Shahrokh Saeednia

According to our database1, Shahrokh Saeednia authored at least 16 papers between 1997 and 2003.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2003
A note on Girault's self-certified model.
Inf. Process. Lett., 2003

Cryptanalysis of the Wu-Varadhrajan fair exchange protocol.
Inf. Process. Lett., 2003

An Efficient Strong Designated Verifier Signature Scheme.
Proceedings of the Information Security and Cryptology, 2003

2002
New NP-Complete partition problems.
IEEE Trans. Inf. Theory, 2002

An identity-based society oriented signature scheme with anonymous signers.
Inf. Process. Lett., 2002

2001
Optimistic Fair Exchange with Transparent Signature Recovery.
Proceedings of the Financial Cryptography, 2001

On Classifying Conference Key Distribution Protocols.
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001

2000
How to Maintain both Privacy and Authentication in Digital Libraries.
Int. J. Digit. Libr., 2000

On the security of a convertible group signature scheme.
Inf. Process. Lett., 2000

An Efficient Identification Scheme Based on Permuted Patterns.
IACR Cryptol. ePrint Arch., 2000

How to Make the Hill Cipher Secure.
Cryptologia, 2000

1999
A Self-Certified Group-Oriented Cryptosystem Without a Combiner.
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999

1998
On the Security of Girault's Identification Scheme.
Proceedings of the Public Key Cryptography, 1998

Efficient Identity-Based Conference Key Distribution Protocols.
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998

1997
A New Identity-Based Key Exchange Protocol Minimizing Computation and Communication.
Proceedings of the Information Security, First International Workshop, 1997

Identity-Based and Self-Certified Key-Exchange Protocols.
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997


  Loading...