Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Reihaneh Safavi-Naini
2010 – today
- 2013
[c180]Mahabir Prasad Jhanwar, Reihaneh Safavi-Naini: Unconditionally-Secure Robust Secret Sharing with Minimum Share Size. Financial Cryptography 2013: 96-110
[c179]Reihaneh Safavi-Naini, Pengwei Wang: Codes for limited view adversarial channels. ISIT 2013: 266-270
[e16]Michael J. Jacobson Jr., Michael E. Locasto, Payman Mohassel, Reihaneh Safavi-Naini (Eds.): Applied Cryptography and Network Security - 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings. Lecture Notes in Computer Science 7954, Springer 2013, ISBN 978-3-642-38979-5
[i29]Hadi Ahmadi, Reihaneh Safavi-Naini: Secure Distance Bounding Verification using Physical-Channel Properties. CoRR abs/1303.0346 (2013)
[i28]Reihaneh Safavi-Naini, Pengwei Wang: Efficient Codes for Limited View Adversarial Channels. CoRR abs/1303.2735 (2013)- 2012
[j48]M. Jason Hinek, Shaoquan Jiang, Reihaneh Safavi-Naini, Siamak Fayyaz Shahandashti: Attribute-based encryption without key cloning. IJACT 2(3): 250-270 (2012)
[c178]Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini, Philip Ogunbona: Private Fingerprint Matching. ACISP 2012: 426-433
[c177]Reihaneh Safavi-Naini, Mohammed Ashraful Tuhin, Pengwei Wang: A General Construction for 1-Round δ-RMT and (0, δ)-SMT. ACNS 2012: 344-362
[c176]Reihaneh Safavi-Naini, Mohammed Ashraful Tuhin: Bounds and Constructions for 1-Round (0, δ)-Secure Message Transmission against Generalized Adversary. AFRICACRYPT 2012: 82-98
[c175]Hoi Le Thi, Reihaneh Safavi-Naini: An information theoretic framework for web inference detection. AISec 2012: 25-36
[c174]Gaven J. Watson, Reihaneh Safavi-Naini, Mohsen Alimomeni, Michael E. Locasto, Shivaramakrishnan Narayan: LoSt: location based storage. CCSW 2012: 59-70
[c173]Mina Askari, Reihaneh Safavi-Naini, Ken Barker: An information theoretic privacy and utility measure for data sanitization mechanisms. CODASPY 2012: 283-294
[c172]Rosa Karimi Adl, Mina Askari, Ken Barker, Reihaneh Safavi-Naini: Privacy Consensus in Anonymization Systems via Game Theory. DBSec 2012: 74-89
[c171]
[c170]Hadi Ahmadi, Reihaneh Safavi-Naini: Message Transmission and Key Establishment: Conditions for Equality of Weak and Strong Capacities. FPS 2012: 78-94
[c169]
[c168]Martin Gagné, Shivaramakrishnan Narayan, Reihaneh Safavi-Naini: Short Pairing-Efficient Threshold-Attribute-Based Signature. Pairing 2012: 295-313
[e15]Reihaneh Safavi-Naini, Ran Canetti (Eds.): Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings. Lecture Notes in Computer Science 7417, Springer 2012, ISBN 978-3-642-32008-8
[i27]Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini, Philip Ogunbona: Private Fingerprint Matching. IACR Cryptology ePrint Archive 2012: 219 (2012)
[i26]Reihaneh Safavi-Naini, Mohammed Ashraful Tuhin, Pengwei Wang: A General Construction for 1-round $\delta$-RMT and (0, $\delta$)-SMT. IACR Cryptology ePrint Archive 2012: 231 (2012)- 2011
[j47]Dongvu Tonien, Reihaneh Safavi-Naini, Peter R. Wild: On "the Power of Verification Queries" in Unconditionally Secure Message Authentication. Discrete Math., Alg. and Appl. 3(3): 287-304 (2011)
[j46]Dongvu Tonien, Reihaneh Safavi-Naini, Peter Nickolas: Breaking and Repairing an Approximate Message Authentication Scheme. Discrete Math., Alg. and Appl. 3(3): 393-412 (2011)
[j45]Reihaneh Safavi-Naini, Dongvu Tonien: Fuzzy Universal Hashing and Approximate Authentication. Discrete Math., Alg. and Appl. 3(4): 587-608 (2011)
[j44]Reihaneh Safavi-Naini, Shaoquan Jiang: Unconditionally Secure Conference Key Distribution: Security Notions, Bounds and Constructions. Int. J. Found. Comput. Sci. 22(6): 1369-1393 (2011)
[j43]Ching Yu Ng, Willy Susilo, Yi Mu, Reihaneh Safavi-Naini: Practical RFID ownership transfer scheme. Journal of Computer Security 19(2): 319-341 (2011)
[j42]Hongsong Shi, Shaoquan Jiang, Reihaneh Safavi-Naini, Mohammed Ashraful Tuhin: On Optimal Secure Message Transmission by Public Discussion. IEEE Transactions on Information Theory 57(1): 572-585 (2011)
[c167]Reihaneh Safavi-Naini, Mohammed Ashraful Tuhin, Hongsong Shi: Optimal message transmission protocols with flexible parameters. ASIACCS 2011: 453-458
[c166]Mohammad Jafari, Philip W. L. Fong, Reihaneh Safavi-Naini, Ken Barker, Nicholas Paul Sheppard: Towards defining semantic foundations for purpose-based privacy policies. CODASPY 2011: 213-224
[c165]Mohammad Jafari, Reihaneh Safavi-Naini, Nicholas Paul Sheppard: A rights management approach to protection of privacy in a cloud of electronic health records. Digital Rights Management Workshop 2011: 23-30
[c164]Nashad A. Safa, Saikat Sarkar, Reihaneh Safavi-Naini, Majid Ghaderi: Secure Localization Using Dynamic Verifiers. ESORICS 2011: 1-20
[c163]
[c162]Mohammed Ashraful Tuhin, Reihaneh Safavi-Naini: Optimal One Round Almost Perfectly Secure Message Transmission (Short Paper). Financial Cryptography 2011: 173-181
[c161]Martin Gagné, Pascal Lafourcade, Yassine Lakhnech, Reihaneh Safavi-Naini: Automated Verification of Block Cipher Modes of Operation, an Improved Method. FPS 2011: 23-31
[c160]
