


Остановите войну!
for scientists:


default search action
Reihaneh Safavi-Naini
Person information

- affiliation: University of Calgary, Canada
- affiliation (former): University of Wollongong, Australia
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j69]Mamunur Akand
, Reihaneh Safavi-Naini, Marc Kneppers, Matthieu Giraud, Pascal Lafourcade
:
Privacy-Preserving Proof-of-Location With Security Against Geo-Tampering. IEEE Trans. Dependable Secur. Comput. 20(1): 131-146 (2023) - [i66]Somnath Panja, Shaoquan Jiang, Reihaneh Safavi-Naini:
A One-way Secret Key Agreement with Security Against Active Adversaries. CoRR abs/2302.13176 (2023) - [i65]Somnath Panja, Nikita Tripathi, Shaoquan Jiang, Reihaneh Safavi-Naini:
Robust and Reusable Fuzzy Extractors and their Application to Authentication from Iris Data. IACR Cryptol. ePrint Arch. 2023: 284 (2023) - 2022
- [j68]Yanhong Xu, Reihaneh Safavi-Naini, Khoa Nguyen
, Huaxiong Wang:
Traceable policy-based signatures and instantiation from lattices. Inf. Sci. 607: 1286-1310 (2022) - [j67]Sepideh Avizheh, Preston Haffey, Reihaneh Safavi-Naini:
Privacy-preserving FairSwap: Fairness and privacy interplay. Proc. Priv. Enhancing Technol. 2022(1): 417-439 (2022) - [c279]Majid Ghaderi, Samuel Jero, Cristina Nita-Rotaru, Reihaneh Safavi-Naini:
On Randomization in MTD Systems. MTD@CCS 2022: 37-43 - [c278]Leila Rashidi, Sogand SadrHaghighi, Majid Ghaderi, Cristina Nita-Rotaru, Reihaneh Safavi-Naini:
Securing Communication Against Leaky Switches. CNS 2022: 335-343 - [c277]Adrian Shuai Li, Reihaneh Safavi-Naini, Philip W. L. Fong:
A Capability-based Distributed Authorization System to Enforce Context-aware Permission Sequences. SACMAT 2022: 195-206 - [i64]Adrian Shuai Li, Reihaneh Safavi-Naini, Philip W. L. Fong:
A Capability-based Distributed Authorization System to Enforce Context-aware Permission Sequences. CoRR abs/2211.04980 (2022) - 2021
- [j66]Md. Morshedul Islam
, Reihaneh Safavi-Naini, Marc Kneppers:
Scalable Behavioral Authentication. IEEE Access 9: 43458-43473 (2021) - [c276]Sabyasachi Dutta, Reihaneh Safavi-Naini:
Leakage Resilient Cheating Detectable Secret Sharing Schemes. ACISP 2021: 3-23 - [c275]Partha Sarathi Roy
, Sabyasachi Dutta, Willy Susilo
, Reihaneh Safavi-Naini:
Password Protected Secret Sharing from Lattices. ACNS (1) 2021: 442-459 - [c274]Sepideh Avizheh, Preston Haffey, Reihaneh Safavi-Naini:
Privacy-enhanced OptiSwap. CCSW@CCS 2021: 39-57 - [c273]Alptekin Küpçü
, Reihaneh Safavi-Naini:
Smart Contracts for Incentivized Outsourcing of Computation. DPM/CBT@ESORICS 2021: 245-261 - [c272]Sepideh Avizheh, Mahmudun Nabi, Saoreen Rahman, Setareh Sharifian, Reihaneh Safavi-Naini:
Privacy-Preserving Resource Sharing Using Permissioned Blockchains - (The Case of Smart Neighbourhood). Financial Cryptography Workshops 2021: 482-504 - [c271]Simpy Parveen, Reihaneh Safavi-Naini, Marc Kneppers:
DTLS with Post-quantum Secure Source Authentication and Message Integrity. GLOBECOM (Workshops) 2021: 1-6 - [c270]Alireza Poostindouz, Reihaneh Safavi-Naini:
Second-Order Asymptotics for One-way Secret Key Agreement. ISIT 2021: 1254-1259 - [c269]Setareh Sharifian, Reihaneh Safavi-Naini:
