Rouzbeh Behnia

Orcid: 0000-0003-0423-7606

According to our database1, Rouzbeh Behnia authored at least 32 papers between 2012 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Unsupervised Threat Hunting using Continuous Bag-of-Terms-and-Time (CBoTT).
CoRR, 2024

2023
MUSES: Efficient Multi-User Searchable Encrypted Database.
IACR Cryptol. ePrint Arch., 2023

Efficient Secure Aggregation for Privacy-Preserving Federated Machine Learning.
CoRR, 2023

2022
FROG: Forward-Secure Post-Quantum Signature.
CoRR, 2022

EW-Tune: A Framework for Privately Fine-Tuning Large Language Models with Differential Privacy.
Proceedings of the IEEE International Conference on Data Mining Workshops, 2022

2021
Efficient Post-Quantum and Compact Cryptographic Constructions for the Internet of Things.
PhD thesis, 2021

On Removing Rejection Conditions in Practical Lattice-Based Signatures.
IACR Cryptol. ePrint Arch., 2021

Look Before You Leap: Secure Connection Bootstrapping for 5G Networks to Defend Against Fake Base-Stations.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

Towards Practical Post-quantum Signatures for Resource-Limited Internet of Things.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Lattice-Based Public Key Searchable Encryption from Experimental Perspectives.
IEEE Trans. Dependable Secur. Comput., 2020

Lattice-Based Proof-of-Work for Post-Quantum Blockchains.
IACR Cryptol. ePrint Arch., 2020

Compatible Certificateless and Identity-Based Cryptosystems for Heterogeneous IoT.
Proceedings of the Information Security - 23rd International Conference, 2020

MOSE: Practical Multi-User Oblivious Storage via Secure Enclaves.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

2019
IoD-Crypt: A Lightweight Cryptographic Framework for Internet of Drones.
CoRR, 2019

ARIS: Authentication for Real-Time IoT Systems.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Energy-Aware Digital Signatures for Embedded Medical Devices.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

2018
Fast Authentication from Aggregate Signatures with Improved Security.
IACR Cryptol. ePrint Arch., 2018

Compact Energy and Delay-aware Authentication.
IACR Cryptol. ePrint Arch., 2018

TACHYON: Fast Signatures from Compact Knapsack.
IACR Cryptol. ePrint Arch., 2018

2017
Lattice-Based Public Key Encryption with Keyword Search.
IACR Cryptol. ePrint Arch., 2017

High-Speed High-Security Public Key Encryption with Keyword Search.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

2016
Cryptanalysis of an Identity-Based Convertible Undeniable Signature Scheme.
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016

The insecurity of a certificateless undeniable signature scheme.
Proceedings of the 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), 2016

2015
Cryptanalysis of a certificateless identification scheme.
Secur. Commun. Networks, 2015

A provable secure pairing-free certificateless identification scheme.
Int. J. Comput. Math., 2015

An efficient certificateless undeniable signature scheme.
Int. J. Comput. Math., 2015

Applications of undeniable signature schemes.
Proceedings of the 2015 IEEE International Conference on Signal and Image Processing Applications, 2015

On the Security of Two Pairing-Based Signature Schemes.
Proceedings of the 5th International Conference on IT Convergence and Security, 2015

2013
An Efficient and Provably Secure Certificateless Identification Scheme.
Proceedings of the SECRYPT 2013, 2013

Notes on Two Flawed Attacks on Undeniable Signature Schemes.
Proceedings of the 2013 International Conference on IT Convergence and Security, 2013

An Efficient and Provable Secure Security-Mediated Identity-Based Identification Scheme.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013

2012
Short and Efficient Identity-Based Undeniable Signature Scheme.
Proceedings of the Trust, Privacy and Security in Digital Business, 2012


  Loading...