[c159]Hadi Ahmadi, Reihaneh Safavi-Naini: Common Randomness and Secret Key Capacities of Two-Way Channels. ICITS 2011: 76-93
[c158]Islam Hegazy, Reihaneh Safavi-Naini, Carey Williamson: Exploiting Routing Tree Construction in CTP. WISA 2011: 256-270
[i25]Hadi Ahmadi, Reihaneh Safavi-Naini: Secret Keys from Channel Noise. IACR Cryptology ePrint Archive 2011: 63 (2011)
[i24]Hadi Ahmadi, Reihaneh Safavi-Naini: Common Randomness and Secret Key Capacities of Two-way Channels. IACR Cryptology ePrint Archive 2011: 106 (2011)- 2010
[c157]Yvo Desmedt, Stelios Erotokritou, Reihaneh Safavi-Naini: Simple and Communication Complexity Efficient Almost Secure and Perfectly Secure Message Transmission Schemes. AFRICACRYPT 2010: 166-183
[c156]Shivaramakrishnan Narayan, Martin Gagné, Reihaneh Safavi-Naini: Privacy preserving EHR system using attribute-based infrastructure. CCSW 2010: 47-52
[c155]Tuan Manh Vu, Reihaneh Safavi-Naini, Carey Williamson: Securing wireless sensor networks against large-scale node capture attacks. ASIACCS 2010: 112-123
[c154]Mohammad Jafari, Reihaneh Safavi-Naini, Chad Saunders, Nicholas Paul Sheppard: Using digital rights management for securing data in a medical research environment. Digital Rights Management Workshop 2010: 55-60
[c153]Michal Sramka, Reihaneh Safavi-Naini, Jörg Denzinger, Mina Askari: A practice-oriented framework for measuring privacy and utility in data sanitization systems. EDBT/ICDT Workshops 2010
[c152]Hadi Ahmadi, Reihaneh Safavi-Naini: Secret key establishment over a pair of independent broadcast channels. ISITA 2010: 185-190
[c151]Hadi Ahmadi, Reihaneh Safavi-Naini: New results on Secret Key Establishment over a pair of broadcast channels. ISITA 2010: 191-196
[c150]Farzad Salim, Nicholas Paul Sheppard, Reihaneh Safavi-Naini: A Rights Management Approach to Securing Data Distribution in Coalitions. NSS 2010: 560-567
[c149]Martin Gagné, Shivaramakrishnan Narayan, Reihaneh Safavi-Naini: Threshold Attribute-Based Signcryption. SCN 2010: 154-171
[c148]Tuan Manh Vu, Reihaneh Safavi-Naini, Carey Williamson: On Applicability of Random Graphs for Modeling Random Key Predistribution for Wireless Sensor Networks. SSS 2010: 159-175
[c147]Islam Hegazy, Reihaneh Safavi-Naini, Carey Williamson: Towards securing mintroute in wireless sensor networks. WOWMOM 2010: 1-6
[e14]Rainer Böhme, Philip W. L. Fong, Reihaneh Safavi-Naini (Eds.): Information Hiding - 12th International Conference, IH 2010, Calgary, AB, Canada, June 28-30, 2010, Revised Selected Papers. Lecture Notes in Computer Science 6387, Springer 2010, ISBN 978-3-642-16434-7
[i23]Hadi Ahmadi, Reihaneh Safavi-Naini: Secret Key Agreement over a Pair of Independent Broadcast Channels. CoRR abs/1001.3908 (2010)
[i22]Hadi Ahmadi, Reihaneh Safavi-Naini: New Results on Secret Key Establishment over a Pair of Broadcast Channels. CoRR abs/1004.4334 (2010)
2000 – 2009
- 2009
[j41]Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini: Generic constructions for universal designated-verifier signatures and identitybased signatures from standard signatures. IET Information Security 3(4): 152-176 (2009)
[j40]Angela Piper, Reihaneh Safavi-Naini: How to Compare Image Watermarking Algorithms. T. Data Hiding and Multimedia Security 4: 1-28 (2009)
[c146]Rennie de Graaf, Islam Hegazy, Jeffrey Horton, Reihaneh Safavi-Naini: Distributed Detection of Wormhole Attacks in Wireless Sensor Networks. ADHOCNETS 2009: 208-223
[c145]Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini: Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems. AFRICACRYPT 2009: 198-216
[c144]Martin Gagné, Pascal Lafourcade, Yassine Lakhnech, Reihaneh Safavi-Naini: Automated Security Proof for Symmetric Encryption Modes. ASIAN 2009: 39-53
[c143]Dongvu Tonien, Reihaneh Safavi-Naini, Peter Nickolas, Yvo Desmedt: Unconditionally Secure Approximate Message Authentication. IWCC 2009: 233-247
[c142]Nicholas Paul Sheppard, Reihaneh Safavi-Naini: On the operational semantics of rights expression languages. Digital Rights Management Workshop 2009: 17-28
[c141]Ching Yu Ng, Willy Susilo, Yi Mu, Reihaneh Safavi-Naini: New Privacy Results on Synchronized RFID Authentication Protocols against Tag Tracing. ESORICS 2009: 321-336
[c140]Giovanni Di Crescenzo, Shaoquan Jiang, Reihaneh Safavi-Naini: Corruption-Localizing Hashing. ESORICS 2009: 489-504
[c139]Michal Sramka, Reihaneh Safavi-Naini, Jörg Denzinger: An Attack on the Privacy of Sanitized Data that Fuses the Outputs of Multiple Data Miners. ICDM Workshops 2009: 130-137
[c138]Hongsong Shi, Shaoquan Jiang, Reihaneh Safavi-Naini, Mohammed Ashraful Tuhin: Optimal secure message transmission by public discussion. ISIT 2009: 1313-1317
[c137]Liang Lu, Reihaneh Safavi-Naini, Markus Hagenbuchner, Willy Susilo, Jeffrey Horton, Sweah Liang Yong, Ah Chung Tsoi: Ranking Attack Graphs with Graph Neural Networks. ISPEC 2009: 345-359
[c136]Nicholas Paul Sheppard, Reihaneh Safavi-Naini, Mohammad Jafari: A Digital Rights Management Model for Healthcare. POLICY 2009: 106-109
[c135]Tuan Manh Vu, Carey Williamson, Reihaneh Safavi-Naini: Simulation modeling of secure wireless sensor networks. VALUETOOLS 2009: 30
