


Остановите войну!
for scientists:


default search action
Reihaneh Safavi-Naini
Person information

- affiliation: University of Calgary, Canada
- affiliation (former): University of Wollongong, Australia
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j70]Mamunur Akand
, Reihaneh Safavi-Naini, Marc Kneppers, Matthieu Giraud, Pascal Lafourcade
:
Privacy-Preserving Proof-of-Location With Security Against Geo-Tampering. IEEE Trans. Dependable Secur. Comput. 20(1): 131-146 (2023) - 2022
- [j69]Yanhong Xu, Reihaneh Safavi-Naini, Khoa Nguyen
, Huaxiong Wang:
Traceable policy-based signatures and instantiation from lattices. Inf. Sci. 607: 1286-1310 (2022) - [j68]Sepideh Avizheh, Preston Haffey, Reihaneh Safavi-Naini:
Privacy-preserving FairSwap: Fairness and privacy interplay. Proc. Priv. Enhancing Technol. 2022(1): 417-439 (2022) - [c278]Majid Ghaderi, Samuel Jero, Cristina Nita-Rotaru, Reihaneh Safavi-Naini:
On Randomization in MTD Systems. MTD@CCS 2022: 37-43 - [c277]Leila Rashidi, Sogand SadrHaghighi, Majid Ghaderi, Cristina Nita-Rotaru, Reihaneh Safavi-Naini:
Securing Communication Against Leaky Switches. CNS 2022: 335-343 - [c276]Adrian Shuai Li, Reihaneh Safavi-Naini, Philip W. L. Fong:
A Capability-based Distributed Authorization System to Enforce Context-aware Permission Sequences. SACMAT 2022: 195-206 - [i64]Adrian Shuai Li, Reihaneh Safavi-Naini, Philip W. L. Fong:
A Capability-based Distributed Authorization System to Enforce Context-aware Permission Sequences. CoRR abs/2211.04980 (2022) - 2021
- [j67]Md. Morshedul Islam
, Reihaneh Safavi-Naini, Marc Kneppers:
Scalable Behavioral Authentication. IEEE Access 9: 43458-43473 (2021) - [c275]Sabyasachi Dutta, Reihaneh Safavi-Naini:
Leakage Resilient Cheating Detectable Secret Sharing Schemes. ACISP 2021: 3-23 - [c274]Partha Sarathi Roy
, Sabyasachi Dutta, Willy Susilo
, Reihaneh Safavi-Naini:
Password Protected Secret Sharing from Lattices. ACNS (1) 2021: 442-459 - [c273]Sepideh Avizheh, Preston Haffey, Reihaneh Safavi-Naini:
Privacy-enhanced OptiSwap. CCSW@CCS 2021: 39-57 - [c272]Alptekin Küpçü, Reihaneh Safavi-Naini:
Smart Contracts for Incentivized Outsourcing of Computation. DPM/CBT@ESORICS 2021: 245-261 - [c271]Sepideh Avizheh, Mahmudun Nabi, Saoreen Rahman, Setareh Sharifian, Reihaneh Safavi-Naini:
Privacy-Preserving Resource Sharing Using Permissioned Blockchains - (The Case of Smart Neighbourhood). Financial Cryptography Workshops 2021: 482-504 - [c270]Simpy Parveen, Reihaneh Safavi-Naini, Marc Kneppers:
DTLS with Post-quantum Secure Source Authentication and Message Integrity. GLOBECOM (Workshops) 2021: 1-6 - [c269]Alireza Poostindouz, Reihaneh Safavi-Naini:
Second-Order Asymptotics for One-way Secret Key Agreement. ISIT 2021: 1254-1259 - [c268]Setareh Sharifian, Reihaneh Safavi-Naini:
Information-theoretic Key Encapsulation and its Application to Secure Communication. ISIT 2021: 2393-2398 - [c267]Alireza Poostindouz, Reihaneh Safavi-Naini:
Secret Key Capacity of Wiretapped Polytree-PIN. ITW 2021: 1-6 - [c266]Reihaneh Safavi-Naini, Setareh Sharifian:
Hybrid Encryption in Correlated Randomness Model. ITW 2021: 1-5 - [c265]Roland Booth, Yanhong Xu, Sabyasachi Karati, Reihaneh Safavi-Naini:
An Intermediate Secret-Guessing Attack on Hash-Based Signatures. IWSEC 2021: 195-215 - [c264]Leila Rashidi, Daniel Kostecki, Alexander James, Anthony Peterson, Majid Ghaderi, Samuel Jero, Cristina Nita-Rotaru, Hamed Okhravi, Reihaneh Safavi-Naini:
More than a Fair Share: Network Data Remanence Attacks against Secret Sharing-based Schemes. NDSS 2021 - [c263]Khoa Nguyen
, Reihaneh Safavi-Naini, Willy Susilo
, Huaxiong Wang, Yanhong Xu, Neng Zeng:
Group Encryption: Full Dynamicity, Message Filtering and Code-Based Instantiation. Public Key Cryptography (2) 2021: 678-708 - [c262]Md. Morshedul Islam, Reihaneh Safavi-Naini:
Model Inversion for Impersonation in Behavioral Authentication Systems. SECRYPT 2021: 271-282 - [i63]Setareh Sharifian, Reihaneh Safavi-Naini:
Information-theoretic Key Encapsulation and its Application to Secure Communication. CoRR abs/2102.02243 (2021) - [i62]Alptekin Küpçü, Reihaneh Safavi-Naini:
Smart Contracts for Incentivized Outsourcing of Computation. IACR Cryptol. ePrint Arch. 2021: 174 (2021) - [i61]Khoa Nguyen, Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang, Yanhong Xu, Neng Zeng:
Group Encryption: Full Dynamicity, Message Filtering and Code-Based Instantiation. IACR Cryptol. ePrint Arch. 2021: 226 (2021) - [i60]Roland Booth, Yanhong Xu, Sabyasachi Karati, Reihaneh Safavi-Naini:
An Intermediate Secret-Guessing Attack on Hash-Based Signatures. IACR Cryptol. ePrint Arch. 2021: 845 (2021) - 2020
- [j66]Liang Feng Zhang
, Reihaneh Safavi-Naini:
Protecting data privacy in publicly verifiable delegation of matrix and polynomial functions. Des. Codes Cryptogr. 88(4): 677-709 (2020) - [j65]Liang Feng Zhang, Reihaneh Safavi-Naini:
Privacy-preserving verifiable delegation of polynomial and matrix functions. J. Math. Cryptol. 14(1): 153-171 (2020) - [c261]Kumaramangalam Muni Venkateswarlu, Sepideh Avizheh, Reihaneh Safavi-Naini:
A Blockchain Based Approach to Resource Sharing in Smart Neighbourhoods. Financial Cryptography Workshops 2020: 550-567 - [c260]Fuchun Lin, Mahdi Cheraghchi
, Venkatesan Guruswami, Reihaneh Safavi-Naini, Huaxiong Wang:
Leakage-Resilient Secret Sharing in Non-Compartmentalized Models. ITC 2020: 7:1-7:24 - [c259]Setareh Sharifian, Alireza Poostindouz, Reihaneh Safavi-Naini:
A Capacity-achieving One-way Key Agreement with Improved Finite Blocklength Analysis. ISITA 2020: 407-411 - [c258]Alireza Poostindouz, Reihaneh Safavi-Naini:
