2003

Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings.
Proceedings of the Progress in Cryptology, 2003

Securing mobile IP enabled laptop.
Proceedings of the 11th IEEE International Conference on Networks, 2003

Web filtering using text classification.
Proceedings of the 11th IEEE International Conference on Networks, 2003

Compression Tolerant DCT Based Image Hash.
Proceedings of the 23rd International Conference on Distributed Computing Systems Workshops (ICDCS 2003 Workshops), 2003

New traitor tracing schemes using bilinear map.
Proceedings of the 2003 ACM workshop on Digital rights management 2003, Washington, 2003

Digital Rights Management for Content Distribution.
Proceedings of the ACSW Frontiers 2003, 2003 ACSW Workshops, 2003

2002
Bounds and Constructions for Threshold Shared Generation of Authenticators.
Int. J. Comput. Math., 2002

A Group Key Distribution Scheme with Decentralised User Join.
Proceedings of the Security in Communication Networks, Third International Conference, 2002

On (In)security of "A Robust Image Authentication Method".
Proceedings of the Advances in Multimedia Information Processing, 2002

An Algorithm for Data Hiding Using Median Cut Segmentation.
Proceedings of the Advances in Multimedia Information Processing, 2002

A 2-Secure Code with Efficient Tracing Algorithm.
Proceedings of the Progress in Cryptology, 2002

Secure authorization, access control and data integrity in Bluetooth.
Proceedings of the Proceedings 10th IEEE International Conference on Networks: Towards Network Superiority, 2002

An Efficient Fail-Stop Signature Scheme Based on Factorization.
Proceedings of the Information Security and Cryptology, 2002

Threshold MACs.
Proceedings of the Information Security and Cryptology, 2002

A Dynamic Group Key Distribution Scheme with Flexible User Join.
Proceedings of the Information Security and Cryptology, 2002

Compression performance of JPEG encryption scheme.
Proceedings of the 14th International Conference on Digital Signal Processing, 2002

Redistribution of Mechanical Secret Shares.
Proceedings of the Financial Cryptography, 6th International Conference, 2002

Optimal Parallel I/O for Range Queries through Replication.
Proceedings of the Database and Expert Systems Applications, 13th International Conference, 2002

Traitor Tracing for Shortened and Corrupted Fingerprints.
Proceedings of the Security and Privacy in Digital Rights Management, 2002

A Secure Re-keying Scheme with Key Recovery Property.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002

2001
New results on frame-proof codes and traceability schemes.
IEEE Trans. Inf. Theory, 2001

Broadcast authentication for group communication.
Theor. Comput. Sci., 2001

An Efficient Construction for Fail-Stop Signature for Long Messages.
J. Inf. Sci. Eng., 2001

Broadcast anti-jamming systems.
Comput. Networks, 2001

On multiple watermarking.
Proceedings of the 4th workshop on Multimedia & Security: New Challenges, 2001

Towards securing 3G mobile phones.
Proceedings of the Proceedings 9th IEEE International Conference on Networks, 2001

Efficient Revocation Schemes for Secure Multicast.
Proceedings of the Information Security and Cryptology, 2001

Collusion Secure q-ary Fingerprinting for Perceptual Content.
Proceedings of the Security and Privacy in Digital Rights Management, 2001

How to Construct Fail-Stop Confirmer Signature Schemes.
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001

On Classifying Conference Key Distribution Protocols.
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001

2000
A New and Efficient Fail-stop Signature Scheme.
Comput. J., 2000

Threshold Fail-Stop Signature Schemes Based on Discrete Logarithm and Factorization.
Proceedings of the Information Security, Third International Workshop, 2000

Region-Based Watermarking by Distribution Adjustment.
Proceedings of the Information Security, Third International Workshop, 2000

Anonymous Traceability Schemes with Unconditional Security.
Proceedings of the Progress in Cryptology, 2000

Fail-Stop Signature for Long Messages.
Proceedings of the Progress in Cryptology, 2000

A Combinatorial Approach to Asymmetric Traitor Tracing.
Proceedings of the Computing and Combinatorics, 6th Annual International Conference, 2000

New constructions for multicast re-keying schemes using perfect hash families.
Proceedings of the CCS 2000, 2000

Key Management for Secure Multicast with Dynamic Controller.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

1999
Multireceiver Authentication Codes: Models, Bounds, Constructions, and Extensions.
Inf. Comput., 1999

Bounds and Techniques for Efficient Redistribution of Secret Shares to New Access Structures.
Comput. J., 1999

Changing Thresholds in the Absence of Secure Channels.
Aust. Comput. J., 1999

Region-Based Watermarking for Images.
Proceedings of the Information Security, Second International Workshop, 1999

RSA-Based Fail-Stop Signature Schemes.
Proceedings of the 1999 International Conference on Parallel Processing Workshops, 1999

Broadcast anti-jamming systems.
Proceedings of the IEEE International Conference on Networks 1999, 1999

A New Approach to Robust Threshold RSA Signature Schemes.
Proceedings of the Information Security and Cryptology, 1999

Attack on Liu/Farrell/Boyd Arithmetic Coding Encryption Scheme.
Proceedings of the Secure Information Networks: Communications and Multimedia Security, 1999