[c134]Mohammad Jafari, Reihaneh Safavi-Naini, Nicholas Paul Sheppard: Enforcing purpose of use via workflows. WPES 2009: 113-116
[e13]Wanqing Li, Willy Susilo, Udaya Kiran Tupakula, Reihaneh Safavi-Naini, Vijay Varadharajan (Eds.): Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009. ACM 2009, ISBN 978-1-60558-394-5
[e12]Michael J. Jacobson Jr., Vincent Rijmen, Reihaneh Safavi-Naini (Eds.): Selected Areas in Cryptography, 16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers. Lecture Notes in Computer Science 5867, Springer 2009, ISBN 978-3-642-05443-3
[i21]Hongsong Shi, Shaoquan Jiang, Reihaneh Safavi-Naini, Mohammed Ashraful Tuhin: Optimal Secure Message Transmission by Public Discussion. CoRR abs/0901.2192 (2009)
[i20]Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini: Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems. IACR Cryptology ePrint Archive 2009: 126 (2009)- 2008
[j39]Adam Muhlbauer, Reihaneh Safavi-Naini, Farzad Salim, Nicholas Paul Sheppard, Jan Martin Surminen: Location constraints in digital rights management. Computer Communications 31(6): 1173-1180 (2008)
[j38]Sid Stamm, Nicholas Paul Sheppard, Reihaneh Safavi-Naini: Implementing Trusted Terminals with a and SITDRM. Electr. Notes Theor. Comput. Sci. 197(1): 73-85 (2008)
[j37]Reihaneh Safavi-Naini, Peter R. Wild: Information Theoretic Bounds on Authentication Systems in Query Model. IEEE Transactions on Information Theory 54(6): 2426-2436 (2008)
[c133]Reihaneh Safavi-Naini, Shaoquan Jiang: Non-interactive conference key distribution and its applications. ASIACCS 2008: 271-282
[c132]Ching Yu Ng, Willy Susilo, Yi Mu, Reihaneh Safavi-Naini: RFID Privacy Models Revisited. ESORICS 2008: 251-266
[c131]Shaoquan Jiang, Reihaneh Safavi-Naini: An Efficient Deniable Key Exchange Protocol (Extended Abstract). Financial Cryptography 2008: 47-52
[c130]Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: Public Key Encryption with Keyword Search Revisited. ICCSA (1) 2008: 1249-1259
[c129]Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini: Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures. Public Key Cryptography 2008: 121-140
[c128]Michal Sramka, Reihaneh Safavi-Naini, Jörg Denzinger, Mina Askari, Jie Gao: Utility of Knowledge Extracted from Unsanitized Data when Applied to Sanitized Data. PST 2008: 227-231
[e11]Reihaneh Safavi-Naini (Ed.): Information Theoretic Security, Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008, Proceedings. Lecture Notes in Computer Science 5155, Springer 2008, ISBN 978-3-540-85092-2
[e10]Larry Korba, Steve Marsh, Reihaneh Safavi-Naini (Eds.): Sixth Annual Conference on Privacy, Security and Trust, PST 2008, October 1-3, 2008, Fredericton, New Brunswick, Canada. IEEE 2008, ISBN 978-0-7695-3390-2
[i19]Shuhong Wang, Reihaneh Safavi-Naini: New Results on Unconditionally Secure Multireceiver Manual Authentication. IACR Cryptology ePrint Archive 2008: 39 (2008)
[i18]Mike Burmester, Reihaneh Safavi-Naini, Gelareh Taban: Secure Random Key Pre-Distribution Against Semi-Honest Adversaries. IACR Cryptology ePrint Archive 2008: 446 (2008)
[i17]M. Jason Hinek, Shaoquan Jiang, Reihaneh Safavi-Naini, Siamak Fayyaz Shahandashti: Attribute-Based Encryption with Key Cloning Protection. IACR Cryptology ePrint Archive 2008: 478 (2008)- 2007
[j36]Dongvu Tonien, Reihaneh Safavi-Naini: Construction of deletion correcting codes using generalized Reed-Solomon codes and their subcodes. Des. Codes Cryptography 42(2): 227-237 (2007)
[j35]Liang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo: Comparing and debugging firewall rule tables. IET Information Security 1(4): 143-151 (2007)
[j34]Luke McAven, Reihaneh Safavi-Naini: Classification of the Deletion Correcting Capabilities of Reed-Solomon Codes of Dimension 2 Over Prime Fields. IEEE Transactions on Information Theory 53(6): 2280-2294 (2007)
[c127]Mohammad Reza Reyhanitabar, Shuhong Wang, Reihaneh Safavi-Naini: Non-interactive Manual Channel Message Authentication Based on eTCR Hash Functions. ACISP 2007: 385-399
[c126]Liang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo: An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme. ACNS 2007: 65-86
[c125]Rungrat Wiangsripanawan, Willy Susilo, Reihaneh Safavi-Naini: Design Principles for Low Latency Anonymous Network Systems Secure against Timing Attacks. ACSW Frontiers 2007: 183-191
[c124]Rungrat Wiangsripanawan, Willy Susilo, Reihaneh Safavi-Naini: Achieving Mobility and Anonymity in IP-Based Networks. CANS 2007: 60-79
[c123]Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini, Joonsang Baek: Concurrently-secure credential ownership proofs. ASIACCS 2007: 161-172
[c122]Reihaneh Safavi-Naini, Shuhong Wang, Yvo Desmedt: Unconditionally secure ring authentication. ASIACCS 2007: 173-181
[c121]Dongvu Tonien, Reihaneh Safavi-Naini, Peter R. Wild: Combinatorial characterizations of authentication codes in verification oracle model. ASIACCS 2007: 183-193
[c120]Farzad Salim, Nicholas Paul Sheppard, Reihaneh Safavi-Naini: Using SITDRM for privacy rights management. CHIMIT 2007: 11
[c119]Gelareh Taban, Reihaneh Safavi-Naini: Key Establishment in Heterogeneous Self-organized Networks. ESAS 2007: 58-72
