![]() | 2010 | |
---|---|---|
194 | ![]() ![]() ![]() ![]() ![]() ![]() | Hadi Ahmadi, Reihaneh Safavi-Naini: Secret Key Agreement over a Pair of Independent Broadcast Channels CoRR abs/1001.3908: (2010) |
2009 | ||
193 | ![]() ![]() ![]() ![]() ![]() ![]() | Wanqing Li, Willy Susilo, Udaya Kiran Tupakula, Reihaneh Safavi-Naini, Vijay Varadharajan: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009 ACM 2009 |
192 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael J. Jacobson Jr., Vincent Rijmen, Reihaneh Safavi-Naini: Selected Areas in Cryptography, 16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers Springer 2009 |
191 | ![]() ![]() ![]() ![]() ![]() ![]() | Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini: Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems. AFRICACRYPT 2009: 198-216 |
190 | ![]() ![]() ![]() ![]() ![]() ![]() | Nicholas Paul Sheppard, Reihaneh Safavi-Naini: On the operational semantics of rights expression languages. Digital Rights Management Workshop 2009: 17-28 |
189 | ![]() ![]() ![]() ![]() ![]() ![]() | Ching Yu Ng, Willy Susilo, Yi Mu, Reihaneh Safavi-Naini: New Privacy Results on Synchronized RFID Authentication Protocols against Tag Tracing. ESORICS 2009: 321-336 |
188 | ![]() ![]() ![]() ![]() ![]() ![]() | Giovanni Di Crescenzo, Shaoquan Jiang, Reihaneh Safavi-Naini: Corruption-Localizing Hashing. ESORICS 2009: 489-504 |
187 | ![]() ![]() ![]() ![]() ![]() ![]() | Michal Sramka, Reihaneh Safavi-Naini, Jörg Denzinger: An Attack on the Privacy of Sanitized Data that Fuses the Outputs of Multiple Data Miners. ICDM Workshops 2009: 130-137 |
186 | ![]() ![]() ![]() ![]() ![]() ![]() | Liang Lu, Reihaneh Safavi-Naini, Markus Hagenbuchner, Willy Susilo, Jeffrey Horton, Sweah Liang Yong, Ah Chung Tsoi: Ranking Attack Graphs with Graph Neural Networks. ISPEC 2009: 345-359 |
185 | ![]() ![]() ![]() ![]() ![]() ![]() | Dongvu Tonien, Reihaneh Safavi-Naini, Peter Nickolas, Yvo Desmedt: Unconditionally Secure Approximate Message Authentication. IWCC 2009: 233-247 |
184 | ![]() ![]() ![]() ![]() ![]() ![]() | Nicholas Paul Sheppard, Reihaneh Safavi-Naini, Mohammad Jafari: A Digital Rights Management Model for Healthcare. POLICY 2009: 106-109 |
183 | ![]() ![]() ![]() ![]() ![]() ![]() | Hongsong Shi, Shaoquan Jiang, Reihaneh Safavi-Naini, Mohammed Ashraful Tuhin: Optimal Secure Message Transmission by Public Discussion CoRR abs/0901.2192: (2009) |
182 | ![]() ![]() ![]() ![]() ![]() ![]() | Angela Piper, Reihaneh Safavi-Naini: How to Compare Image Watermarking Algorithms. T. Data Hiding and Multimedia Security 4: 1-28 (2009) |
2008 | ||
181 | ![]() ![]() ![]() ![]() ![]() ![]() | Larry Korba, Steve Marsh, Reihaneh Safavi-Naini: Sixth Annual Conference on Privacy, Security and Trust, PST 2008, October 1-3, 2008, Fredericton, New Brunswick, Canada IEEE 2008 |
180 | ![]() ![]() ![]() ![]() ![]() ![]() | Reihaneh Safavi-Naini: Information Theoretic Security, Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008, Proceedings Springer 2008 |
179 | ![]() ![]() ![]() ![]() ![]() ![]() | Reihaneh Safavi-Naini, Shaoquan Jiang: Non-interactive conference key distribution and its applications. ASIACCS 2008: 271-282 |
