Ziba Eslami

Orcid: 0000-0002-9818-3911

Affiliations:
  • Shahid Beheshti University, Tehran, Iran


According to our database1, Ziba Eslami authored at least 46 papers between 1999 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Certificate-based authenticated encryption with keyword search: Enhanced security model and a concrete construction for Internet of Things.
J. Inf. Secur. Appl., February, 2024

2023
Designated-Server Hierarchical Searchable Encryption in Identity-Based Setting.
ISC Int. J. Inf. Secur., October, 2023

2022
A generic construction to build simple oblivious transfer protocols from homomorphic encryption schemes.
J. Supercomput., 2022

Pairing-free certificateless authenticated encryption with keyword search.
J. Syst. Archit., 2022

Forgery Attack on An Outsourced Attribute-Based Signature Scheme.
Proceedings of the 27th International Computer Conference, Computer Society of Iran, 2022

2021
CPA-Secure Privacy-Preserving Reversible Data Hiding for JPEG Images.
IEEE Trans. Inf. Forensics Secur., 2021

Blind Multipurpose Image Watermarking with Perfect Security.
ISC Int. J. Inf. Secur., 2021

2020
Cryptanalysis and improvement of a group RFID authentication protocol.
Wirel. Networks, 2020

Public-key encryption with keyword search: a generic construction secure against online and offline keyword guessing attacks.
J. Ambient Intell. Humaniz. Comput., 2020

Certificateless authenticated encryption with keyword search: Enhanced security model and a concrete construction for industrial IoT.
J. Inf. Secur. Appl., 2020

Blind multipurpose watermarking with insertion of a single watermark: a generic construction based on verifiable threshold secret sharing.
IET Image Process., 2020

A simple generic construction to build oblivious transfer protocols from homomorphic encryption schemes.
IACR Cryptol. ePrint Arch., 2020

2019
High-speed GPU implementation of a secret sharing scheme based on cellular automata.
J. Supercomput., 2019

On the Security of a Privacy-Preserving Ranked Multi-Keyword Search Scheme.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2019

Improvement of (<i>n, n</i>)-multi-secret image sharing schemes based on Boolean operations.
J. Inf. Secur. Appl., 2019

A verifiable threshold secret sharing scheme based on lattices.
Inf. Sci., 2019

Public key authenticated encryption with keyword search: revisited.
IET Inf. Secur., 2019

Blind Multipurpose Image Watermarking Based on Secret Sharing.
Proceedings of the 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2019

2018
A (t, n)-multi secret image sharing scheme based on Boolean operations.
J. Vis. Commun. Image Represent., 2018

Designing a secure designated server identity-based encryption with keyword search scheme: still unsolved.
Ann. des Télécommunications, 2018

2017
Cryptanalysis of a multiparty quantum key agreement protocol based on commutative encryption.
Quantum Inf. Process., 2017

Reducing Multi-Secret Sharing Problem to Sharing a Single Secret Based on Cellular Automata.
IACR Cryptol. ePrint Arch., 2017

2016
Ideal social secret sharing using Birkhoff interpolation method.
Secur. Commun. Networks, 2016

Provably Secure Group Key Exchange Protocol in the Presence of Dishonest Insiders.
Int. J. Netw. Secur., 2016

Quantum Secret Sharing using single states.
Proceedings of the 8th International Symposium on Telecommunications, 2016

2015
Distributed key generation protocol with hierarchical threshold access structure.
IET Inf. Secur., 2015

Algorithmic Aspects of Trades.
Ars Comb., 2015

2014
Proxy signatures and buyer-seller watermarking protocols for the protection of multimedia content.
Multim. Tools Appl., 2014

Secret image sharing scheme with hierarchical threshold access structure.
J. Vis. Commun. Image Represent., 2014

Certificateless aggregate signcryption: Security model and a concrete construction secure in the random oracle model.
J. King Saud Univ. Comput. Inf. Sci., 2014

A note on "Selling multiple secrets to a single buyer".
Inf. Sci., 2014

2012
A New Verifiable Multi-secret Sharing Scheme Based on Bilinear Maps.
Wirel. Pers. Commun., 2012

Data Security in Unattended Wireless Sensor Networks through Aggregate Signcryption.
KSII Trans. Internet Inf. Syst., 2012

2011
Secret image sharing with authentication-chaining and dynamic embedding.
J. Syst. Softw., 2011

A Proxy E-Raffle Protocol Based on Proxy Signatures.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011

Certificateless Aggregate Signcryption Schemes.
IACR Cryptol. ePrint Arch., 2011

A new untraceable off-line electronic cash system.
Electron. Commer. Res. Appl., 2011

2010
Secret image sharing based on cellular automata and steganography.
Pattern Recognit., 2010

A verifiable multi-secret sharing scheme based on cellular automata.
Inf. Sci., 2010

On The Possible Automorphisms Of A 3-(16, 7, 5) Design.
Ars Comb., 2010

2007
Classification Of Large Sets By Trades.
Ars Comb., 2007

2004
Enumeration of t-Designs Through Intersection Matrices.
Des. Codes Cryptogr., 2004

Some New 4-Designs.
Ars Comb., 2004

2002
On the indecomposable partition problem: IPP(10, wedge).
Discret. Math., 2002

2001
Some New 6-(14, 7, 4) Designs.
J. Comb. Theory, Ser. A, 2001

1999
On 2-(v, 3) trades of minimum volume.
Australas. J Comb., 1999


  Loading...