[c118]Wenming Lu, Wanqing Li, Reihaneh Safavi-Naini, Philip Ogunbona: A Maximum Likelihood Watermark Decoding Scheme. ICME 2007: 1247-1250
[c117]Liang Lu, Jeffrey Horton, Reihaneh Safavi-Naini, Willy Susilo: Transport Layer Identification of Skype Traffic. ICOIN 2007: 465-481
[c116]Farzad Salim, Nicholas Paul Sheppard, Reihaneh Safavi-Naini: Enforcing P3P Policies Using a Digital Rights Management System. Privacy Enhancing Technologies 2007: 200-217
[i16]Mohammad Reza Reyhanitabar, Shuhong Wang, Reihaneh Safavi-Naini: Noninteractive Manual Channel Message Authentication Based On eTCR Hash Functions. IACR Cryptology ePrint Archive 2007: 131 (2007)
[i15]Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini: Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures. IACR Cryptology ePrint Archive 2007: 462 (2007)- 2006
[j33]Reihaneh Safavi-Naini, Huaxiong Wang: Secret sharing schemes with partial broadcast channels. Des. Codes Cryptography 41(1): 5-22 (2006)
[j32]Reihaneh Safavi-Naini, Huaxiong Wang, Duncan S. Wong: Resilient Lkh: Secure Multicast Key Distribution Schemes. Int. J. Found. Comput. Sci. 17(5): 1205-1222 (2006)
[j31]Lan Nguyen, Reihaneh Safavi-Naini, Kaoru Kurosawa: Verifiable shuffles: a formal model and a Paillier-based three-round construction with provable security. Int. J. Inf. Sec. 5(4): 241-255 (2006)
[j30]Dongvu Tonien, Reihaneh Safavi-Naini: Recursive constructions of secure codes and hash families using difference function families. J. Comb. Theory, Ser. A 113(4): 664-674 (2006)
[j29]Takeyuki Uehara, Reihaneh Safavi-Naini, Philip Ogunbona: Recovering DC Coefficients in Block-Based DCT. IEEE Transactions on Image Processing 15(11): 3592-3596 (2006)
[c115]Dongvu Tonien, Reihaneh Safavi-Naini: An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families. ACNS 2006: 82-97
[c114]Jeffrey Horton, Reihaneh Safavi-Naini: Detecting Policy Violations through Traffic Analysis. ACSAC 2006: 109-120
[c113]Lan Yu, Willy Susilo, Reihaneh Safavi-Naini: X2BT Trusted Reputation System: A Robust Mechanism for P2P Networks. CANS 2006: 364-380
[c112]Ling Luo, Reihaneh Safavi-Naini, Joonsang Baek, Willy Susilo: Self-organised group key management for ad hoc networks. ASIACCS 2006: 138-147
[c111]Duong Hieu Phan, Reihaneh Safavi-Naini, Dongvu Tonien: Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability. ICALP (2) 2006: 264-275
[c110]Wenming Lu, Wanqing Li, Reihaneh Safavi-Naini, Philip Ogunbona: A Pixel-Based Robust Imagewatermarking System. ICME 2006: 1565-1568
[c109]Dongvu Tonien, Willy Susilo, Reihaneh Safavi-Naini: Multi-party Concurrent Signatures. ISC 2006: 131-145
[c108]Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search. ISC 2006: 217-232
[c107]Wenming Lu, Wanqing Li, Reihaneh Safavi-Naini, Philip Ogunbona: Optimal Image Watermark Decoding. PCM 2006: 141-149
[c106]Nicholas Paul Sheppard, Reihaneh Safavi-Naini: Protecting Privacy with the MPEG-21 IPMP Framework. Privacy Enhancing Technologies 2006: 152-171
[c105]Harikrishna Vasanta, Reihaneh Safavi-Naini, Nicholas Paul Sheppard, Jan Martin Surminen: Distributed Management of OMA DRM Domains. WISA 2006: 237-251
[e9]Lynn Margaret Batten, Reihaneh Safavi-Naini (Eds.): Information Security and Privacy, 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings. Lecture Notes in Computer Science 4058, Springer 2006, ISBN 3-540-35458-1
[e8]Rajkumar Buyya, Tianchi Ma, Reihaneh Safavi-Naini, Chris Steketee, Willy Susilo (Eds.): The proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Hobart, Tasmania, Australia, January 2006. CRPIT 54, Australian Computer Society 2006, ISBN 1-920-68236-8
[e7]Moti Yung, Kaoru Kurosawa, Reihaneh Safavi-Naini (Eds.): Proceedings of the Sixth ACM Workshop on Digital Rights Management, Alexandria, VA, USA, October 30, 2006. ACM 2006, ISBN 1-59593-555-X
[e6]Reihaneh Safavi-Naini, Moti Yung (Eds.): Digital Rights Management: Technologies, Issues, Challenges and Systems, First International Conference, DRMTICS 2005, Sydney, Australia, October 31 - November 2, 2005, Revised Selected Papers. Lecture Notes in Computer Science 3919, Springer 2006, ISBN 3-540-35998-2
[i14]Dongvu Tonien, Reihaneh Safavi-Naini: An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families. IACR Cryptology ePrint Archive 2006: 99 (2006)
[i13]Reihaneh Safavi-Naini, Peter R. Wild: Information Theoretic Bounds on Authentication Systems in Query Model. IACR Cryptology ePrint Archive 2006: 433 (2006)- 2005
[j28]Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo: Attack on Han et al.'s ID-based confirmer (undeniable) signature at ACM-EC'03. Applied Mathematics and Computation 170(2): 1166-1169 (2005)
[j27]Keith M. Martin, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild: Distributing the Encryption and Decryption of a Block Cipher. Des. Codes Cryptography 36(3): 263-287 (2005)
[j26]
[j25]Lan Nguyen, Reihaneh Safavi-Naini, Kaoru Kurosawa: A Provably Secure and Efficient Verifiable Shuffle based on a Variant of the Paillier Cryptosystem. J. UCS 11(6): 986-1010 (2005)
[c104]Russell Ang, Reihaneh Safavi-Naini, Luke McAven: Cancelable Key-Based Fingerprint Templates. ACISP 2005: 242-252