178 | ![]() ![]() ![]() ![]() ![]() ![]() | Ching Yu Ng, Willy Susilo, Yi Mu, Reihaneh Safavi-Naini: RFID Privacy Models Revisited. ESORICS 2008: 251-266 |
177 | ![]() ![]() ![]() ![]() ![]() ![]() | Shaoquan Jiang, Reihaneh Safavi-Naini: An Efficient Deniable Key Exchange Protocol (Extended Abstract). Financial Cryptography 2008: 47-52 |
176 | ![]() ![]() ![]() ![]() ![]() ![]() | Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: Public Key Encryption with Keyword Search Revisited. ICCSA (1) 2008: 1249-1259 |
175 | ![]() ![]() ![]() ![]() ![]() ![]() | Michal Sramka, Reihaneh Safavi-Naini, Jörg Denzinger, Mina Askari, Jie Gao: Utility of Knowledge Extracted from Unsanitized Data when Applied to Sanitized Data. PST 2008: 227-231 |
174 | ![]() ![]() ![]() ![]() ![]() ![]() | Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini: Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures. Public Key Cryptography 2008: 121-140 |
173 | ![]() ![]() ![]() ![]() ![]() ![]() | Adam Muhlbauer, Reihaneh Safavi-Naini, Farzad Salim, Nicholas Paul Sheppard, Jan Martin Surminen: Location constraints in digital rights management. Computer Communications 31(6): 1173-1180 (2008) |
172 | ![]() ![]() ![]() ![]() ![]() ![]() | Sid Stamm, Nicholas Paul Sheppard, Reihaneh Safavi-Naini: Implementing Trusted Terminals with a and SITDRM. Electr. Notes Theor. Comput. Sci. 197(1): 73-85 (2008) |
171 | ![]() ![]() ![]() ![]() ![]() ![]() | Reihaneh Safavi-Naini, Peter R. Wild: Information Theoretic Bounds on Authentication Systems in Query Model. IEEE Transactions on Information Theory 54(6): 2426-2436 (2008) |
2007 | ||
170 | ![]() ![]() ![]() ![]() ![]() ![]() | Mohammad Reza Reyhanitabar, Shuhong Wang, Reihaneh Safavi-Naini: Non-interactive Manual Channel Message Authentication Based on eTCR Hash Functions. ACISP 2007: 385-399 |
169 | ![]() ![]() ![]() ![]() ![]() ![]() | Liang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo: An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme. ACNS 2007: 65-86 |
168 | ![]() ![]() ![]() ![]() ![]() ![]() | Rungrat Wiangsripanawan, Willy Susilo, Reihaneh Safavi-Naini: Design Principles for Low Latency Anonymous Network Systems Secure against Timing Attacks. ACSW Frontiers 2007: 183-191 |
167 | ![]() ![]() ![]() ![]() ![]() ![]() | Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini, Joonsang Baek: Concurrently-secure credential ownership proofs. ASIACCS 2007: 161-172 |
166 | ![]() ![]() ![]() ![]() ![]() ![]() | Reihaneh Safavi-Naini, Shuhong Wang, Yvo Desmedt: Unconditionally secure ring authentication. ASIACCS 2007: 173-181 |
165 | ![]() ![]() ![]() ![]() ![]() ![]() | Dongvu Tonien, Reihaneh Safavi-Naini, Peter R. Wild: Combinatorial characterizations of authentication codes in verification oracle model. ASIACCS 2007: 183-193 |
164 | ![]() ![]() ![]() ![]() ![]() ![]() | Rungrat Wiangsripanawan, Willy Susilo, Reihaneh Safavi-Naini: Achieving Mobility and Anonymity in IP-Based Networks. CANS 2007: 60-79 |
163 | ![]() ![]() ![]() ![]() ![]() ![]() | Farzad Salim, Nicholas Paul Sheppard, Reihaneh Safavi-Naini: Using SITDRM for privacy rights management. CHIMIT 2007: 11 |
