Siamak F. Shahandashti

According to our database1, Siamak F. Shahandashti
  • authored at least 49 papers between 2004 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2018
Stealing PINs via mobile sensors: actual risk versus user perception.
Int. J. Inf. Sec., 2018

Verifiable Classroom Voting in Practice.
IEEE Security & Privacy, 2018

Analysing and Patching SPEKE in ISO/IEC.
CoRR, 2018

2017
Texture to the Rescue: Practical Paper Fingerprinting Based on Texture Patterns.
ACM Trans. Priv. Secur., 2017

A Smart Contract for Boardroom Voting with Maximum Voter Privacy.
IACR Cryptology ePrint Archive, 2017

Verifiable Classroom Voting in Practice.
IACR Cryptology ePrint Archive, 2017

Texture to the Rescue: Practical Paper Fingerprinting based on Texture Patterns.
CoRR, 2017

A Smart Contract for Boardroom Voting with Maximum Voter Privacy.
Proceedings of the Financial Cryptography and Data Security, 2017

2016
TouchSignatures: Identification of user touch actions and PINs based on mobile sensor data via JavaScript.
J. Inf. Sec. Appl., 2016

DRE-ip: A Verifiable E-Voting Scheme without Tallying Authorities.
IACR Cryptology ePrint Archive, 2016

Refund attacks on Bitcoin's Payment Protocol.
IACR Cryptology ePrint Archive, 2016

Towards Bitcoin Payment Networks.
IACR Cryptology ePrint Archive, 2016

Theoretical Attacks on E2E Voting Systems.
IACR Cryptology ePrint Archive, 2016

Electoral Systems Used around the World.
CoRR, 2016

Stealing PINs via Mobile Sensors: Actual Risk versus User Perception.
CoRR, 2016

TouchSignatures: Identification of User Touch Actions and PINs Based on Mobile Sensor Data via JavaScript.
CoRR, 2016

Refund Attacks on Bitcoin's Payment Protocol.
Proceedings of the Financial Cryptography and Data Security, 2016

DRE-ip: A Verifiable E-Voting Scheme Without Tallying Authorities.
Proceedings of the Computer Security - ESORICS 2016, 2016

Towards Bitcoin Payment Networks.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Reconciling User Privacy and Implicit Authentication for Mobile Devices.
IACR Cryptology ePrint Archive, 2015

Authenticated Key Exchange over Bitcoin.
IACR Cryptology ePrint Archive, 2015

The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group.
IACR Cryptology ePrint Archive, 2015

Reconciling user privacy and implicit authentication for mobile devices.
Computers & Security, 2015

Tap-Tap and Pay (TTP): Preventing the Mafia Attack in NFC Payment.
Proceedings of the Security Standardisation Research - Second International Conference, 2015

Authenticated Key Exchange over Bitcoin.
Proceedings of the Security Standardisation Research - Second International Conference, 2015

TouchSignatures: Identification of User Touch Actions based on Mobile Sensors via JavaScript.
Proceedings of the 10th ACM Symposium on Information, 2015

The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group.
Proceedings of the 1st ACM Workshop on IoT Privacy, Trust, and Security, 2015

2014
Privacy-Preserving Implicit Authentication.
IACR Cryptology ePrint Archive, 2014

The SPEKE Protocol Revisited.
IACR Cryptology ePrint Archive, 2014

Every Vote Counts: Ensuring Integrity in Large-Scale Electronic Voting.
Proceedings of the 2014 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, 2014

The SPEKE Protocol Revisited.
Proceedings of the Security Standardisation Research - First International Conference, 2014

Privacy-Preserving Implicit Authentication.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

2013
Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts.
Int. J. Inf. Sec., 2013

2012
New security notions and relations for public-key encryption.
J. Mathematical Cryptology, 2012

Attribute-based encryption without key cloning.
IJACT, 2012

Private Fingerprint Matching.
IACR Cryptology ePrint Archive, 2012

Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts.
IACR Cryptology ePrint Archive, 2012

Private Fingerprint Matching.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012

Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012

2009
Generic constructions for universal designated-verifier signatures and identitybased signatures from standard signatures.
IET Information Security, 2009

Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems.
IACR Cryptology ePrint Archive, 2009

Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems.
Proceedings of the Progress in Cryptology, 2009

2008
Attribute-Based Encryption with Key Cloning Protection.
IACR Cryptology ePrint Archive, 2008

Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures.
Proceedings of the Public Key Cryptography, 2008

2007
Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures.
IACR Cryptology ePrint Archive, 2007

Concurrently-secure credential ownership proofs.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

2005
A Verifiable Partial Key Escrow, Based on McCurley Encryption Scheme
Electronic Colloquium on Computational Complexity (ECCC), 2005

A Verifiable Partial Key Escrow, Based on McCurley Encryption Scheme
CoRR, 2005

2004
A Provably Secure Short Transitive Signature Scheme from Bilinear Group Pairs.
Proceedings of the Security in Communication Networks, 4th International Conference, 2004


  Loading...