[c103]
[c102]Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: Universal Designated Verifier Signature Proof (or How to Efficiently Prove Knowledge of a Signature). ASIACRYPT 2005: 644-661
[c101]Liang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo: On Securing RTP-Based Streaming Content with Firewalls. CANS 2005: 304-319
[c100]Yvo Desmedt, Yongge Wang, Reihaneh Safavi-Naini, Huaxiong Wang: Radio Networks with Reliable Communication. COCOON 2005: 156-166
[c99]Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: Token-Controlled Public Key Encryption. ISPEC 2005: 386-397
[c98]Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: Certificateless Public Key Encryption Without Pairing. ISC 2005: 134-148
[c97]Yun Chen, Reihaneh Safavi-Naini, Joonsang Baek, Xin Chen: Server-Aided RSA Key Generation Against Collusion Attack. MADNES 2005: 27-37
[c96]Angela Piper, Reihaneh Safavi-Naini, Alfred Mertins: Resolution and quality scalable spread spectrum image watermarking. MM&Sec 2005: 79-90
[c95]Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption. Public Key Cryptography 2005: 380-397
[c94]Qiong Liu, Reihaneh Safavi-Naini, Nicholas Paul Sheppard: A License Transfer System for Supporting Content Portability in Digital Rights Management. SEC 2005: 189-204
[e5]Rajkumar Buyya, Paul D. Coddington, Paul Montague, Reihaneh Safavi-Naini, Nicholas Paul Sheppard, Andrew L. Wendelborn (Eds.): ACSW Frontiers 2005, 2005 ACSW Workshops - the Australasian Workshop on Grid Computing and e-Research (AusGrid 2005) and the Third Australasian Information Security Workshop (AISW 2005), Newcastle, NSW, Australia, January/February 2005. CRPIT 44, Australian Computer Society 2005, ISBN 1-920682-26-0
[e4]
[i12]Lan Nguyen, Reihaneh Safavi-Naini, Kaoru Kurosawa: A Provably Secure and Efficient Verifiable Shuffle based on a Variant of the Paillier Cryptosystem. IACR Cryptology ePrint Archive 2005: 162 (2005)
[i11]Lan Nguyen, Reihaneh Safavi-Naini: Dynamic k-Times Anonymous Authentication. IACR Cryptology ePrint Archive 2005: 168 (2005)
[i10]Dongvu Tonien, Reihaneh Safavi-Naini: Recursive Constructions of Secure Codes and Hash Families Using Difference Function Families. IACR Cryptology ePrint Archive 2005: 184 (2005)
[i9]Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: Public Key Encryption with Keyword Search Revisited. IACR Cryptology ePrint Archive 2005: 191 (2005)
[i8]Lan Nguyen, Reihaneh Safavi-Naini, Kaoru Kurosawa: Verifiable Shuffles: A Formal Model and a Paillier-based 3-Round Construction with Provable Security. IACR Cryptology ePrint Archive 2005: 199 (2005)
[i7]Reihaneh Safavi-Naini, Dongvu Tonien: Fuzzy Universal Hashing and Approximate Authentication. IACR Cryptology ePrint Archive 2005: 256 (2005)
[i6]Dongvu Tonien, Reihaneh Safavi-Naini: Explicit Construction of Secure Frameproof Codes. IACR Cryptology ePrint Archive 2005: 275 (2005)- 2004
[j24]Nicholas Paul Sheppard, Reihaneh Safavi-Naini, Philip Ogunbona: Secure Multimedia Authoring with Dishonest Collaborators. EURASIP J. Adv. Sig. Proc. 2004(14): 2214-2223 (2004)
[j23]Takeyuki Uehara, Reihaneh Safavi-Naini, Philip Ogunbona: A secure and flexible authentication system for digital images. Multimedia Syst. 9(5): 441-456 (2004)
[j22]Vu Dong Tô, Reihaneh Safavi-Naini: On the Maximal Codes of Length 3 with the 2-Identifiable Parent Property. SIAM J. Discrete Math. 17(4): 548-570 (2004)
[c93]Vu Dong Tô, Reihaneh Safavi-Naini: Linear Code Implies Public-Key Traitor Tracing with Revocation. ACISP 2004: 24-35
[c92]Luke McAven, Reihaneh Safavi-Naini, Moti Yung: Unconditionally Secure Encryption Under Strong Attacks. ACISP 2004: 427-439
[c91]Lan Nguyen, Reihaneh Safavi-Naini, Kaoru Kurosawa: Verifiable Shuffles: A Formal Model and a Paillier-Based Efficient Construction with Provable Security. ACNS 2004: 61-75
[c90]Nathan Curtis, Reihaneh Safavi-Naini, Willy Susilo: X2Rep: Enhanced Trust Semantics for the XRep Protocol. ACNS 2004: 205-219
[c89]Lan Nguyen, Reihaneh Safavi-Naini: Efficient and Provably Secure Trapdoor-Free Group Signature Schemes from Bilinear Pairings. ASIACRYPT 2004: 372-386
[c88]Lan Nguyen, Reihaneh Safavi-Naini: An Efficient Verifiable Shuffle with Perfect Zero-knowledge Proof System. Cryptographic Algorithms and their Uses 2004: 40-56
[c87]Reihaneh Safavi-Naini: Tracing traitors: a selective survey. Digital Rights Management Workshop 2004: 72
[c86]Reihaneh Safavi-Naini, Nicholas Paul Sheppard, Takeyuki Uehara: Import/export in digital rights management. Digital Rights Management Workshop 2004: 99-110
[c85]Takeyuki Uehara, Reihaneh Safavi-Naini, Philip Ogunbona: An MPEG tolerant authentication system for video data. ICME 2004: 891-894
[c84]Luke McAven, Reihaneh Safavi-Naini, Moti Yung: Symmetric Authentication Codes with Secrecy and Unconditionally Secure Authenticated Encryption. INDOCRYPT 2004: 148-161
[c83]Glen E. Wheeler, Reihaneh Safavi-Naini, Nicholas Paul Sheppard: Weighted Segmented Digital Watermarking. IWDW 2004: 89-100
[c82]Reihaneh Safavi-Naini, Luke McAven, Moti Yung: General Group Authentication Codes and Their Relation to "Unconditionally-Secure Signatures". Public Key Cryptography 2004: 231-247