162 | ![]() ![]() ![]() ![]() ![]() ![]() | Gelareh Taban, Reihaneh Safavi-Naini: Key Establishment in Heterogeneous Self-organized Networks. ESAS 2007: 58-72 |
161 | ![]() ![]() ![]() ![]() ![]() ![]() | Wenming Lu, Wanqing Li, Reihaneh Safavi-Naini, Philip Ogunbona: A Maximum Likelihood Watermark Decoding Scheme. ICME 2007: 1247-1250 |
160 | ![]() ![]() ![]() ![]() ![]() ![]() | Liang Lu, Jeffrey Horton, Reihaneh Safavi-Naini, Willy Susilo: Transport Layer Identification of Skype Traffic. ICOIN 2007: 465-481 |
159 | ![]() ![]() ![]() ![]() ![]() ![]() | Farzad Salim, Nicholas Paul Sheppard, Reihaneh Safavi-Naini: Enforcing P3P Policies Using a Digital Rights Management System. Privacy Enhancing Technologies 2007: 200-217 |
158 | ![]() ![]() ![]() ![]() ![]() ![]() | Dongvu Tonien, Reihaneh Safavi-Naini: Construction of deletion correcting codes using generalized Reed-Solomon codes and their subcodes. Des. Codes Cryptography 42(2): 227-237 (2007) |
157 | ![]() ![]() ![]() ![]() ![]() ![]() | Luke McAven, Reihaneh Safavi-Naini: Classification of the Deletion Correcting Capabilities of Reed-Solomon Codes of Dimension 2 Over Prime Fields. IEEE Transactions on Information Theory 53(6): 2280-2294 (2007) |
2006 | ||
156 | ![]() ![]() ![]() ![]() ![]() ![]() | Moti Yung, Kaoru Kurosawa, Reihaneh Safavi-Naini: Proceedings of the Sixth ACM Workshop on Digital Rights Management, Alexandria, VA, USA, October 30, 2006 ACM 2006 |
155 | ![]() ![]() ![]() ![]() ![]() ![]() | Rajkumar Buyya, Tianchi Ma, Reihaneh Safavi-Naini, Chris Steketee, Willy Susilo: The proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Hobart, Tasmania, Australia, January 2006 Australian Computer Society 2006 |
154 | ![]() ![]() ![]() ![]() ![]() ![]() | Reihaneh Safavi-Naini, Moti Yung: Digital Rights Management: Technologies, Issues, Challenges and Systems, First International Conference, DRMTICS 2005, Sydney, Australia, October 31 - November 2, 2005, Revised Selected Papers Springer 2006 |
153 | ![]() ![]() ![]() ![]() ![]() ![]() | Lynn Margaret Batten, Reihaneh Safavi-Naini: Information Security and Privacy, 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings Springer 2006 |
152 | ![]() ![]() ![]() ![]() ![]() ![]() | Dongvu Tonien, Reihaneh Safavi-Naini: An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families. ACNS 2006: 82-97 |
151 | ![]() ![]() ![]() ![]() ![]() ![]() | Jeffrey Horton, Reihaneh Safavi-Naini: Detecting Policy Violations through Traffic Analysis. ACSAC 2006: 109-120 |
150 | ![]() ![]() ![]() ![]() ![]() ![]() | Ling Luo, Reihaneh Safavi-Naini, Joonsang Baek, Willy Susilo: Self-organised group key management for ad hoc networks. ASIACCS 2006: 138-147 |
149 | ![]() ![]() ![]() ![]() ![]() ![]() | Lan Yu, Willy Susilo, Reihaneh Safavi-Naini: X2BT Trusted Reputation System: A Robust Mechanism for P2P Networks. CANS 2006: 364-380 |
148 | ![]() ![]() ![]() ![]() ![]() ![]() | Duong Hieu Phan, Reihaneh Safavi-Naini, Dongvu Tonien: Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability. ICALP (2) 2006: 264-275 |