Information-theoretic Key Encapsulation and its Application to Secure Communication. ISIT 2021: 2393-2398 - [c268]Alireza Poostindouz, Reihaneh Safavi-Naini:
Secret Key Capacity of Wiretapped Polytree-PIN. ITW 2021: 1-6 - [c267]Reihaneh Safavi-Naini, Setareh Sharifian:
Hybrid Encryption in Correlated Randomness Model. ITW 2021: 1-5 - [c266]Roland Booth, Yanhong Xu, Sabyasachi Karati, Reihaneh Safavi-Naini:
An Intermediate Secret-Guessing Attack on Hash-Based Signatures. IWSEC 2021: 195-215 - [c265]Leila Rashidi, Daniel Kostecki, Alexander James, Anthony Peterson, Majid Ghaderi, Samuel Jero, Cristina Nita-Rotaru, Hamed Okhravi, Reihaneh Safavi-Naini:
More than a Fair Share: Network Data Remanence Attacks against Secret Sharing-based Schemes. NDSS 2021 - [c264]Khoa Nguyen
, Reihaneh Safavi-Naini, Willy Susilo
, Huaxiong Wang, Yanhong Xu, Neng Zeng:
Group Encryption: Full Dynamicity, Message Filtering and Code-Based Instantiation. Public Key Cryptography (2) 2021: 678-708 - [c263]Md. Morshedul Islam, Reihaneh Safavi-Naini:
Model Inversion for Impersonation in Behavioral Authentication Systems. SECRYPT 2021: 271-282 - [i63]Setareh Sharifian, Reihaneh Safavi-Naini:
Information-theoretic Key Encapsulation and its Application to Secure Communication. CoRR abs/2102.02243 (2021) - [i62]Alptekin Küpçü, Reihaneh Safavi-Naini:
Smart Contracts for Incentivized Outsourcing of Computation. IACR Cryptol. ePrint Arch. 2021: 174 (2021) - [i61]Khoa Nguyen, Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang, Yanhong Xu, Neng Zeng:
Group Encryption: Full Dynamicity, Message Filtering and Code-Based Instantiation. IACR Cryptol. ePrint Arch. 2021: 226 (2021) - [i60]Roland Booth, Yanhong Xu, Sabyasachi Karati, Reihaneh Safavi-Naini:
An Intermediate Secret-Guessing Attack on Hash-Based Signatures. IACR Cryptol. ePrint Arch. 2021: 845 (2021) - 2020
- [j65]Liang Feng Zhang
, Reihaneh Safavi-Naini:
Protecting data privacy in publicly verifiable delegation of matrix and polynomial functions. Des. Codes Cryptogr. 88(4): 677-709 (2020) - [j64]Liang Feng Zhang, Reihaneh Safavi-Naini:
Privacy-preserving verifiable delegation of polynomial and matrix functions. J. Math. Cryptol. 14(1): 153-171 (2020) - [c262]Kumaramangalam Muni Venkateswarlu, Sepideh Avizheh, Reihaneh Safavi-Naini:
A Blockchain Based Approach to Resource Sharing in Smart Neighbourhoods. Financial Cryptography Workshops 2020: 550-567 - [c261]Fuchun Lin, Mahdi Cheraghchi
, Venkatesan Guruswami, Reihaneh Safavi-Naini, Huaxiong Wang:
Leakage-Resilient Secret Sharing in Non-Compartmentalized Models. ITC 2020: 7:1-7:24 - [c260]Setareh Sharifian, Alireza Poostindouz, Reihaneh Safavi-Naini:
A Capacity-achieving One-way Key Agreement with Improved Finite Blocklength Analysis. ISITA 2020: 407-411 - [c259]Alireza Poostindouz, Reihaneh Safavi-Naini:
A Channel Model of Transceivers for Multiterminal Secret Key Agreement. ISITA 2020: 412-416 - [c258]Md. Morshedul Islam, Reihaneh Safavi-Naini:
Fuzzy Vault for Behavioral Authentication System. SEC 2020: 295-310 - [i59]Yanhong Xu, Reihaneh Safavi-Naini, Khoa Nguyen
, Huaxiong Wang:
Traceable Policy-Based Signatures and Instantiation from Lattices. CoRR abs/2007.00033 (2020) - [i58]Alireza Poostindouz, Reihaneh Safavi-Naini:
A Channel Model of Transceivers for Multiterminal Secret Key Agreement. CoRR abs/2008.02977 (2020)
2010 – 2019
- 2019
- [j63]Go Ohtake, Reihaneh Safavi-Naini, Liang Feng Zhang:
Outsourcing scheme of ABE encryption secure against malicious adversary. Comput. Secur. 86: 437-452 (2019) - [c257]Sepideh Avizheh, Mahmudun Nabi, Reihaneh Safavi-Naini, Muni Venkateswarlu K.:
Verifiable Computation using Smart Contracts. CCSW@CCS 2019: 17-28 - [c256]Sabyasachi Karati, Reihaneh Safavi-Naini:
K2SN-MSS: An Efficient Post-Quantum Signature. AsiaCCS 2019: 501-514 - [c255]Mahmudun Nabi, Sepideh Avizheh, Muni Venkateswarlu Kumaramangalam, Reihaneh Safavi-Naini:
Game-Theoretic Analysis of an Incentivized Verifiable Computation System. Financial Cryptography Workshops 2019: 50-66 - [c254]Sepideh Avizheh, Reihaneh Safavi-Naini, Shuai Li:
Secure Logging with Security Against Adaptive Crash Attack. FPS 2019: 137-155 - [c253]Fuchun Lin, Mahdi Cheraghchi
, Venkatesan Guruswami, Reihaneh Safavi-Naini, Huaxiong Wang:
Secret Sharing with Binary Shares. ITCS 2019: 53:1-53:20 - [c252]Alireza Poostindouz, Reihaneh Safavi-Naini:
Wiretap Secret Key Capacity of Tree-PIN. ISIT 2019: 315-319 - [c251]Fuchun Lin, Reihaneh Safavi-Naini, Mahdi Cheraghchi
, Huaxiong Wang:
Non-Malleable Codes against Active Physical Layer Adversary. ISIT 2019: 2753-2757 - [c250]Fuchun Lin, San Ling
, Reihaneh Safavi-Naini, Huaxiong Wang:
Non-malleable Coding for Arbitrary Varying Channels. ITW 2019: 1-5 - [c249]Setareh Sharifian, Reihaneh Safavi-Naini:
A Modular Semantically Secure Wiretap Code with Shared Key for Weakly Symmetric Channels. ITW 2019: 1-5 - [i57]Fuchun Lin, Mahdi Cheraghchi, Venkatesan Guruswami, Reihaneh Safavi-Naini, Huaxiong Wang:
Non-Malleable Secret Sharing against Affine Tampering. CoRR abs/1902.06195 (2019) - [i56]Alireza Poostindouz, Reihaneh Safavi-Naini:
Wiretap Secret Key Capacity of Tree-PIN. CoRR abs/1903.06134 (2019) - [i55]Setareh Sharifian, Alireza Poostindouz, Reihaneh Safavi-Naini:
A One-Round Key Agreement Protocol with Information-Theoretic Security. CoRR abs/1905.04280 (2019) - [i54]Fuchun Lin, San Ling, Reihaneh Safavi-Naini, Huaxiong Wang:
Non-malleable Coding for Arbitrary Varying Channels. CoRR abs/1906.11066 (2019) - [i53]Sepideh Avizheh, Reihaneh Safavi-Naini, Shuai Li:
Secure Logging with Security against Adaptive Crash Attack. CoRR abs/1910.14169 (2019) - [i52]Sabyasachi Karati, Reihaneh Safavi-Naini:
K2SN-MSS: An Efficient Post-Quantum Signature (Full Version). IACR Cryptol. ePrint Arch. 2019: 442 (2019) - [i51]Masoumeh Shafieinejad, Navid Nasr Esfahani, Reihaneh Safavi-Naini:
A Scalable Post-quantum Hash-Based Group Signature. IACR Cryptol. ePrint Arch. 2019: 1377 (2019) - 2018
- [j62]Reihaneh Safavi-Naini
, Alireza Poostindouz, Viliam Lisý:
Path Hopping: An MTD Strategy for Long-Term Quantum-Safe Communication. Secur. Commun. Networks 2018: 8475818:1-8475818:15 (2018) - [c248]Ahmad Ahmadi, Reihaneh Safavi-Naini, Md. Mamunur Rashid Akand:
New Attacks and Secure Design for Anonymous Distance-Bounding. ACISP 2018: 598-616 - [c247]Md. Mamunur Rashid Akand, Reihaneh Safavi-Naini:
In-Region Authentication. ACNS 2018: 557-578 - [c246]Kevin R. B. Butler, Robert K. Cunningham, Paul C. van Oorschot, Reihaneh Safavi-Naini, Ashraf Matrawy, Jeremy Clark:
A Discussion on Security Education in Academia. CCS 2018: 2187-2188 - [c245]Setareh Sharifian, Reihaneh Safavi-Naini, Fuchun Lin:
Post-quantum Security using Channel Noise. CCS 2018: 2288-2290 - [c244]Hoi Le, Reihaneh Safavi-Naini:
On De-anonymization of Single Tweet Messages. IWSPA@CODASPY 2018: 8-14 - [c243]Sepideh Avizheh, Reihaneh Safavi-Naini, Siamak F. Shahandashti:
A New Look at the Refund Mechanism in the Bitcoin Payment Protocol. Financial Cryptography 2018: 369-387 - [c242]Reihaneh Safavi-Naini, Pengwei Wang:
Secure Key Agreement over Partially Corrupted Channels. ISIT 2018: 2649-2653 - [c241]Lakshya Tandon, Philip W. L. Fong, Reihaneh Safavi-Naini:
HCAP: A History-Based Capability System for IoT Devices. SACMAT 2018: 247-258 - [c240]Tam Thanh Doan, Reihaneh Safavi-Naini, Shuai Li, Sepideh Avizheh, Muni Venkateswarlu K., Philip W. L. Fong:
Towards a Resilient Smart Home. IoT S&P@SIGCOMM 2018: 15-21 - [i50]Lakshya Tandon, Philip W. L. Fong, Reihaneh Safavi-Naini:
HCAP: A History-Based Capability System for IoT Devices. CoRR abs/1804.00086 (2018) - [i49]Sepideh Avizheh, Reihaneh Safavi-Naini, Siamak F. Shahandashti:
A New Look at the Refund Mechanism in the Bitcoin Payment Protocol. CoRR abs/1807.01793 (2018) - [i48]Fuchun Lin, Mahdi Cheraghchi, Venkatesan Guruswami, Reihaneh Safavi-Naini, Huaxiong Wang:
Secret Sharing with Binary Shares. CoRR abs/1808.02974 (2018) - [i47]Md. Mamunur Rashid Akand, Reihaneh Safavi-Naini:
In-region Authentication. IACR Cryptol. ePrint Arch. 2018: 345 (2018) - [i46]Ahmad Ahmadi, Reihaneh Safavi-Naini, Md. Mamunur Rashid Akand:
Anonymous Distance-Bounding Identification. IACR Cryptol. ePrint Arch. 2018: 365 (2018) - [i45]Ahmad Ahmadi, Reihaneh Safavi-Naini:
Directional Distance-Bounding Identification Protocols. IACR Cryptol. ePrint Arch. 2018: 366 (2018) - [i44]Fuchun Lin, Mahdi Cheraghchi, Venkatesan Guruswami, Reihaneh Safavi-Naini, Huaxiong Wang:
Secret Sharing with Binary Shares. IACR Cryptol. ePrint Arch. 2018: 746 (2018) - 2017
- [c239]Sepideh Avizheh, Tam Thanh Doan, Xi Liu, Reihaneh Safavi-Naini:
A Secure Event Logging System for Smart Homes. IoT S&P@CCS 2017: 37-42 - [c238]Reihaneh Safavi-Naini, Alireza Poostindouz, Viliam Lisý:
Path Hopping: an MTD Strategy for Quantum-safe Communication. MTD@CCS 2017: 111-114 - [c237]Margaux Canet, Amrit Kumar, Cédric Lauradoux, Mary-Andréa Rakotomanga, Reihaneh Safavi-Naini:
Decompression Quines and Anti-Viruses. CODASPY 2017: 23-34 - [c236]Reihaneh Safavi-Naini, Viliam Lisý, Yvo Desmedt:
Economically Optimal Variable Tag Length Message Authentication. Financial Cryptography 2017: 204-223 - [c235]Go Ohtake, Reihaneh Safavi-Naini, Liang Feng Zhang:
Outsourcing Scheme of ABE Encryption Secure against Malicious Adversary. ICISSP 2017: 71-82 - [c234]Ahmad Ahmadi, Reihaneh Safavi-Naini:
Directional Distance-Bounding Identification. ICISSP (Revised Selected Papers) 2017: 197-221 - [c233]Ahmad Ahmadi, Reihaneh Safavi-Naini:
Distance-bounding Identification. ICISSP 2017: 202-212 - [c232]Setareh Sharifian, Fuchun Lin, Reihaneh Safavi-Naini:
Secret key agreement using a virtual wiretap channel. INFOCOM 2017: 1-9 - [c231]Pengwei Wang, Reihaneh Safavi-Naini:
Interactive message transmission over adversarial wiretap channel II. INFOCOM 2017: 1-9 - [c230]Go Ohtake, Reihaneh Safavi-Naini, Liang Feng Zhang:
Outsourcing of Verifiable Attribute-Based Keyword Search. NordSec 2017: 18-35 - [c229]Masoumeh Shafieinejad, Reihaneh Safavi-Naini:
A Post-Quantum One Time Signature Using Bloom Filter. PST 2017: 397-399 - [c228]Somayeh Taheri, Md. Morshedul Islam, Reihaneh Safavi-Naini:
Privacy-Enhanced Profile-Based Authentication Using Sparse Random Projection. SEC 2017: 474-490 - [i43]Fuchun Lin, Reihaneh Safavi-Naini, Mahdi Cheraghchi, Huaxiong Wang:
Non-Malleable Codes with Leakage and Applications to Secure Communication. CoRR abs/1708.05462 (2017) - [i42]Setareh Sharifian, Reihaneh Safavi-Naini, Fuchun Lin:
A Virtual Wiretap Channel for Secure MessageTransmission. IACR Cryptol. ePrint Arch. 2017: 185 (2017) - 2016
- [j61]Gerhard P. Hancke
, Aikaterini Mitrokotsa, Reihaneh Safavi-Naini, Damien Sauveron:
Special issue on recent advances in physical-layer security. Comput. Networks 109: 1-3 (2016) - [j60]Martin Gagné
, Pascal Lafourcade
, Yassine Lakhnech, Reihaneh Safavi-Naini:
Automated Proofs of Block Cipher Modes of Operation. J. Autom. Reason. 56(1): 49-94 (2016) - [j59]Mohsen Alimomeni, Reihaneh Safavi-Naini:
Two-level security for message sequences. Secur. Commun. Networks 9(12): 1759-1768 (2016) - [j58]Pengwei Wang, Reihaneh Safavi-Naini:
A Model for Adversarial Wiretap Channels. IEEE Trans. Inf. Theory 62(2): 970-983 (2016) - [c227]Seyed Hossein Ahmadinejad, Philip W. L. Fong, Reihaneh Safavi-Naini:
Privacy and Utility of Inference Control Mechanisms for Social Computing Applications. AsiaCCS 2016: 829-840 - [c226]Md. Morshedul Islam, Reihaneh Safavi-Naini:
POSTER: A Behavioural Authentication System for Mobile Users. CCS 2016: 1742-1744 - [c225]Md. Mamunur Rashid Akand, Reihaneh Safavi-Naini:
POSTER: Privacy Enhanced Secure Location Verification. CCS 2016: 1793-1795 - [c224]Fuchun Lin, Reihaneh Safavi-Naini, Pengwei Wang:
Codes for Detection of Limited View Algebraic Tampering. Inscrypt 2016: 309-320 - [c223]Fuchun Lin, Reihaneh Safavi-Naini, Pengwei Wang:
Detecting Algebraic Manipulation in Leaky Storage Systems. ICITS 2016: 129-150 - [c222]Setareh Sharifian, Reihaneh Safavi-Naini, Fuchun Lin:
A Virtual Wiretap Channel for Secure Message Transmission. Mycrypt 2016: 171-192 - [i41]Reihaneh Safavi-Naini, Pengwei Wang:
Information-theoretically Secure Key Agreement over Partially Corrupted Channels. CoRR abs/1604.03824 (2016) - [i40]Fuchun Lin, Reihaneh Safavi-Naini, Pengwei Wang:
Detecting Algebraic Manipulation in Leaky Storage Systems. CoRR abs/1607.00089 (2016) - 2015
- [j57]Siamak Fayyaz Shahandashti
, Reihaneh Safavi-Naini, Nashad Ahmed Safa:
Reconciling user privacy and implicit authentication for mobile devices. Comput. Secur. 53: 215-233 (2015) - [j56]Liang Feng Zhang, Reihaneh Safavi-Naini:
Batch verifiable computation of outsourced functions. Des. Codes Cryptogr. 77(2-3): 563-585 (2015) - [j55]Reihaneh Safavi-Naini, Pengwei Wang:
A Model for Adversarial Wiretap Channels and its Applications. J. Inf. Process. 23(5): 554-561 (2015) - [j54]Go Ohtake, Kazuto Ogawa, Reihaneh Safavi-Naini:
Privacy preserving system for integrated broadcast-broadband services using attribute-based encryption. IEEE Trans. Consumer Electron. 61(3): 328-335 (2015) - [c221]Pengwei Wang, Reihaneh Safavi-Naini, Fuchun Lin:
Erasure adversarial wiretap channels. Allerton 2015: 1061-1068 - [c220]Rashmi Kumari, Mohsen Alimomeni, Reihaneh Safavi-Naini:
Performance Analysis of Linux RNG in Virtualized Environments. CCSW 2015: 29-39 - [c219]Pengwei Wang, Reihaneh Safavi-Naini:
Adversarial wiretap channel with public discussion. CNS 2015: 281-289 - [c218]Liang Feng Zhang, Reihaneh Safavi-Naini:
Batch Verifiable Computation of Polynomials on Outsourced Data. ESORICS (2) 2015: 167-185 - [c217]Asadullah Al Galib, Reihaneh Safavi-Naini:
User Authentication Using Human Cognitive Abilities. Financial Cryptography 2015: 254-271 - [c216]Pengwei Wang, Reihaneh Safavi-Naini:
Limited View Adversary Codes: Bounds, Constructions and Applications. ICITS 2015: 214-235 - [c215]Kassem Kalach, Reihaneh Safavi-Naini:
An Efficient Post-Quantum One-Time Signature Scheme. SAC 2015: 331-351 - [c214]Mohsen Alimomeni, Reihaneh Safavi-Naini:
How to Prevent to Delegate Authentication. SecureComm 2015: 477-499 - [c213]Mahabir Prasad Jhanwar
, Reihaneh Safavi-Naini:
Compact Accumulator Using Lattices. SPACE 2015: 347-358 - [c212]Mahabir Prasad Jhanwar
, Reihaneh Safavi-Naini:
Almost Optimum Secret Sharing with Cheating Detection. SPACE 2015: 359-372 - [c211]Hoi Le Thi, Reihaneh Safavi-Naini, Asadullah Al Galib:
Secure Obfuscation of Authoring Style. WISTP 2015: 88-103 - [i39]Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini, Nashad Ahmed Safa:
Reconciling User Privacy and Implicit Authentication for Mobile Devices. IACR Cryptol. ePrint Arch. 2015: 707 (2015) - 2014
- [j53]Mahabir Prasad Jhanwar
, Ayineedi Venkateswarlu, Reihaneh Safavi-Naini:
Paillier-based publicly verifiable (non-interactive) secret sharing. Des. Codes Cryptogr. 73(2): 529-546 (2014) - [j52]Mohammad Jafari, Reihaneh Safavi-Naini, Philip W. L. Fong, Ken Barker:
A Framework for Expressing and Enforcing Purpose-Based Privacy Policies. ACM Trans. Inf. Syst. Secur. 17(1): 3:1-3:31 (2014) - [c210]Liang Feng Zhang, Reihaneh Safavi-Naini:
Verifiable Multi-server Private Information Retrieval. ACNS 2014: 62-79 - [c209]Hadi Ahmadi, Reihaneh Safavi-Naini:
Private Message Transmission Using Disjoint Paths. ACNS 2014: 116-133 - [c208]Liang Feng Zhang, Reihaneh Safavi-Naini:
Generalized homomorphic MACs with efficient verification. AsiaPKC@AsiaCCS 2014: 3-12 - [c207]Liang Feng Zhang, Reihaneh Safavi-Naini, Xiao Wei Liu:
Verifiable local computation on distributed data. SCC@ASIACCS 2014: 3-10 - [c206]Alina Oprea, Reihaneh Safavi-Naini:
CCSW 2014: Sixth ACM Cloud Computing Security Workshop. CCS 2014: 1560-1561 - [c205]Liang Feng Zhang, Reihaneh Safavi-Naini:
Verifiable Delegation of Computations with Storage-Verification Trade-off. ESORICS (1) 2014: 112-129 - [c204]Ahmad Ahmadi, Reihaneh Safavi-Naini:
Privacy-Preserving Distance-Bounding Proof-of-Knowledge. ICICS 2014: 74-88 - [c203]Xifan Zheng, Reihaneh Safavi-Naini, Hadi Ahmadi:
Distance Lower Bounding. ICICS 2014: 89-104 - [c202]