[c81]Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo: An Efficient Signature Scheme from Bilinear Pairings and Its Applications. Public Key Cryptography 2004: 277-290
[i5]Lan Nguyen, Reihaneh Safavi-Naini: Efficient and Provably Secure Trapdoor-free Group Signature Schemes from Bilinear Pairings. IACR Cryptology ePrint Archive 2004: 104 (2004)- 2003
[j21]Yejing Wang, Jennifer Seberry, Reihaneh Safavi-Naini, Ryoh Fuji-Hara: A Note on the Exposure Property of SBIBD. Electronic Notes in Discrete Mathematics 15: 225-227 (2003)
[j20]Huaxiong Wang, Chaoping Xing, Reihaneh Safavi-Naini: Linear authentication codes: bounds and constructions. IEEE Transactions on Information Theory 49(4): 866-872 (2003)
[j19]Reihaneh Safavi-Naini, Yejing Wang: Sequential traitor tracing. IEEE Transactions on Information Theory 49(5): 1319-1326 (2003)
[c80]Qiong Liu, Reihaneh Safavi-Naini, Nicholas Paul Sheppard: Digital Rights Management for Content Distribution. ACSW Frontiers 2003: 49-58
[c79]Vu Dong Tô, Reihaneh Safavi-Naini, Fangguo Zhang: New traitor tracing schemes using bilinear map. Digital Rights Management Workshop 2003: 67-76
[c78]C. Kailasanathan, Reihaneh Safavi-Naini, Philip Ogunbona: Compression Tolerant DCT Based Image Hash. ICDCS Workshops 2003: 562-567
[c77]Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo: Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings. INDOCRYPT 2003: 191-204
[c76]Robert Scealy, Reihaneh Safavi-Naini, Nicholas Paul Sheppard: Performance Measurement of Watermark Embedding Patterns. IWDW 2003: 77-85
[c75]Angela Piper, Reihaneh Safavi-Naini, Alfred Mertins: Coefficient Selection Methods for Scalable Spread Spectrum Watermarking. IWDW 2003: 235-246
[c74]Lan Nguyen, Reihaneh Safavi-Naini: Breaking and Mending Resilient Mix-Nets. Privacy Enhancing Technologies 2003: 66-80
[e3]Reihaneh Safavi-Naini, Jennifer Seberry (Eds.): Information Security and Privacy, 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings. Lecture Notes in Computer Science 2727, Springer 2003, ISBN 3-540-40515-1
[i4]Keith M. Martin, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild: Distributing the Encryption and Decryption of a Block Cipher. IACR Cryptology ePrint Archive 2003: 5 (2003)
[i3]Fangguo Zhang, Reihaneh Safavi-Naini, Chih-Yin Lin: New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairing. IACR Cryptology ePrint Archive 2003: 104 (2003)
[i2]Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo: Attack on Han et al.'s ID-based Confirmer (Undeniable) Signature at ACM-EC'03. IACR Cryptology ePrint Archive 2003: 129 (2003)
[i1]Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo: ID-Based Chameleon Hashes from Bilinear Pairings. IACR Cryptology ePrint Archive 2003: 208 (2003)- 2002
[j18]Reihaneh Safavi-Naini, Huaxiong Wang: Bounds and Constructions for Threshold Shared Generation of Authenticators. Int. J. Comput. Math. 79(12): 1285-1301 (2002)
[c73]Hartono Kurnio, Reihaneh Safavi-Naini, Huaxiong Wang: A Secure Re-keying Scheme with Key Recovery Property. ACISP 2002: 40-55
[c72]Reihaneh Safavi-Naini, Yejing Wang: Traitor Tracing for Shortened and Corrupted Fingerprints. Digital Rights Management Workshop 2002: 81-100
[c71]Keith B. Frikken, Mikhail J. Atallah, Sunil Prabhakar, Reihaneh Safavi-Naini: Optimal Parallel I/O for Range Queries through Replication. DEXA 2002: 669-678
[c70]Yvo Desmedt, Reihaneh Safavi-Naini, Huaxiong Wang: Redistribution of Mechanical Secret Shares. Financial Cryptography 2002: 238-252
[c69]Willy Susilo, Reihaneh Safavi-Naini: An Efficient Fail-Stop Signature Scheme Based on Factorization. ICISC 2002: 62-74
[c68]Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild: Threshold MACs. ICISC 2002: 237-252
[c67]Hartono Kurnio, Luke McAven, Reihaneh Safavi-Naini, Huaxiong Wang: A Dynamic Group Key Distribution Scheme with Flexible User Join. ICISC 2002: 478-496
[c66]Vu Dong Tô, Reihaneh Safavi-Naini, Yejing Wang: A 2-Secure Code with Efficient Tracing Algorithm. INDOCRYPT 2002: 149-162
[c65]Gareth Brisbane, Reihaneh Safavi-Naini, Philip Ogunbona: An Algorithm for Data Hiding Using Median Cut Segmentation. IEEE Pacific Rim Conference on Multimedia 2002: 89-96
[c64]Takeyuki Uehara, Reihaneh Safavi-Naini: On (In)security of "A Robust Image Authentication Method". IEEE Pacific Rim Conference on Multimedia 2002: 1025-1032
[c63]Hartono Kurnio, Reihaneh Safavi-Naini, Huaxiong Wang: A Group Key Distribution Scheme with Decentralised User Join. SCN 2002: 146-163- 2001
[j17]Yvo Desmedt, Reihaneh Safavi-Naini, Huaxiong Wang, Lynn Margaret Batten, Chris Charnes, Josef Pieprzyk: Broadcast anti-jamming systems. Computer Networks 35(2-3): 223-236 (2001)
[j16]Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang: An Efficient Construction for Fail-Stop Signature for Long Messages. J. Inf. Sci. Eng. 17(6): 879-898 (2001)
[j15]Reihaneh Safavi-Naini, Huaxiong Wang: Broadcast authentication for group communication. Theor. Comput. Sci. 269(1-2): 1-21 (2001)
[j14]Reihaneh Safavi-Naini, Yejing Wang: New results on frame-proof codes and traceability schemes. IEEE Transactions on Information Theory 47(7): 3029-3033 (2001)