147 | ![]() ![]() ![]() ![]() ![]() ![]() | Wenming Lu, Wanqing Li, Reihaneh Safavi-Naini, Philip Ogunbona: A Pixel-Based Robust Imagewatermarking System. ICME 2006: 1565-1568 |
146 | ![]() ![]() ![]() ![]() ![]() ![]() | Dongvu Tonien, Willy Susilo, Reihaneh Safavi-Naini: Multi-party Concurrent Signatures. ISC 2006: 131-145 |
145 | ![]() ![]() ![]() ![]() ![]() ![]() | Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search. ISC 2006: 217-232 |
144 | ![]() ![]() ![]() ![]() ![]() ![]() | Wenming Lu, Wanqing Li, Reihaneh Safavi-Naini, Philip Ogunbona: Optimal Image Watermark Decoding. PCM 2006: 141-149 |
143 | ![]() ![]() ![]() ![]() ![]() ![]() | Nicholas Paul Sheppard, Reihaneh Safavi-Naini: Protecting Privacy with the MPEG-21 IPMP Framework. Privacy Enhancing Technologies 2006: 152-171 |
142 | ![]() ![]() ![]() ![]() ![]() ![]() | Harikrishna Vasanta, Reihaneh Safavi-Naini, Nicholas Paul Sheppard, Jan Martin Surminen: Distributed Management of OMA DRM Domains. WISA 2006: 237-251 |
141 | ![]() ![]() ![]() ![]() ![]() ![]() | Reihaneh Safavi-Naini, Huaxiong Wang: Secret sharing schemes with partial broadcast channels. Des. Codes Cryptography 41(1): 5-22 (2006) |
140 | ![]() ![]() ![]() ![]() ![]() ![]() | Takeyuki Uehara, Reihaneh Safavi-Naini, Philip Ogunbona: Recovering DC Coefficients in Block-Based DCT. IEEE Transactions on Image Processing 15(11): 3592-3596 (2006) |
139 | ![]() ![]() ![]() ![]() ![]() ![]() | Reihaneh Safavi-Naini, Huaxiong Wang, Duncan S. Wong: Resilient Lkh: Secure Multicast Key Distribution Schemes. Int. J. Found. Comput. Sci. 17(5): 1205-1222 (2006) |
138 | ![]() ![]() ![]() ![]() ![]() ![]() | Lan Nguyen, Reihaneh Safavi-Naini, Kaoru Kurosawa: Verifiable shuffles: a formal model and a Paillier-based three-round construction with provable security. Int. J. Inf. Sec. 5(4): 241-255 (2006) |
137 | ![]() ![]() ![]() ![]() ![]() ![]() | Dongvu Tonien, Reihaneh Safavi-Naini: Recursive constructions of secure codes and hash families using difference function families. J. Comb. Theory, Ser. A 113(4): 664-674 (2006) |
2005 | ||
136 | ![]() ![]() ![]() ![]() ![]() ![]() | Reihaneh Safavi-Naini, Moti Yung: Proceedings of the Fifth ACM Workshop on Digital Rights Management, Alexandria, VA, USA, November 7, 2005 ACM 2005 |
135 | ![]() ![]() ![]() ![]() ![]() ![]() | Rajkumar Buyya, Paul D. Coddington, Paul Montague, Reihaneh Safavi-Naini, Nicholas Paul Sheppard, Andrew L. Wendelborn: ACSW Frontiers 2005, 2005 ACSW Workshops - the Australasian Workshop on Grid Computing and e-Research (AusGrid 2005) and the Third Australasian Information Security Workshop (AISW 2005), Newcastle, NSW, Australia, January/February 2005 Australian Computer Society 2005 |
134 | ![]() ![]() ![]() ![]() ![]() ![]() | Russell Ang, Reihaneh Safavi-Naini, Luke McAven: Cancelable Key-Based Fingerprint Templates. ACISP 2005: 242-252 |
133 | ![]() ![]() ![]() ![]() ![]() ![]() | Lan Nguyen, Reihaneh Safavi-Naini: Dynamic k-Times Anonymous Authentication. ACNS 2005: 318-333 |
132 | ![]() ![]() ![]() ![]() ![]() ![]() | Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: Universal Designated Verifier Signature Proof (or How to Efficiently Prove Knowledge of a Signature). ASIACRYPT 2005: 644-661 |