A<sup>3</sup>-Codes under Collusion Attacks.
Proceedings of the Advances in Cryptology, 1999

Fail-Stop Threshold Signature Schemes Based on Elliptic Curves.
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999

Characterization of Optimal Authentication Codes with Arbitration.
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999

Crypto Topics and Applications II.
Proceedings of the Algorithms and Theory of Computation Handbook., 1999

Crypto Topics and Applications I.
Proceedings of the Algorithms and Theory of Computation Handbook., 1999

1998
Three Systems for Threshold Generation of Authenticators.
Des. Codes Cryptogr., 1998

On the Security of Girault's Identification Scheme.
Proceedings of the Public Key Cryptography, 1998

MRD Hashing.
Proceedings of the Fast Software Encryption, 5th International Workshop, 1998

New Results on Multi-Receiver Authentication Codes.
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998

Bounds and Constructions for Multireceiver Authentication Codes.
Proceedings of the Advances in Cryptology, 1998

Bounds and Constructions for A<sup>3</sup>-code with Multi-senders.
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998

Efficient Identity-Based Conference Key Distribution Protocols.
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998

On Construction of Cumulative Secret Sharing Schemes.
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998

Secret Sharing in Multilevel and Compartmented Groups.
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998

1997
Using Cryptographic Hash Functions for Discretionary Access Control in Object-Oriented Databases.
J. Univers. Comput. Sci., 1997

On the Weakness of Gong's Collisionful Hash Functions.
J. Univers. Comput. Sci., 1997

A Multi-Level View Model for Secure Object-Oriented Databases.
Data Knowl. Eng., 1997

A New Identity-Based Key Exchange Protocol Minimizing Computation and Communication.
Proceedings of the Information Security, First International Workshop, 1997

Multisender authentication systems with unconditional security.
Proceedings of the Information and Communication Security, First International Conference, 1997

Remarks on the multiple assignment secret sharing scheme.
Proceedings of the Information and Communication Security, First International Conference, 1997

Secret sharing in hierarchical groups.
Proceedings of the Information and Communication Security, First International Conference, 1997

Democratic Key Escrow Scheme.
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997

A Message Authentication Code Based on Latin Squares.
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997

1996
Authentication Codes in Plaintext and Chosen-Content Attacks.
Des. Codes Cryptogr., 1996

Near-perfect protection and key strategies in authentication codes under spoofing attack of order r.
Ars Comb., 1996

Computer Intrusion Detection and Incomplete Information.
Proceedings of the Industrial and Engineering Applications of Artificial Intelligence and Expert Systems, 1996

Three Systems for Shared Generation of Authenticators.
Proceedings of the Computing and Combinatorics, Second Annual International Conference, 1996

Case-Based Reasoning for Intrusion Detection.
Proceedings of the 12th Annual Computer Security Applications Conference (ACSAC 1996), 1996

Cryptography based on transcendental numbers.
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996

Cryptosystems for hierarchical groups.
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996

Evidential reasoning in network intrusion detection systems.
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996

Modeling a multi-level secure object-oriented database using views.
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996

On password-based authenticated key exchange using collisionful hash functions.
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996

On selectable collisionful hash functions.
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996

1995
A Cryptographic Mechanism for Object-Instance-Based Authorization in Object-Oriented Database Systems.
Proceedings of the OOER'95: Object-Oriented and Entity-Relationship Modelling, 1995

A Model of Authorization for Object-Oriented Databases based on Object Views.
Proceedings of the Deductive and Object-Oriented Databases, 1995

Keyed Hash Functions.
Proceedings of the Cryptography: Policy and Algorithms, 1995

A Cryptographic Solution to Discretionary Access Control in Structurally Object-Oriented Databases.
Proceedings of the Sixth Australasian Database Conference, 1995

1994
Automated Cryptanalysis of Transposition Ciphers.
Comput. J., 1994

Comments on Soviet Encryption Algorithm.
Proceedings of the Advances in Cryptology, 1994

Authentication Codes That Are <i>r</i>-Fold Secure Against Spoofing.
Proceedings of the CCS '94, 1994

Conditionally Secure Secret Sharing Schemes with Disenrollment Capability.
Proceedings of the CCS '94, 1994

Combinatorial Structure of A-codes with r-fold Security.
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994

1993
Automated Cryptanalysis of Substitution Ciphers.
Cryptologia, 1993

Optimal Authentication Systems.
Proceedings of the Advances in Cryptology, 1993

1992
Partial Belief and Probabilistic Reasoning in the Analysis of Secure Protocols.
Proceedings of the 5th IEEE Computer Security Foundations Workshop, 1992

Authentication Codes with Perfect Protection.
Proceedings of the Advances in Cryptology, 1992

Authentication Codes under Impersonation Attack.
Proceedings of the Advances in Cryptology, 1992

1991
Error-correcting codes for authentication and subliminal channels.
IEEE Trans. Inf. Theory, 1991

Randomized Authentication Systems.
Proceedings of the Advances in Cryptology, 1991

Feistel Type Authentication Codes.
Proceedings of the Advances in Cryptology, 1991

1990
Parallel Generation of Pseudo-Random Sequences.
Proceedings of the Advances in Cryptology, 1990

1979
Generalized t-Designs and Weighted Majority Decoding
Inf. Control., May, 1979


  Loading...