[c62]Shahrokh Saeednia, Reihaneh Safavi-Naini, Willy Susilo: On Classifying Conference Key Distribution Protocols. ACISP 2001: 51-59
[c61]Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang: How to Construct Fail-Stop Confirmer Signature Schemes. ACISP 2001: 435-444
[c60]Reihaneh Safavi-Naini, Yejing Wang: Collusion Secure q-ary Fingerprinting for Perceptual Content. Digital Rights Management Workshop 2001: 57-75
[c59]Hartono Kurnio, Reihaneh Safavi-Naini, Huaxiong Wang: Efficient Revocation Schemes for Secure Multicast. ICISC 2001: 160-177
[c58]Reihaneh Safavi-Naini, Huaxiong Wang, Chaoping Xing: Linear Authentication Codes: Bounds and Constructions. INDOCRYPT 2001: 127-135
[c57]Nicholas Paul Sheppard, Reihaneh Safavi-Naini, Philip Ogunbona: On multiple watermarking. MM&Sec 2001: 3-6- 2000
[j13]Willy Susilo, Reihaneh Safavi-Naini, Marc Gysin, Jennifer Seberry: A New and Efficient Fail-stop Signature Scheme. Comput. J. 43(5): 430-437 (2000)
[c56]Hartono Kurnio, Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang: Key Management for Secure Multicast with Dynamic Controller. ACISP 2000: 178-190
[c55]Reihaneh Safavi-Naini, Huaxiong Wang: New constructions for multicast re-keying schemes using perfect hash families. ACM Conference on Computer and Communications Security 2000: 228-234
[c54]Reihaneh Safavi-Naini, Yejing Wang: A Combinatorial Approach to Asymmetric Traitor Tracing. COCOON 2000: 416-425
[c53]
[c52]Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang: Fail-Stop Signature for Long Messages. INDOCRYPT 2000: 165-177
[c51]Reihaneh Safavi-Naini, Yejing Wang: Anonymous Traceability Schemes with Unconditional Security. INDOCRYPT 2000: 250-261
[c50]Gareth Brisbane, Reihaneh Safavi-Naini, Philip Ogunbona: Region-Based Watermarking by Distribution Adjustment. ISW 2000: 54-68
[c49]Reihaneh Safavi-Naini, Willy Susilo: Threshold Fail-Stop Signature Schemes Based on Discrete Logarithm and Factorization. ISW 2000: 292-307
1990 – 1999
- 1999
[j12]Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang: Changing Thresholds in the Absence of Secure Channels. Australian Computer Journal 31(2): 34-43 (1999)
[j11]Keith M. Martin, Reihaneh Safavi-Naini, Huaxiong Wang: Bounds and Techniques for Efficient Redistribution of Secret Shares to New Access Structures. Comput. J. 42(8): 638-649 (1999)
[j10]Reihaneh Safavi-Naini, Huaxiong Wang: Multireceiver Authentication Codes: Models, Bounds, Constructions, and Extensions. Inf. Comput. 151(1-2): 148-172 (1999)
[c48]Willy Susilo, Reihaneh Safavi-Naini, Josef Pieprzyk: Fail-Stop Threshold Signature Schemes Based on Elliptic Curves. ACISP 1999: 103-116
[c47]Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang: Changing Thresholds in the Absence of Secure Channels. ACISP 1999: 177-191
[c46]Dingyi Pei, Yuqiang Li, Yejing Wang, Reihaneh Safavi-Naini: Characterization of Optimal Authentication Codes with Arbitration. ACISP 1999: 303-313
[c45]
[c44]Reihaneh Safavi-Naini, Huaxiong Wang: Broadcast Authentication in Group Communication. ASIACRYPT 1999: 399-411
[c43]Takeyuki Uehara, Reihaneh Safavi-Naini: Attack on Liu/Farrell/Boyd Arithmetic Coding Encryption Scheme. Communications and Multimedia Security 1999: 273-290
[c42]Reihaneh Safavi-Naini, Huaxiong Wang, Kwok-Yan Lam: A New Approach to Robust Threshold RSA Signature Schemes. ICISC 1999: 184-196
[c41]Willy Susilo, Reihaneh Safavi-Naini, Josef Pieprzyk: RSA-Based Fail-Stop Signature Schemes. ICPP Workshops 1999: 161-166
[c40]Gareth Brisbane, Reihaneh Safavi-Naini, Philip Ogunbona: Region-Based Watermarking for Images. ISW 1999: 154-166
[e2]Josef Pieprzyk, Reihaneh Safavi-Naini, Jennifer Seberry (Eds.): Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings. Lecture Notes in Computer Science 1587, Springer 1999, ISBN 3-540-65756-8- 1998
[j9]Reihaneh Safavi-Naini: Three Systems for Threshold Generation of Authenticators. Des. Codes Cryptography 13(3): 299-312 (1998)
[c39]Reihaneh Safavi-Naini, Yejing Wang: Bounds and Constructions for A3-code with Multi-senders. ACISP 1998: 159-168
[c38]Shahrokh Saeednia, Reihaneh Safavi-Naini: Efficient Identity-Based Conference Key Distribution Protocols. ACISP 1998: 320-331
[c37]Hossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini: Secret Sharing in Multilevel and Compartmented Groups. ACISP 1998: 367-378
[c36]Hossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang: On Construction of Cumulative Secret Sharing Schemes. ACISP 1998: 379-390
[c35]Reihaneh Safavi-Naini, Huaxiong Wang: Bounds and Constructions for Multireceiver Authentication Codes. ASIACRYPT 1998: 242-256
[c34]Reihaneh Safavi-Naini, Huaxiong Wang: New Results on Multi-Receiver Authentication Codes. EUROCRYPT 1998: 527-541
[c33]
[c32]Shahrokh Saeednia, Reihaneh Safavi-Naini: On the Security of Girault`s Identification Scheme. Public Key Cryptography 1998: 149-153- 1997
[j8]Ahmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini: A Multi-Level View Model for Secure Object-Oriented Databases. Data Knowl. Eng. 23(2): 97-117 (1997)
