Reihaneh Safavi-Naini Home Page Coauthor index DBLP Vis pubzone.org

List of publications from the DBLP Bibliography Server - FAQ
Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

DBLP keys2010
194Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLHadi Ahmadi, Reihaneh Safavi-Naini: Secret Key Agreement over a Pair of Independent Broadcast Channels CoRR abs/1001.3908: (2010)
2009
193no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLWanqing Li, Willy Susilo, Udaya Kiran Tupakula, Reihaneh Safavi-Naini, Vijay Varadharajan: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009 ACM 2009
192Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMichael J. Jacobson Jr., Vincent Rijmen, Reihaneh Safavi-Naini: Selected Areas in Cryptography, 16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers Springer 2009
191Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLSiamak Fayyaz Shahandashti, Reihaneh Safavi-Naini: Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems. AFRICACRYPT 2009: 198-216
190Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLNicholas Paul Sheppard, Reihaneh Safavi-Naini: On the operational semantics of rights expression languages. Digital Rights Management Workshop 2009: 17-28
189Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLChing Yu Ng, Willy Susilo, Yi Mu, Reihaneh Safavi-Naini: New Privacy Results on Synchronized RFID Authentication Protocols against Tag Tracing. ESORICS 2009: 321-336
188Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGiovanni Di Crescenzo, Shaoquan Jiang, Reihaneh Safavi-Naini: Corruption-Localizing Hashing. ESORICS 2009: 489-504
187Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMichal Sramka, Reihaneh Safavi-Naini, Jörg Denzinger: An Attack on the Privacy of Sanitized Data that Fuses the Outputs of Multiple Data Miners. ICDM Workshops 2009: 130-137
186Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLiang Lu, Reihaneh Safavi-Naini, Markus Hagenbuchner, Willy Susilo, Jeffrey Horton, Sweah Liang Yong, Ah Chung Tsoi: Ranking Attack Graphs with Graph Neural Networks. ISPEC 2009: 345-359
185Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDongvu Tonien, Reihaneh Safavi-Naini, Peter Nickolas, Yvo Desmedt: Unconditionally Secure Approximate Message Authentication. IWCC 2009: 233-247
184Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLNicholas Paul Sheppard, Reihaneh Safavi-Naini, Mohammad Jafari: A Digital Rights Management Model for Healthcare. POLICY 2009: 106-109
183Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLHongsong Shi, Shaoquan Jiang, Reihaneh Safavi-Naini, Mohammed Ashraful Tuhin: Optimal Secure Message Transmission by Public Discussion CoRR abs/0901.2192: (2009)
182Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAngela Piper, Reihaneh Safavi-Naini: How to Compare Image Watermarking Algorithms. T. Data Hiding and Multimedia Security 4: 1-28 (2009)
2008
181no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLarry Korba, Steve Marsh, Reihaneh Safavi-Naini: Sixth Annual Conference on Privacy, Security and Trust, PST 2008, October 1-3, 2008, Fredericton, New Brunswick, Canada IEEE 2008
180no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLReihaneh Safavi-Naini: Information Theoretic Security, Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008, Proceedings Springer 2008
179Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLReihaneh Safavi-Naini, Shaoquan Jiang: Non-interactive conference key distribution and its applications. ASIACCS 2008: 271-282
178Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLChing Yu Ng, Willy Susilo, Yi Mu, Reihaneh Safavi-Naini: RFID Privacy Models Revisited. ESORICS 2008: 251-266
177Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLShaoquan Jiang, Reihaneh Safavi-Naini: An Efficient Deniable Key Exchange Protocol (Extended Abstract). Financial Cryptography 2008: 47-52
176Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJoonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: Public Key Encryption with Keyword Search Revisited. ICCSA (1) 2008: 1249-1259
175Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMichal Sramka, Reihaneh Safavi-Naini, Jörg Denzinger, Mina Askari, Jie Gao: Utility of Knowledge Extracted from Unsanitized Data when Applied to Sanitized Data. PST 2008: 227-231
174Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLSiamak Fayyaz Shahandashti, Reihaneh Safavi-Naini: Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures. Public Key Cryptography 2008: 121-140
173Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAdam Muhlbauer, Reihaneh Safavi-Naini, Farzad Salim, Nicholas Paul Sheppard, Jan Martin Surminen: Location constraints in digital rights management. Computer Communications 31(6): 1173-1180 (2008)
172Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLSid Stamm, Nicholas Paul Sheppard, Reihaneh Safavi-Naini: Implementing Trusted Terminals with a and SITDRM. Electr. Notes Theor. Comput. Sci. 197(1): 73-85 (2008)
171Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLReihaneh Safavi-Naini, Peter R. Wild: Information Theoretic Bounds on Authentication Systems in Query Model. IEEE Transactions on Information Theory 54(6): 2426-2436 (2008)
2007
170Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMohammad Reza Reyhanitabar, Shuhong Wang, Reihaneh Safavi-Naini: Non-interactive Manual Channel Message Authentication Based on eTCR Hash Functions. ACISP 2007: 385-399
169Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLiang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo: An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme. ACNS 2007: 65-86
168Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRungrat Wiangsripanawan, Willy Susilo, Reihaneh Safavi-Naini: Design Principles for Low Latency Anonymous Network Systems Secure against Timing Attacks. ACSW Frontiers 2007: 183-191
167Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLSiamak Fayyaz Shahandashti, Reihaneh Safavi-Naini, Joonsang Baek: Concurrently-secure credential ownership proofs. ASIACCS 2007: 161-172
166Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLReihaneh Safavi-Naini, Shuhong Wang, Yvo Desmedt: Unconditionally secure ring authentication. ASIACCS 2007: 173-181
165Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDongvu Tonien, Reihaneh Safavi-Naini, Peter R. Wild: Combinatorial characterizations of authentication codes in verification oracle model. ASIACCS 2007: 183-193
164Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRungrat Wiangsripanawan, Willy Susilo, Reihaneh Safavi-Naini: Achieving Mobility and Anonymity in IP-Based Networks. CANS 2007: 60-79
163Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLFarzad Salim, Nicholas Paul Sheppard, Reihaneh Safavi-Naini: Using SITDRM for privacy rights management. CHIMIT 2007: 11
162Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGelareh Taban, Reihaneh Safavi-Naini: Key Establishment in Heterogeneous Self-organized Networks. ESAS 2007: 58-72
161Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLWenming Lu, Wanqing Li, Reihaneh Safavi-Naini, Philip Ogunbona: A Maximum Likelihood Watermark Decoding Scheme. ICME 2007: 1247-1250
160Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLiang Lu, Jeffrey Horton, Reihaneh Safavi-Naini, Willy Susilo: Transport Layer Identification of Skype Traffic. ICOIN 2007: 465-481
159Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLFarzad Salim, Nicholas Paul Sheppard, Reihaneh Safavi-Naini: Enforcing P3P Policies Using a Digital Rights Management System. Privacy Enhancing Technologies 2007: 200-217
158Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDongvu Tonien, Reihaneh Safavi-Naini: Construction of deletion correcting codes using generalized Reed-Solomon codes and their subcodes. Des. Codes Cryptography 42(2): 227-237 (2007)
157Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLuke McAven, Reihaneh Safavi-Naini: Classification of the Deletion Correcting Capabilities of Reed-Solomon Codes of Dimension 2 Over Prime Fields. IEEE Transactions on Information Theory 53(6): 2280-2294 (2007)
2006
156no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMoti Yung, Kaoru Kurosawa, Reihaneh Safavi-Naini: Proceedings of the Sixth ACM Workshop on Digital Rights Management, Alexandria, VA, USA, October 30, 2006 ACM 2006
155no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRajkumar Buyya, Tianchi Ma, Reihaneh Safavi-Naini, Chris Steketee, Willy Susilo: The proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Hobart, Tasmania, Australia, January 2006 Australian Computer Society 2006
154no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLReihaneh Safavi-Naini, Moti Yung: Digital Rights Management: Technologies, Issues, Challenges and Systems, First International Conference, DRMTICS 2005, Sydney, Australia, October 31 - November 2, 2005, Revised Selected Papers Springer 2006
153no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLynn Margaret Batten, Reihaneh Safavi-Naini: Information Security and Privacy, 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings Springer 2006
152Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDongvu Tonien, Reihaneh Safavi-Naini: An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families. ACNS 2006: 82-97
151Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJeffrey Horton, Reihaneh Safavi-Naini: Detecting Policy Violations through Traffic Analysis. ACSAC 2006: 109-120
150Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLing Luo, Reihaneh Safavi-Naini, Joonsang Baek, Willy Susilo: Self-organised group key management for ad hoc networks. ASIACCS 2006: 138-147
149Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLan Yu, Willy Susilo, Reihaneh Safavi-Naini: X2BT Trusted Reputation System: A Robust Mechanism for P2P Networks. CANS 2006: 364-380
148Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDuong Hieu Phan, Reihaneh Safavi-Naini, Dongvu Tonien: Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability. ICALP (2) 2006: 264-275
147Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLWenming Lu, Wanqing Li, Reihaneh Safavi-Naini, Philip Ogunbona: A Pixel-Based Robust Imagewatermarking System. ICME 2006: 1565-1568
146Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDongvu Tonien, Willy Susilo, Reihaneh Safavi-Naini: Multi-party Concurrent Signatures. ISC 2006: 131-145
145Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJoonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search. ISC 2006: 217-232
144Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLWenming Lu, Wanqing Li, Reihaneh Safavi-Naini, Philip Ogunbona: Optimal Image Watermark Decoding. PCM 2006: 141-149
143Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLNicholas Paul Sheppard, Reihaneh Safavi-Naini: Protecting Privacy with the MPEG-21 IPMP Framework. Privacy Enhancing Technologies 2006: 152-171
142Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLHarikrishna Vasanta, Reihaneh Safavi-Naini, Nicholas Paul Sheppard, Jan Martin Surminen: Distributed Management of OMA DRM Domains. WISA 2006: 237-251
141Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLReihaneh Safavi-Naini, Huaxiong Wang: Secret sharing schemes with partial broadcast channels. Des. Codes Cryptography 41(1): 5-22 (2006)
140Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLTakeyuki Uehara, Reihaneh Safavi-Naini, Philip Ogunbona: Recovering DC Coefficients in Block-Based DCT. IEEE Transactions on Image Processing 15(11): 3592-3596 (2006)
139Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLReihaneh Safavi-Naini, Huaxiong Wang, Duncan S. Wong: Resilient Lkh: Secure Multicast Key Distribution Schemes. Int. J. Found. Comput. Sci. 17(5): 1205-1222 (2006)
138Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLan Nguyen, Reihaneh Safavi-Naini, Kaoru Kurosawa: Verifiable shuffles: a formal model and a Paillier-based three-round construction with provable security. Int. J. Inf. Sec. 5(4): 241-255 (2006)
137Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDongvu Tonien, Reihaneh Safavi-Naini: Recursive constructions of secure codes and hash families using difference function families. J. Comb. Theory, Ser. A 113(4): 664-674 (2006)
2005
136no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLReihaneh Safavi-Naini, Moti Yung: Proceedings of the Fifth ACM Workshop on Digital Rights Management, Alexandria, VA, USA, November 7, 2005 ACM 2005
135no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRajkumar Buyya, Paul D. Coddington, Paul Montague, Reihaneh Safavi-Naini, Nicholas Paul Sheppard, Andrew L. Wendelborn: ACSW Frontiers 2005, 2005 ACSW Workshops - the Australasian Workshop on Grid Computing and e-Research (AusGrid 2005) and the Third Australasian Information Security Workshop (AISW 2005), Newcastle, NSW, Australia, January/February 2005 Australian Computer Society 2005
134Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRussell Ang, Reihaneh Safavi-Naini, Luke McAven: Cancelable Key-Based Fingerprint Templates. ACISP 2005: 242-252
133Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLan Nguyen, Reihaneh Safavi-Naini: Dynamic k-Times Anonymous Authentication. ACNS 2005: 318-333
132Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJoonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: Universal Designated Verifier Signature Proof (or How to Efficiently Prove Knowledge of a Signature). ASIACRYPT 2005: 644-661
131Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLiang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo: On Securing RTP-Based Streaming Content with Firewalls. CANS 2005: 304-319
130Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYvo Desmedt, Yongge Wang, Reihaneh Safavi-Naini, Huaxiong Wang: Radio Networks with Reliable Communication. COCOON 2005: 156-166
129Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJoonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: Certificateless Public Key Encryption Without Pairing. ISC 2005: 134-148
128Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJoonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: Token-Controlled Public Key Encryption. ISPEC 2005: 386-397
127Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYun Chen, Reihaneh Safavi-Naini, Joonsang Baek, Xin Chen: Server-Aided RSA Key Generation Against Collusion Attack. MADNES 2005: 27-37
126Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAngela Piper, Reihaneh Safavi-Naini, Alfred Mertins: Resolution and quality scalable spread spectrum image watermarking. MM&Sec 2005: 79-90
125Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJoonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption. Public Key Cryptography 2005: 380-397
124no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLQiong Liu, Reihaneh Safavi-Naini, Nicholas Paul Sheppard: A License Transfer System for Supporting Content Portability in Digital Rights Management. SEC 2005: 189-204
123Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLFangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo: Attack on Han et al.'s ID-based confirmer (undeniable) signature at ACM-EC'03. Applied Mathematics and Computation 170(2): 1166-1169 (2005)
122Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLKeith M. Martin, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild: Distributing the Encryption and Decryption of a Block Cipher. Des. Codes Cryptography 36(3): 263-287 (2005)
121Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLReihaneh Safavi-Naini, Chris Charnes: MRD Hashing. Des. Codes Cryptography 37(2): 229-242 (2005)
120Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLan Nguyen, Reihaneh Safavi-Naini, Kaoru Kurosawa: A Provably Secure and Efficient Verifiable Shuffle based on a Variant of the Paillier Cryptosystem. J. UCS 11(6): 986-1010 (2005)
2004
119Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLVu Dong Tô, Reihaneh Safavi-Naini: Linear Code Implies Public-Key Traitor Tracing with Revocation. ACISP 2004: 24-35
118Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLuke McAven, Reihaneh Safavi-Naini, Moti Yung: Unconditionally Secure Encryption Under Strong Attacks. ACISP 2004: 427-439
117Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLNathan Curtis, Reihaneh Safavi-Naini, Willy Susilo: X2Rep: Enhanced Trust Semantics for the XRep Protocol. ACNS 2004: 205-219
116Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLan Nguyen, Reihaneh Safavi-Naini, Kaoru Kurosawa: Verifiable Shuffles: A Formal Model and a Paillier-Based Efficient Construction with Provable Security. ACNS 2004: 61-75
115Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLan Nguyen, Reihaneh Safavi-Naini: Efficient and Provably Secure Trapdoor-Free Group Signature Schemes from Bilinear Pairings. ASIACRYPT 2004: 372-386
114no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLan Nguyen, Reihaneh Safavi-Naini: An Efficient Verifiable Shuffle with Perfect Zero-knowledge Proof System. Cryptographic Algorithms and their Uses 2004: 40-56
113Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLReihaneh Safavi-Naini: Tracing traitors: a selective survey. Digital Rights Management Workshop 2004: 72
112Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLReihaneh Safavi-Naini, Nicholas Paul Sheppard, Takeyuki Uehara: Import/export in digital rights management. Digital Rights Management Workshop 2004: 99-110
111no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLTakeyuki Uehara, Reihaneh Safavi-Naini, Philip Ogunbona: An MPEG tolerant authentication system for video data. ICME 2004: 891-894
110Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLuke McAven, Reihaneh Safavi-Naini, Moti Yung: Symmetric Authentication Codes with Secrecy and Unconditionally Secure Authenticated Encryption. INDOCRYPT 2004: 148-161
109Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGlen E. Wheeler, Reihaneh Safavi-Naini, Nicholas Paul Sheppard: Weighted Segmented Digital Watermarking. IWDW 2004: 89-100
108Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLReihaneh Safavi-Naini, Luke McAven, Moti Yung: General Group Authentication Codes and Their Relation to "Unconditionally-Secure Signatures". Public Key Cryptography 2004: 231-247
107Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLFangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo: An Efficient Signature Scheme from Bilinear Pairings and Its Applications. Public Key Cryptography 2004: 277-290
106Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLTakeyuki Uehara, Reihaneh Safavi-Naini, Philip Ogunbona: A secure and flexible authentication system for digital images. Multimedia Syst. 9(5): 441-456 (2004)
105Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLVu Dong Tô, Reihaneh Safavi-Naini: On the Maximal Codes of Length 3 with the 2-Identifiable Parent Property. SIAM J. Discrete Math. 17(4): 548-570 (2004)
2003
104no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLReihaneh Safavi-Naini, Jennifer Seberry: Information Security and Privacy, 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings Springer 2003
103Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLQiong Liu, Reihaneh Safavi-Naini, Nicholas Paul Sheppard: Digital Rights Management for Content Distribution. ACSW Frontiers 2003: 49-58
102Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLVu Dong Tô, Reihaneh Safavi-Naini, Fangguo Zhang: New traitor tracing schemes using bilinear map. Digital Rights Management Workshop 2003: 67-76
101Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLC. Kailasanathan, Reihaneh Safavi-Naini, Philip Ogunbona: Compression Tolerant DCT Based Image Hash. ICDCS Workshops 2003: 562-567
100Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLFangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo: Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings. INDOCRYPT 2003: 191-204
99Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAngela Piper, Reihaneh Safavi-Naini, Alfred Mertins: Coefficient Selection Methods for Scalable Spread Spectrum Watermarking. IWDW 2003: 235-246
98Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRobert Scealy, Reihaneh Safavi-Naini, Nicholas Paul Sheppard: Performance Measurement of Watermark Embedding Patterns. IWDW 2003: 77-85
97Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLan Nguyen, Reihaneh Safavi-Naini: Breaking and Mending Resilient Mix-Nets. Privacy Enhancing Technologies 2003: 66-80
96Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYejing Wang, Jennifer Seberry, Reihaneh Safavi-Naini, Ryoh Fuji-Hara: A Note on the Exposure Property of SBIBD. Electronic Notes in Discrete Mathematics 15: 225-227 (2003)
95no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLHuaxiong Wang, Chaoping Xing, Reihaneh Safavi-Naini: Linear authentication codes: bounds and constructions. IEEE Transactions on Information Theory 49(4): 866-872 (2003)
94no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLReihaneh Safavi-Naini, Yejing Wang: Sequential traitor tracing. IEEE Transactions on Information Theory 49(5): 1319-1326 (2003)
2002
93Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLHartono Kurnio, Reihaneh Safavi-Naini, Huaxiong Wang: A Secure Re-keying Scheme with Key Recovery Property. ACISP 2002: 40-55
92Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLKeith B. Frikken, Mikhail J. Atallah, Sunil Prabhakar, Reihaneh Safavi-Naini: Optimal Parallel I/O for Range Queries through Replication. DEXA 2002: 669-678
91Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLReihaneh Safavi-Naini, Yejing Wang: Traitor Tracing for Shortened and Corrupted Fingerprints. Digital Rights Management Workshop 2002: 81-100
90Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYvo Desmedt, Reihaneh Safavi-Naini, Huaxiong Wang: Redistribution of Mechanical Secret Shares. Financial Cryptography 2002: 238-252
89Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLKeith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild: Threshold MACs. ICISC 2002: 237-252
88Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLHartono Kurnio, Luke McAven, Reihaneh Safavi-Naini, Huaxiong Wang: A Dynamic Group Key Distribution Scheme with Flexible User Join. ICISC 2002: 478-496
87Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLWilly Susilo, Reihaneh Safavi-Naini: An Efficient Fail-Stop Signature Scheme Based on Factorization. ICISC 2002: 62-74
86Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLTakeyuki Uehara, Reihaneh Safavi-Naini: On (In)security of "A Robust Image Authentication Method". IEEE Pacific Rim Conference on Multimedia 2002: 1025-1032
85Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGareth Brisbane, Reihaneh Safavi-Naini, Philip Ogunbona: An Algorithm for Data Hiding Using Median Cut Segmentation. IEEE Pacific Rim Conference on Multimedia 2002: 89-96
84Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLVu Dong Tô, Reihaneh Safavi-Naini, Yejing Wang: A 2-Secure Code with Efficient Tracing Algorithm. INDOCRYPT 2002: 149-162
83Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLHartono Kurnio, Reihaneh Safavi-Naini, Huaxiong Wang: A Group Key Distribution Scheme with Decentralised User Join. SCN 2002: 146-163
82Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLReihaneh Safavi-Naini, Huaxiong Wang: Bounds and Constructions for Threshold Shared Generation of Authenticators. Int. J. Comput. Math. 79(12): 1285-1301 (2002)
2001
81Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLReihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang: How to Construct Fail-Stop Confirmer Signature Schemes. ACISP 2001: 435-444
80Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLShahrokh Saeednia, Reihaneh Safavi-Naini, Willy Susilo: On Classifying Conference Key Distribution Protocols. ACISP 2001: 51-59
79Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLReihaneh Safavi-Naini, Yejing Wang: Collusion Secure q-ary Fingerprinting for Perceptual Content. Digital Rights Management Workshop 2001: 57-75
78Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLHartono Kurnio, Reihaneh Safavi-Naini, Huaxiong Wang: Efficient Revocation Schemes for Secure Multicast. ICISC 2001: 160-177
77Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLReihaneh Safavi-Naini, Huaxiong Wang, Chaoping Xing: Linear Authentication Codes: Bounds and Constructions. INDOCRYPT 2001: 127-135
76Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLNicholas Paul Sheppard, Reihaneh Safavi-Naini, Philip Ogunbona: On multiple watermarking. MM&Sec 2001: 3-6
75Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYvo Desmedt, Reihaneh Safavi-Naini, Huaxiong Wang, Lynn Margaret Batten, Chris Charnes, Josef Pieprzyk: Broadcast anti-jamming systems. Computer Networks 35(2-3): 223-236 (2001)
74no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLReihaneh Safavi-Naini, Yejing Wang: New results on frame-proof codes and traceability schemes. IEEE Transactions on Information Theory 47(7): 3029-3033 (2001)
73Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLReihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang: An Efficient Construction for Fail-Stop Signature for Long Messages. J. Inf. Sci. Eng. 17(6): 879-898 (2001)
72Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLReihaneh Safavi-Naini, Huaxiong Wang: Broadcast authentication for group communication. Theor. Comput. Sci. 269(1-2): 1-21 (2001)
2000
71no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLHartono Kurnio, Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang: Key Management for Secure Multicast with Dynamic Controller. ACISP 2000: 178-190
70Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLReihaneh Safavi-Naini, Huaxiong Wang: New constructions for multicast re-keying schemes using perfect hash families. ACM Conference on Computer and Communications Security 2000: 228-234
69Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLReihaneh Safavi-Naini, Yejing Wang: A Combinatorial Approach to Asymmetric Traitor Tracing. COCOON 2000: 416-425
68Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLReihaneh Safavi-Naini, Yejing Wang: Sequential Traitor Tracing. CRYPTO 2000: 316-332
67Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLReihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang: Fail-Stop Signature for Long Messages. INDOCRYPT 2000: 165-177
66Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLReihaneh Safavi-Naini, Yejing Wang: Anonymous Traceability Schemes with Unconditional Security. INDOCRYPT 2000: 250-261
65Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLReihaneh Safavi-Naini, Willy Susilo: Threshold Fail-Stop Signature Schemes Based on Discrete Logarithm and Factorization. ISW 2000: 292-307
64Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGareth Brisbane, Reihaneh Safavi-Naini, Philip Ogunbona: Region-Based Watermarking by Distribution Adjustment. ISW 2000: 54-68
63Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLWilly Susilo, Reihaneh Safavi-Naini, Marc Gysin, Jennifer Seberry: A New and Efficient Fail-stop Signature Scheme. Comput. J. 43(5): 430-437 (2000)
1999
62no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJosef Pieprzyk, Reihaneh Safavi-Naini, Jennifer Seberry: Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings Springer 1999
61Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLWilly Susilo, Reihaneh Safavi-Naini, Josef Pieprzyk: Fail-Stop Threshold Signature Schemes Based on Elliptic Curves. ACISP 1999: 103-116
60Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLKeith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang: Changing Thresholds in the Absence of Secure Channels. ACISP 1999: 177-191
59Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDingyi Pei, Yuqiang Li, Yejing Wang, Reihaneh Safavi-Naini: Characterization of Optimal Authentication Codes with Arbitration. ACISP 1999: 303-313
58Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYejing Wang, Reihaneh Safavi-Naini: A3-Codes under Collusion Attacks. ASIACRYPT 1999: 390-398
57Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLReihaneh Safavi-Naini, Huaxiong Wang: Broadcast Authentication in Group Communication. ASIACRYPT 1999: 399-411
56no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLTakeyuki Uehara, Reihaneh Safavi-Naini: Attack on Liu/Farrell/Boyd Arithmetic Coding Encryption Scheme. Communications and Multimedia Security 1999: 273-290
55no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLReihaneh Safavi-Naini, Huaxiong Wang, Kwok-Yan Lam: A New Approach to Robust Threshold RSA Signature Schemes. ICISC 1999: 184-196
54Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLWilly Susilo, Reihaneh Safavi-Naini, Josef Pieprzyk: RSA-Based Fail-Stop Signature Schemes. ICPP Workshops 1999: 161-166
53Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGareth Brisbane, Reihaneh Safavi-Naini, Philip Ogunbona: Region-Based Watermarking for Images. ISW 1999: 154-166
52no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLKeith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang: Changing Thresholds in the Absence of Secure Channels. Australian Computer Journal 31(2): 34-43 (1999)
51no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLKeith M. Martin, Reihaneh Safavi-Naini, Huaxiong Wang: Bounds and Techniques for Efficient Redistribution of Secret Shares to New Access Structures. Comput. J. 42(8): 638-649 (1999)
50no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLReihaneh Safavi-Naini, Huaxiong Wang: Multireceiver Authentication Codes: Models, Bounds, Constructions, and Extensions. Inf. Comput. 151(1-2): 148-172 (1999)
1998
49Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLReihaneh Safavi-Naini, Yejing Wang: Bounds and Constructions for A3-code with Multi-senders. ACISP 1998: 159-168
48Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLShahrokh Saeednia, Reihaneh Safavi-Naini: Efficient Identity-Based Conference Key Distribution Protocols. ACISP 1998: 320-331
47Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLHossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini: Secret Sharing in Multilevel and Compartmented Groups. ACISP 1998: 367-378
46Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLHossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang: On Construction of Cumulative Secret Sharing Schemes. ACISP 1998: 379-390
45Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLReihaneh Safavi-Naini, Huaxiong Wang: Bounds and Constructions for Multireceiver Authentication Codes. ASIACRYPT 1998: 242-256
44Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLReihaneh Safavi-Naini, Huaxiong Wang: New Results on Multi-Receiver Authentication Codes. EUROCRYPT 1998: 527-541
43Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLReihaneh Safavi-Naini, Shahram Bakhtiari, Chris Charnes: MRD Hashing. FSE 1998: 134-149
42Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLShahrokh Saeednia, Reihaneh Safavi-Naini: On the Security of Girault`s Identification Scheme. Public Key Cryptography 1998: 149-153
41no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLReihaneh Safavi-Naini: Three Systems for Threshold Generation of Authenticators. Des. Codes Cryptography 13(3): 299-312 (1998)
1997
40no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLShahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk: A Message Authentication Code Based on Latin Squares. ACISP 1997: 194-203
39no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLChor Wah Man, Reihaneh Safavi-Naini: Democratic Key Escrow Scheme. ACISP 1997: 249-260
38no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLKeith M. Martin, Reihaneh Safavi-Naini: Multisender authentication systems with unconditional security. ICICS 1997: 130-143
37no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLHossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini: Remarks on the multiple assignment secret sharing scheme. ICICS 1997: 72-80
36no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLChris Charnes, Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini: Secret sharing in hierarchical groups. ICICS 1997: 81-86
