Siamak F. Shahandashti
Siamak F. Shahandashti
Geverifieerd e-mailadres voor york.ac.uk - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
A smart contract for boardroom voting with maximum voter privacy
P McCorry, SF Shahandashti, F Hao
International Conference on Financial Cryptography and Data Security, 357-375, 2017
3882017
Threshold attribute-based signatures and their application to anonymous credential systems
SF Shahandashti, R Safavi-Naini
International conference on cryptology in Africa, 198-216, 2009
2502009
Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts
DH Phan, D Pointcheval, SF Shahandashti, M Strefler
International journal of information security 12 (4), 251-265, 2013
962013
Towards bitcoin payment networks
P McCorry, M Möser, SF Shahandasti, F Hao
Australasian Conference on Information Security and Privacy, 57-76, 2016
752016
Attribute-based encryption without key cloning
MJ Hinek, S Jiang, R Safavi-Naini, SF Shahandashti
International Journal of Applied Cryptography 2 (3), 250-270, 2012
722012
Stealing PINs via mobile sensors: actual risk versus user perception
M Mehrnezhad, E Toreini, SF Shahandashti, F Hao
International Journal of Information Security 17 (3), 291-313, 2018
592018
Every vote counts: Ensuring integrity in large-scale electronic voting
F Hao, MN Kreeger, B Randell, D Clarke, SF Shahandashti, PHJ Lee
2014 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections …, 2014
552014
Touchsignatures: identification of user touch actions and PINs based on mobile sensor data via javascript
M Mehrnezhad, E Toreini, SF Shahandashti, F Hao
Journal of Information Security and Applications 26, 23-38, 2016
442016
Refund attacks on Bitcoin’s payment protocol
P McCorry, SF Shahandashti, F Hao
International Conference on Financial Cryptography and Data Security, 581-599, 2016
402016
A provably secure short transitive signature scheme from bilinear group pairs
SF Shahandashti, M Salmasizadeh, J Mohajeri
International Conference on Security in Communication Networks, 60-76, 2004
352004
DRE-ip: a verifiable e-voting scheme without tallying authorities
SF Shahandashti, F Hao
European Symposium on Research in Computer Security, 223-240, 2016
332016
Tap-Tap and Pay (TTP): Preventing the mafia attack in NFC payment
M Mehrnezhad, F Hao, SF Shahandashti
International Conference on Research in Security Standardisation, 21-39, 2015
312015
Privacy-preserving implicit authentication
NA Safa, R Safavi-Naini, SF Shahandashti
IFIP International Information Security Conference, 471-484, 2014
312014
Private fingerprint matching
SF Shahandashti, R Safavi-Naini, P Ogunbona
Australasian Conference on Information Security and Privacy, 426-433, 2012
312012
The SPEKE protocol revisited
F Hao, SF Shahandashti
International Conference on Research in Security Standardisation, 26-38, 2014
292014
Authenticated key exchange over bitcoin
P McCorry, SF Shahandashti, D Clarke, F Hao
International Conference on Research in Security Standardisation, 3-20, 2015
282015
Construction of universal designated-verifier signatures and identity-based signatures from standard signatures
SF Shahandashti, R Safavi-Naini
International Workshop on Public Key Cryptography, 121-140, 2008
272008
Reconciling user privacy and implicit authentication for mobile devices
SF Shahandashti, R Safavi-Naini, NA Safa
Computers & Security 53, 215-233, 2015
262015
Texture to the rescue: Practical paper fingerprinting based on texture patterns
E Toreini, SF Shahandashti, F Hao
ACM Transactions on Privacy and Security (TOPS) 20 (3), 1-29, 2017
222017
Battery draining attacks against edge computing nodes in IoT networks
R Smith, D Palin, PP Ioulianou, VG Vassilakis, SF Shahandashti
Cyber-Physical Systems 6 (2), 96-116, 2020
102020
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20