[j7]Shahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk: On the Weakness of Gong's Collisionful Hash Functions. J. UCS 3(3): 185-196 (1997)
[j6]Ahmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini, Janusz R. Getta: Using Cryptographic Hash Functions for Discretionary Access Control in Object-Oriented Databases. J. UCS 3(6): 730-753 (1997)
[c31]Shahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk: A Message Authentication Code Based on Latin Squares. ACISP 1997: 194-203
[c30]
[c29]Hossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini: Remarks on the multiple assignment secret sharing scheme. ICICS 1997: 72-80
[c28]Chris Charnes, Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini: Secret sharing in hierarchical groups. ICICS 1997: 81-86
[c27]Keith M. Martin, Reihaneh Safavi-Naini: Multisender authentication systems with unconditional security. ICICS 1997: 130-143
[c26]Shahrokh Saeednia, Reihaneh Safavi-Naini: A New Identity-Based Key Exchange Protocol Minimizing Computation and Communication. ISW 1997: 328-334- 1996
[j5]Reihaneh Safavi-Naini, L. Tombak: Near-perfect protection and key strategies in authentication codes under spoofing attack of order r. Ars Comb. 44 (1996)
[j4]Reihaneh Safavi-Naini, L. Tombak: Authentication Codes in Plaintext and Chosen-Content Attacks. Des. Codes Cryptography 7(1-2): 83-99 (1996)
[c25]Josef Pieprzyk, Hossein Ghodosi, Chris Charnes, Reihaneh Safavi-Naini: Cryptography based on transcendental numbers. ACISP 1996: 96-107
[c24]Ahmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini: Modeling a multi-level secure object-oriented database using views. ACISP 1996: 190-206
[c23]Mansour Esmaili, Reihaneh Safavi-Naini, Josef Pieprzyk: Evidential reasoning in network intrusion detection systems. ACISP 1996: 253-265
[c22]Hossein Ghodosi, Josef Pieprzyk, Chris Charnes, Reihaneh Safavi-Naini: Cryptosystems for hierarchical groups. ACISP 1996: 275-286
[c21]Shahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk: On selectable collisionful hash functions. ACISP 1996: 287-298
[c20]Shahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk: On password-based authenticated key exchange using collisionful hash functions. ACISP 1996: 299-310
[c19]Mansour Esmaili, Bala Balachandran, Reihaneh Safavi-Naini, Josef Pieprzyk: Case-Based Reasoning for Intrusion Detection. ACSAC 1996: 214-223
[c18]
[c17]Mansour Esmaili, Reihaneh Safavi-Naini, Josef Pieprzyk: Computer Intrusion Detection and Incomplete Information. IEA/AIE 1996: 778- 1995
[c16]Ahmad Baraani-Dastjerdi, Janusz R. Getta, Josef Pieprzyk, Reihaneh Safavi-Naini: A Cryptographic Solution to Discretionary Access Control in Structurally Object-Oriented Databases. Australasian Database Conference 1995: 0-
[c15]Shahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk: Keyed Hash Functions. Cryptography: Policy and Algorithms 1995: 201-214
[c14]Ahmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini, Janusz R. Getta: A Model of Authorization for Object-Oriented Databases based on Object Views. DOOD 1995: 503-520
[c13]Ahmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini, Janusz R. Getta: A Cryptographic Mechanism for Object-Instance-Based Authorization in Object-Oriented Database Systems. OOER 1995: 44-54
[e1]Josef Pieprzyk, Reihaneh Safavi-Naini (Eds.): Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28 - December 1, 1994, Proceedings. Lecture Notes in Computer Science 917, Springer 1995, ISBN 3-540-59339-X- 1994
[j3]Jonathan Giddy, Reihaneh Safavi-Naini: Automated Cryptanalysis of Transposition Ciphers. Comput. J. 37(5): 429-436 (1994)
[c12]Reihaneh Safavi-Naini, L. Tombak: Combinatorial Structure of A-codes with r-fold Security. ASIACRYPT 1994: 211-223
[c11]Chris Charnes, Josef Pieprzyk, Reihaneh Safavi-Naini: Conditionally Secure Secret Sharing Schemes with Disenrollment Capability. ACM Conference on Computer and Communications Security 1994: 89-95
[c10]L. Tombak, Reihaneh Safavi-Naini: Authentication Codes That Are r-Fold Secure Against Spoofing. ACM Conference on Computer and Communications Security 1994: 166-169
[c9]Reihaneh Safavi-Naini, L. Tombak: Authentication Codes in Plaintext and Chosen-content Attacks. EUROCRYPT 1994: 254-265
[c8]Chris Charnes, Luke O'Connor, Josef Pieprzyk, Reihaneh Safavi-Naini, Yuliang Zheng: Comments on Soviet Encryption Algorithm. EUROCRYPT 1994: 433-438- 1993
[c7]- 1992
[c6]L. Tombak, Reihaneh Safavi-Naini: Authentication Codes with Perfect Protection. AUSCRYPT 1992: 15-26
[c5]Reihaneh Safavi-Naini, L. Tombak: Authentication Codes under Impersonation Attack. AUSCRYPT 1992: 35-47
[c4]E. A. Campbell, Reihaneh Safavi-Naini, P. A. Pleasants: Partial Belief and Probabilistic Reasoning in the Analysis of Secure Protocols. CSFW 1992: 84-91- 1991
[j2]Reihaneh Safavi-Naini, Jennifer Seberry: Error-correcting codes for authentication and subliminal channels. IEEE Transactions on Information Theory 37(1): 13-17 (1991)
[c3]
[c2]- 1990
[c1]
1970 – 1979
- 1979
[j1]Reihaneh Safavi-Naini, Ian F. Blake: Generalized t-Designs and Weighted Majority Decoding. Information and Control 42(3): 261-282 (1979)
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-15 21:39 CEST by the dblp team