35no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLShahrokh Saeednia, Reihaneh Safavi-Naini: A New Identity-Based Key Exchange Protocol Minimizing Computation and Communication. ISW 1997: 328-334
34Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAhmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini: A Multi-Level View Model for Secure Object-Oriented Databases. Data Knowl. Eng. 23(2): 97-117 (1997)
33Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLShahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk: On the Weakness of Gong's Collisionful Hash Functions. J. UCS 3(3): 185-196 (1997)
32Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAhmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini, Janusz R. Getta: Using Cryptographic Hash Functions for Discretionary Access Control in Object-Oriented Databases. J. UCS 3(6): 730-753 (1997)
1996
31no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAhmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini: Modeling a multi-level secure object-oriented database using views. ACISP 1996: 190-206
30no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMansour Esmaili, Reihaneh Safavi-Naini, Josef Pieprzyk: Evidential reasoning in network intrusion detection systems. ACISP 1996: 253-265
29no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLHossein Ghodosi, Josef Pieprzyk, Chris Charnes, Reihaneh Safavi-Naini: Cryptosystems for hierarchical groups. ACISP 1996: 275-286
28no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLShahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk: On selectable collisionful hash functions. ACISP 1996: 287-298
27no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLShahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk: On password-based authenticated key exchange using collisionful hash functions. ACISP 1996: 299-310
26no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJosef Pieprzyk, Hossein Ghodosi, Chris Charnes, Reihaneh Safavi-Naini: Cryptography based on transcendental numbers. ACISP 1996: 96-107
25Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMansour Esmaili, Bala Balachandran, Reihaneh Safavi-Naini, Josef Pieprzyk: Case-Based Reasoning for Intrusion Detection. ACSAC 1996: 214-223
24no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLReihaneh Safavi-Naini: Three Systems for Shared Generation of Authenticators. COCOON 1996: 401-410
23no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMansour Esmaili, Reihaneh Safavi-Naini, Josef Pieprzyk: Computer Intrusion Detection and Incomplete Information. IEA/AIE 1996: 778
22no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLReihaneh Safavi-Naini, L. Tombak: Near-perfect protection and key strategies in authentication codes under spoofing attack of order r. Ars Comb. 44: (1996)
21no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLReihaneh Safavi-Naini, L. Tombak: Authentication Codes in Plaintext and Chosen-Content Attacks. Des. Codes Cryptography 7(1-2): 83-99 (1996)
1995
20no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJosef Pieprzyk, Reihaneh Safavi-Naini: Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28 - December 1, 1994, Proceedings Springer 1995
19no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAhmad Baraani-Dastjerdi, Janusz R. Getta, Josef Pieprzyk, Reihaneh Safavi-Naini: A Cryptographic Solution to Discretionary Access Control in Structurally Object-Oriented Databases. Australasian Database Conference 1995: 0-
18no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLShahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk: Keyed Hash Functions. Cryptography: Policy and Algorithms 1995: 201-214
17Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAhmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini, Janusz R. Getta: A Model of Authorization for Object-Oriented Databases based on Object Views. DOOD 1995: 503-520
16Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAhmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini, Janusz R. Getta: A Cryptographic Mechanism for Object-Instance-Based Authorization in Object-Oriented Database Systems. OOER 1995: 44-54
1994
15Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLL. Tombak, Reihaneh Safavi-Naini: Authentication Codes That Are r-Fold Secure Against Spoofing. ACM Conference on Computer and Communications Security 1994: 166-169
14Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLChris Charnes, Josef Pieprzyk, Reihaneh Safavi-Naini: Conditionally Secure Secret Sharing Schemes with Disenrollment Capability. ACM Conference on Computer and Communications Security 1994: 89-95
13Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLReihaneh Safavi-Naini, L. Tombak: Combinatorial Structure of A-codes with r-fold Security. ASIACRYPT 1994: 211-223
12Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLReihaneh Safavi-Naini, L. Tombak: Authentication Codes in Plaintext and Chosen-content Attacks. EUROCRYPT 1994: 254-265
11Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLChris Charnes, Luke O'Connor, Josef Pieprzyk, Reihaneh Safavi-Naini, Yuliang Zheng: Comments on Soviet Encryption Algorithm. EUROCRYPT 1994: 433-438
10no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJonathan Giddy, Reihaneh Safavi-Naini: Automated Cryptanalysis of Transposition Ciphers. Comput. J. 37(5): 429-436 (1994)
1993
9Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLReihaneh Safavi-Naini, L. Tombak: Optimal Authentication Systems. EUROCRYPT 1993: 12-27