A Channel Model of Transceivers for Multiterminal Secret Key Agreement. ISITA 2020: 412-416 - [c257]Md. Morshedul Islam, Reihaneh Safavi-Naini:
Fuzzy Vault for Behavioral Authentication System. SEC 2020: 295-310 - [i59]Yanhong Xu, Reihaneh Safavi-Naini, Khoa Nguyen
, Huaxiong Wang:
Traceable Policy-Based Signatures and Instantiation from Lattices. CoRR abs/2007.00033 (2020) - [i58]Alireza Poostindouz, Reihaneh Safavi-Naini:
A Channel Model of Transceivers for Multiterminal Secret Key Agreement. CoRR abs/2008.02977 (2020)
2010 – 2019
- 2019
- [j64]Go Ohtake, Reihaneh Safavi-Naini, Liang Feng Zhang:
Outsourcing scheme of ABE encryption secure against malicious adversary. Comput. Secur. 86: 437-452 (2019) - [c256]Sepideh Avizheh, Mahmudun Nabi, Reihaneh Safavi-Naini, Muni Venkateswarlu K.:
Verifiable Computation using Smart Contracts. CCSW@CCS 2019: 17-28 - [c255]Sabyasachi Karati, Reihaneh Safavi-Naini:
K2SN-MSS: An Efficient Post-Quantum Signature. AsiaCCS 2019: 501-514 - [c254]Mahmudun Nabi, Sepideh Avizheh, Muni Venkateswarlu Kumaramangalam, Reihaneh Safavi-Naini:
Game-Theoretic Analysis of an Incentivized Verifiable Computation System. Financial Cryptography Workshops 2019: 50-66 - [c253]Sepideh Avizheh, Reihaneh Safavi-Naini, Shuai Li:
Secure Logging with Security Against Adaptive Crash Attack. FPS 2019: 137-155 - [c252]Fuchun Lin, Mahdi Cheraghchi
, Venkatesan Guruswami, Reihaneh Safavi-Naini, Huaxiong Wang:
Secret Sharing with Binary Shares. ITCS 2019: 53:1-53:20 - [c251]Alireza Poostindouz, Reihaneh Safavi-Naini:
Wiretap Secret Key Capacity of Tree-PIN. ISIT 2019: 315-319 - [c250]Fuchun Lin, Reihaneh Safavi-Naini, Mahdi Cheraghchi
, Huaxiong Wang:
Non-Malleable Codes against Active Physical Layer Adversary. ISIT 2019: 2753-2757 - [c249]Fuchun Lin, San Ling
, Reihaneh Safavi-Naini, Huaxiong Wang:
Non-malleable Coding for Arbitrary Varying Channels. ITW 2019: 1-5 - [c248]Setareh Sharifian, Reihaneh Safavi-Naini:
A Modular Semantically Secure Wiretap Code with Shared Key for Weakly Symmetric Channels. ITW 2019: 1-5 - [i57]Fuchun Lin, Mahdi Cheraghchi, Venkatesan Guruswami, Reihaneh Safavi-Naini, Huaxiong Wang:
Non-Malleable Secret Sharing against Affine Tampering. CoRR abs/1902.06195 (2019) - [i56]Alireza Poostindouz, Reihaneh Safavi-Naini:
Wiretap Secret Key Capacity of Tree-PIN. CoRR abs/1903.06134 (2019) - [i55]Setareh Sharifian, Alireza Poostindouz, Reihaneh Safavi-Naini:
A One-Round Key Agreement Protocol with Information-Theoretic Security. CoRR abs/1905.04280 (2019) - [i54]Fuchun Lin, San Ling, Reihaneh Safavi-Naini, Huaxiong Wang:
Non-malleable Coding for Arbitrary Varying Channels. CoRR abs/1906.11066 (2019) - [i53]Sepideh Avizheh, Reihaneh Safavi-Naini, Shuai Li:
Secure Logging with Security against Adaptive Crash Attack. CoRR abs/1910.14169 (2019) - [i52]Sabyasachi Karati, Reihaneh Safavi-Naini:
K2SN-MSS: An Efficient Post-Quantum Signature (Full Version). IACR Cryptol. ePrint Arch. 2019: 442 (2019) - [i51]Masoumeh Shafieinejad, Navid Nasr Esfahani, Reihaneh Safavi-Naini:
A Scalable Post-quantum Hash-Based Group Signature. IACR Cryptol. ePrint Arch. 2019: 1377 (2019) - 2018
- [j63]Reihaneh Safavi-Naini
, Alireza Poostindouz, Viliam Lisý:
Path Hopping: An MTD Strategy for Long-Term Quantum-Safe Communication. Secur. Commun. Networks 2018: 8475818:1-8475818:15 (2018) - [c247]Ahmad Ahmadi, Reihaneh Safavi-Naini, Md. Mamunur Rashid Akand:
New Attacks and Secure Design for Anonymous Distance-Bounding. ACISP 2018: 598-616 - [c246]Md. Mamunur Rashid Akand, Reihaneh Safavi-Naini:
In-Region Authentication. ACNS 2018: 557-578 - [c245]Kevin R. B. Butler, Robert K. Cunningham, Paul C. van Oorschot, Reihaneh Safavi-Naini, Ashraf Matrawy, Jeremy Clark:
A Discussion on Security Education in Academia. CCS 2018: 2187-2188 - [c244]Setareh Sharifian, Reihaneh Safavi-Naini, Fuchun Lin:
Post-quantum Security using Channel Noise. CCS 2018: 2288-2290 - [c243]Hoi Le, Reihaneh Safavi-Naini:
On De-anonymization of Single Tweet Messages. IWSPA@CODASPY 2018: 8-14 - [c242]Sepideh Avizheh, Reihaneh Safavi-Naini, Siamak F. Shahandashti:
A New Look at the Refund Mechanism in the Bitcoin Payment Protocol. Financial Cryptography 2018: 369-387 - [c241]Reihaneh Safavi-Naini, Pengwei Wang:
Secure Key Agreement over Partially Corrupted Channels. ISIT 2018: 2649-2653 - [c240]Lakshya Tandon, Philip W. L. Fong, Reihaneh Safavi-Naini:
HCAP: A History-Based Capability System for IoT Devices. SACMAT 2018: 247-258 - [c239]Tam Thanh Doan, Reihaneh Safavi-Naini, Shuai Li, Sepideh Avizheh, Muni Venkateswarlu K., Philip W. L. Fong:
Towards a Resilient Smart Home. IoT S&P@SIGCOMM 2018: 15-21 - [i50]Lakshya Tandon, Philip W. L. Fong, Reihaneh Safavi-Naini:
HCAP: A History-Based Capability System for IoT Devices. CoRR abs/1804.00086 (2018) - [i49]Sepideh Avizheh, Reihaneh Safavi-Naini, Siamak F. Shahandashti:
A New Look at the Refund Mechanism in the Bitcoin Payment Protocol. CoRR abs/1807.01793 (2018) - [i48]Fuchun Lin, Mahdi Cheraghchi, Venkatesan Guruswami, Reihaneh Safavi-Naini, Huaxiong Wang:
Secret Sharing with Binary Shares. CoRR abs/1808.02974 (2018) - [i47]Md. Mamunur Rashid Akand, Reihaneh Safavi-Naini:
In-region Authentication. IACR Cryptol. ePrint Arch. 2018: 345 (2018) - [i46]Ahmad Ahmadi, Reihaneh Safavi-Naini, Md. Mamunur Rashid Akand:
Anonymous Distance-Bounding Identification. IACR Cryptol. ePrint Arch. 2018: 365 (2018) - [i45]Ahmad Ahmadi, Reihaneh Safavi-Naini:
Directional Distance-Bounding Identification Protocols. IACR Cryptol. ePrint Arch. 2018: 366 (2018) - [i44]Fuchun Lin, Mahdi Cheraghchi, Venkatesan Guruswami, Reihaneh Safavi-Naini, Huaxiong Wang:
Secret Sharing with Binary Shares. IACR Cryptol. ePrint Arch. 2018: 746 (2018) - 2017
- [c238]Sepideh Avizheh, Tam Thanh Doan, Xi Liu, Reihaneh Safavi-Naini:
A Secure Event Logging System for Smart Homes. IoT S&P@CCS 2017: 37-42 - [c237]Reihaneh Safavi-Naini, Alireza Poostindouz, Viliam Lisý:
Path Hopping: an MTD Strategy for Quantum-safe Communication. MTD@CCS 2017: 111-114 - [c236]Margaux Canet, Amrit Kumar, Cédric Lauradoux, Mary-Andréa Rakotomanga, Reihaneh Safavi-Naini:
Decompression Quines and Anti-Viruses. CODASPY 2017: 23-34 - [c235]Reihaneh Safavi-Naini, Viliam Lisý, Yvo Desmedt:
Economically Optimal Variable Tag Length Message Authentication. Financial Cryptography 2017: 204-223 - [c234]Go Ohtake, Reihaneh Safavi-Naini, Liang Feng Zhang:
Outsourcing Scheme of ABE Encryption Secure against Malicious Adversary. ICISSP 2017: 71-82 - [c233]Ahmad Ahmadi, Reihaneh Safavi-Naini:
Directional Distance-Bounding Identification. ICISSP (Revised Selected Papers) 2017: 197-221 - [c232]Ahmad Ahmadi, Reihaneh Safavi-Naini:
Distance-bounding Identification. ICISSP 2017: 202-212 - [c231]Setareh Sharifian, Fuchun Lin, Reihaneh Safavi-Naini:
Secret key agreement using a virtual wiretap channel. INFOCOM 2017: 1-9 - [c230]Pengwei Wang, Reihaneh Safavi-Naini:
Interactive message transmission over adversarial wiretap channel II. INFOCOM 2017: 1-9 - [c229]Go Ohtake, Reihaneh Safavi-Naini, Liang Feng Zhang:
Outsourcing of Verifiable Attribute-Based Keyword Search. NordSec 2017: 18-35 - [c228]Masoumeh Shafieinejad, Reihaneh Safavi-Naini:
A Post-Quantum One Time Signature Using Bloom Filter. PST 2017: 397-399 - [c227]Somayeh Taheri, Md. Morshedul Islam, Reihaneh Safavi-Naini:
Privacy-Enhanced Profile-Based Authentication Using Sparse Random Projection. SEC 2017: 474-490 - [i43]Fuchun Lin, Reihaneh Safavi-Naini, Mahdi Cheraghchi, Huaxiong Wang:
Non-Malleable Codes with Leakage and Applications to Secure Communication. CoRR abs/1708.05462 (2017) - [i42]Setareh Sharifian, Reihaneh Safavi-Naini, Fuchun Lin:
A Virtual Wiretap Channel for Secure MessageTransmission. IACR Cryptol. ePrint Arch. 2017: 185 (2017) - 2016
- [j62]Gerhard P. Hancke
, Aikaterini Mitrokotsa, Reihaneh Safavi-Naini, Damien Sauveron:
Special issue on recent advances in physical-layer security. Comput. Networks 109: 1-3 (2016) - [j61]Martin Gagné
, Pascal Lafourcade
, Yassine Lakhnech, Reihaneh Safavi-Naini:
Automated Proofs of Block Cipher Modes of Operation. J. Autom. Reason. 56(1): 49-94 (2016) - [j60]Mohsen Alimomeni, Reihaneh Safavi-Naini:
Two-level security for message sequences. Secur. Commun. Networks 9(12): 1759-1768 (2016) - [j59]Pengwei Wang, Reihaneh Safavi-Naini:
A Model for Adversarial Wiretap Channels. IEEE Trans. Inf. Theory 62(2): 970-983 (2016) - [c226]Seyed Hossein Ahmadinejad, Philip W. L. Fong, Reihaneh Safavi-Naini:
Privacy and Utility of Inference Control Mechanisms for Social Computing Applications. AsiaCCS 2016: 829-840 - [c225]Md. Morshedul Islam, Reihaneh Safavi-Naini:
POSTER: A Behavioural Authentication System for Mobile Users. CCS 2016: 1742-1744 - [c224]Md. Mamunur Rashid Akand, Reihaneh Safavi-Naini:
POSTER: Privacy Enhanced Secure Location Verification. CCS 2016: 1793-1795 - [c223]Fuchun Lin, Reihaneh Safavi-Naini, Pengwei Wang:
Codes for Detection of Limited View Algebraic Tampering. Inscrypt 2016: 309-320 - [c222]Fuchun Lin, Reihaneh Safavi-Naini, Pengwei Wang:
Detecting Algebraic Manipulation in Leaky Storage Systems. ICITS 2016: 129-150 - [c221]Setareh Sharifian, Reihaneh Safavi-Naini, Fuchun Lin:
A Virtual Wiretap Channel for Secure Message Transmission. Mycrypt 2016: 171-192 - [i41]Reihaneh Safavi-Naini, Pengwei Wang:
Information-theoretically Secure Key Agreement over Partially Corrupted Channels. CoRR abs/1604.03824 (2016) - [i40]Fuchun Lin, Reihaneh Safavi-Naini, Pengwei Wang:
Detecting Algebraic Manipulation in Leaky Storage Systems. CoRR abs/1607.00089 (2016) - 2015
- [j58]Siamak Fayyaz Shahandashti
, Reihaneh Safavi-Naini, Nashad Ahmed Safa:
Reconciling user privacy and implicit authentication for mobile devices. Comput. Secur. 53: 215-233 (2015) - [j57]Liang Feng Zhang, Reihaneh Safavi-Naini:
Batch verifiable computation of outsourced functions. Des. Codes Cryptogr. 77(2-3): 563-585 (2015) - [j56]Reihaneh Safavi-Naini, Pengwei Wang:
A Model for Adversarial Wiretap Channels and its Applications. J. Inf. Process. 23(5): 554-561 (2015) - [j55]Go Ohtake, Kazuto Ogawa, Reihaneh Safavi-Naini:
Privacy preserving system for integrated broadcast-broadband services using attribute-based encryption. IEEE Trans. Consumer Electron. 61(3): 328-335 (2015) - [c220]Pengwei Wang, Reihaneh Safavi-Naini, Fuchun Lin:
Erasure adversarial wiretap channels. Allerton 2015: 1061-1068 - [c219]Rashmi Kumari, Mohsen Alimomeni, Reihaneh Safavi-Naini:
Performance Analysis of Linux RNG in Virtualized Environments. CCSW 2015: 29-39 - [c218]Pengwei Wang, Reihaneh Safavi-Naini:
Adversarial wiretap channel with public discussion. CNS 2015: 281-289 - [c217]Liang Feng Zhang, Reihaneh Safavi-Naini:
Batch Verifiable Computation of Polynomials on Outsourced Data. ESORICS (2) 2015: 167-185 - [c216]Asadullah Al Galib, Reihaneh Safavi-Naini:
User Authentication Using Human Cognitive Abilities. Financial Cryptography 2015: 254-271 - [c215]Pengwei Wang, Reihaneh Safavi-Naini:
Limited View Adversary Codes: Bounds, Constructions and Applications. ICITS 2015: 214-235 - [c214]Kassem Kalach, Reihaneh Safavi-Naini:
An Efficient Post-Quantum One-Time Signature Scheme. SAC 2015: 331-351 - [c213]Mohsen Alimomeni, Reihaneh Safavi-Naini:
How to Prevent to Delegate Authentication. SecureComm 2015: 477-499 - [c212]Mahabir Prasad Jhanwar
, Reihaneh Safavi-Naini:
Compact Accumulator Using Lattices. SPACE 2015: 347-358 - [c211]Mahabir Prasad Jhanwar
, Reihaneh Safavi-Naini:
Almost Optimum Secret Sharing with Cheating Detection. SPACE 2015: 359-372 - [c210]Hoi Le Thi, Reihaneh Safavi-Naini, Asadullah Al Galib:
Secure Obfuscation of Authoring Style. WISTP 2015: 88-103 - [i39]Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini, Nashad Ahmed Safa:
Reconciling User Privacy and Implicit Authentication for Mobile Devices. IACR Cryptol. ePrint Arch. 2015: 707 (2015) - 2014
- [j54]Mahabir Prasad Jhanwar
, Ayineedi Venkateswarlu, Reihaneh Safavi-Naini:
Paillier-based publicly verifiable (non-interactive) secret sharing. Des. Codes Cryptogr. 73(2): 529-546 (2014) - [j53]Mohammad Jafari, Reihaneh Safavi-Naini, Philip W. L. Fong, Ken Barker:
A Framework for Expressing and Enforcing Purpose-Based Privacy Policies. ACM Trans. Inf. Syst. Secur. 17(1): 3:1-3:31 (2014) - [c209]Liang Feng Zhang, Reihaneh Safavi-Naini:
Verifiable Multi-server Private Information Retrieval. ACNS 2014: 62-79 - [c208]Hadi Ahmadi, Reihaneh Safavi-Naini:
Private Message Transmission Using Disjoint Paths. ACNS 2014: 116-133 - [c207]Liang Feng Zhang, Reihaneh Safavi-Naini:
Generalized homomorphic MACs with efficient verification. AsiaPKC@AsiaCCS 2014: 3-12 - [c206]Liang Feng Zhang, Reihaneh Safavi-Naini, Xiao Wei Liu:
Verifiable local computation on distributed data. SCC@ASIACCS 2014: 3-10 - [c205]Alina Oprea, Reihaneh Safavi-Naini:
CCSW 2014: Sixth ACM Cloud Computing Security Workshop. CCS 2014: 1560-1561 - [c204]Liang Feng Zhang, Reihaneh Safavi-Naini:
Verifiable Delegation of Computations with Storage-Verification Trade-off. ESORICS (1) 2014: 112-129 - [c203]Ahmad Ahmadi, Reihaneh Safavi-Naini:
Privacy-Preserving Distance-Bounding Proof-of-Knowledge. ICICS 2014: 74-88 - [c202]Xifan Zheng, Reihaneh Safavi-Naini, Hadi Ahmadi:
Distance Lower Bounding. ICICS 2014: 89-104 - [c201]Asadullah Al Galib, Reihaneh Safavi-Naini:
MOVTCHA: A CAPTCHA Based on Human Cognitive and Behavioral Features Analysis. ICICS 2014: 290-304 - [c200]Tongjie Zhang, Zongpeng Li, Reihaneh Safavi-Naini:
Incentivize cooperative sensing in distributed cognitive radio networks with reputation-based pricing. INFOCOM 2014: 2490-2498 - [c199]Pengwei Wang, Reihaneh Safavi-Naini:
An efficient code for Adversarial Wiretap channel. ITW 2014: 40-44 - [c198]Nashad Ahmed Safa, Reihaneh Safavi-Naini, Siamak Fayyaz Shahandashti
:
Privacy-Preserving Implicit Authentication. SEC 2014: 471-484 - [e18]Gail-Joon Ahn, Alina Oprea, Reihaneh Safavi-Naini:
Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, CCSW '14, Scottsdale, Arizona, USA, November 7, 2014. ACM 2014, ISBN 978-1-4503-3239-2 [contents] - [e17]Nicolas Christin, Reihaneh Safavi-Naini:
Financial Cryptography and Data Security - 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers. Lecture Notes in Computer Science 8437, Springer 2014, ISBN 978-3-662-45471-8 [contents] - [i38]