1992
8no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLL. Tombak, Reihaneh Safavi-Naini: Authentication Codes with Perfect Protection. AUSCRYPT 1992: 15-26
7no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLReihaneh Safavi-Naini, L. Tombak: Authentication Codes under Impersonation Attack. AUSCRYPT 1992: 35-47
6no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLE. A. Campbell, Reihaneh Safavi-Naini, P. A. Pleasants: Partial Belief and Probabilistic Reasoning in the Analysis of Secure Protocols. CSFW 1992: 84-91
1991
5Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLReihaneh Safavi-Naini: Feistel Type Authentication Codes. ASIACRYPT 1991: 170-178
4Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJosef Pieprzyk, Reihaneh Safavi-Naini: Randomized Authentication Systems. EUROCRYPT 1991: 472-481
3no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLReihaneh Safavi-Naini, Jennifer Seberry: Error-correcting codes for authentication and subliminal channels. IEEE Transactions on Information Theory 37(1): 13-17 (1991)
1990
2Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLReihaneh Safavi-Naini: Parallel Generation of Pseudo-Random Sequences. AUSCRYPT 1990: 176-193
1979
1no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLReihaneh Safavi-Naini, Ian F. Blake: Generalized t-Designs and Weighted Majority Decoding Information and Control 42(3): 261-282 (1979)

Coauthor Index

1Hadi Ahmadi [194]
2Russell Ang [134]
3Mina Askari [175]
4Mikhail J. Atallah [92]
5Joonsang Baek [125] [127] [128] [129] [132] [145] [150] [167] [176]
6Shahram Bakhtiari [18] [27] [28] [33] [40] [43]
7Bala Balachandran [25]
8Ahmad Baraani-Dastjerdi [16] [17] [19] [31] [32] [34]
9Lynn Margaret Batten [75] [153]
10Ian F. Blake [1]
11Gareth Brisbane [53] [64] [85]
12Rajkumar Buyya [135] [155]
13E. A. Campbell [6]
14Chris Charnes [11] [14] [26] [29] [36] [43] [75] [121]
15Xin Chen [127]
16Yun Chen [127]
17Paul D. Coddington [135]
18Giovanni Di Crescenzo [188]
19Nathan Curtis [117]
20Jörg Denzinger [175] [187]
21Yvo Desmedt [75] [90] [130] [166] [185]
22Mansour Esmaili [23] [25] [30]
23Keith B. Frikken [92]
24Ryoh Fuji-Hara [96]
25Jie Gao [175]
26Janusz R. Getta [16] [17] [19] [32]
27Hossein Ghodosi [26] [29] [37] [46] [47]
28Jonathan Giddy [10]
29Marc Gysin [63]
30Markus Hagenbuchner [186]
31Jeffrey Horton [131] [151] [160] [169] [186]
32Michael J. Jacobson Jr. [192]
33Mohammad Jafari [184]
34Shaoquan Jiang [177] [179] [183] [188]
35C. Kailasanathan [101]
36Larry Korba [181]
37Hartono Kurnio [71] [78] [83] [88] [93]
38Kaoru Kurosawa [116] [120] [138] [156]
39Kwok-Yan Lam [55]
40Wanqing Li [144] [147] [161] [193]
41Yuqiang Li [59]
42Qiong Liu [103] [124]
43Liang Lu [131] [160] [169] [186]
44Wenming Lu [144] [147] [161]
45Ling Luo [150]
46Tianchi Ma [155]
47Chor Wah Man [39]
48Steve Marsh [181]
49Keith M. Martin [36] [38] [51] [52] [60] [89] [122]
50Luke McAven [88] [108] [110] [118] [134] [157]
51Alfred Mertins [99] [126]
52Paul Montague [135]
53Yi Mu [178] [189]
54Adam Muhlbauer [173]
55Ching Yu Ng [178] [189]
56Lan Nguyen [97] [114] [115] [116] [120] [133] [138]
57Peter Nickolas [185]
58Luke O'Connor [11]
59Philip Ogunbona [53] [64] [76] [85] [101] [106] [111] [140] [144] [147] [161]
60Dingyi Pei [59]
61Duong Hieu Phan [148]
62Josef Pieprzyk [4] [11] [14] [16] [17] [18] [19] [20] [23] [25] [26] [27] [28] [29] [30] [31] [32] [33] [34] [36] [37] [40] [46] [47] [52] [54] [60] [61] [62] [75] [89]
63Angela Piper [99] [126] [182]
64P. A. Pleasants [6]
65Sunil Prabhakar [92]
66Mohammad Reza Reyhanitabar [170]
67Vincent Rijmen [192]
68Shahrokh Saeednia [35] [42] [48] [80]
69Farzad Salim [159] [163] [173]
70Robert Scealy [98]
71Jennifer Seberry (Jennifer Seberry Wallis) [3] [62] [63] [96] [104]
72Siamak Fayyaz Shahandashti [167] [174] [191]
73Nicholas Paul Sheppard [76] [98] [103] [109] [112] [124] [135] [142] [143] [159] [163] [172] [173] [184] [190]
74Hongsong Shi [183]
75Michal Sramka [175] [187]
76Sid Stamm [172]
77Chris Steketee [155]
78Jan Martin Surminen [142] [173]
79Willy Susilo [54] [61] [63] [65] [67] [71] [73] [80] [81] [87] [100] [107] [117] [123] [125] [128] [129] [131] [132] [145] [146] [149] [150] [155] [160] [164] [168] [169] [176] [178] [186] [189] [193]
80Gelareh Taban [162]
81Vu Dong Tô [84] [102] [105] [119]
82L. Tombak [7] [8] [9] [12] [13] [15] [21] [22]
83Dongvu Tonien [137] [146] [148] [152] [158] [165] [185]
84Ah Chung Tsoi [186]
85Mohammed Ashraful Tuhin [183]
86Udaya Kiran Tupakula [193]
87Takeyuki Uehara [56] [86] [106] [111] [112] [140]
88Vijay Varadharajan [193]
89Harikrishna Vasanta [142]
90Huaxiong Wang [44] [45] [46] [50] [51] [52] [55] [57] [60] [67] [70] [71] [72] [73] [75] [77] [78] [81] [82] [83] [88] [89] [90] [93] [95] [122] [130] [139] [141]
91Shuhong Wang [166] [170]
92Yejing Wang [49] [58] [59] [66] [68] [69] [74] [79] [84] [91] [94] [96]
93Yongge Wang [130]
94Andrew L. Wendelborn [135]
95Glen E. Wheeler [109]
96Rungrat Wiangsripanawan [164] [168]
97Peter R. Wild [89] [122] [165] [171]
98Duncan S. Wong [139]
99Chaoping Xing [77] [95]
100Sweah Liang Yong [186]
101Lan Yu [149]
102Moti Yung (Mordechai M. Yung) [108] [110] [118] [136] [154] [156]
103Fangguo Zhang [100] [102] [107] [123]
104Yuliang Zheng [11]

Colors in the list of coauthors

Copyright © Sun Mar 14 22:39:24 2010 by Michael Ley (ley@uni-trier.de)