131 | ![]() ![]() ![]() ![]() ![]() ![]() | Liang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo: On Securing RTP-Based Streaming Content with Firewalls. CANS 2005: 304-319 |
130 | ![]() ![]() ![]() ![]() ![]() ![]() | Yvo Desmedt, Yongge Wang, Reihaneh Safavi-Naini, Huaxiong Wang: Radio Networks with Reliable Communication. COCOON 2005: 156-166 |
129 | ![]() ![]() ![]() ![]() ![]() ![]() | Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: Certificateless Public Key Encryption Without Pairing. ISC 2005: 134-148 |
128 | ![]() ![]() ![]() ![]() ![]() ![]() | Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: Token-Controlled Public Key Encryption. ISPEC 2005: 386-397 |
127 | ![]() ![]() ![]() ![]() ![]() ![]() | Yun Chen, Reihaneh Safavi-Naini, Joonsang Baek, Xin Chen: Server-Aided RSA Key Generation Against Collusion Attack. MADNES 2005: 27-37 |
126 | ![]() ![]() ![]() ![]() ![]() ![]() | Angela Piper, Reihaneh Safavi-Naini, Alfred Mertins: Resolution and quality scalable spread spectrum image watermarking. MM&Sec 2005: 79-90 |
125 | ![]() ![]() ![]() ![]() ![]() ![]() | Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption. Public Key Cryptography 2005: 380-397 |
124 | ![]() ![]() ![]() ![]() ![]() ![]() | Qiong Liu, Reihaneh Safavi-Naini, Nicholas Paul Sheppard: A License Transfer System for Supporting Content Portability in Digital Rights Management. SEC 2005: 189-204 |
123 | ![]() ![]() ![]() ![]() ![]() ![]() | Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo: Attack on Han et al.'s ID-based confirmer (undeniable) signature at ACM-EC'03. Applied Mathematics and Computation 170(2): 1166-1169 (2005) |
122 | ![]() ![]() ![]() ![]() ![]() ![]() | Keith M. Martin, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild: Distributing the Encryption and Decryption of a Block Cipher. Des. Codes Cryptography 36(3): 263-287 (2005) |
121 | ![]() ![]() ![]() ![]() ![]() ![]() | Reihaneh Safavi-Naini, Chris Charnes: MRD Hashing. Des. Codes Cryptography 37(2): 229-242 (2005) |
120 | ![]() ![]() ![]() ![]() ![]() ![]() | Lan Nguyen, Reihaneh Safavi-Naini, Kaoru Kurosawa: A Provably Secure and Efficient Verifiable Shuffle based on a Variant of the Paillier Cryptosystem. J. UCS 11(6): 986-1010 (2005) |
2004 | ||
119 | ![]() ![]() ![]() ![]() ![]() ![]() | Vu Dong Tô, Reihaneh Safavi-Naini: Linear Code Implies Public-Key Traitor Tracing with Revocation. ACISP 2004: 24-35 |
118 | ![]() ![]() ![]() ![]() ![]() ![]() | Luke McAven, Reihaneh Safavi-Naini, Moti Yung: Unconditionally Secure Encryption Under Strong Attacks. ACISP 2004: 427-439 |
117 | ![]() ![]() ![]() ![]() ![]() ![]() | Nathan Curtis, Reihaneh Safavi-Naini, Willy Susilo: X2Rep: Enhanced Trust Semantics for the XRep Protocol. ACNS 2004: 205-219 |
116 | ![]() ![]() ![]() ![]() ![]() ![]() | Lan Nguyen, Reihaneh Safavi-Naini, Kaoru Kurosawa: Verifiable Shuffles: A Formal Model and a Paillier-Based Efficient Construction with Provable Security. ACNS 2004: 61-75 |
115 | ![]() ![]() ![]() ![]() ![]() ![]() | Lan Nguyen, Reihaneh Safavi-Naini: Efficient and Provably Secure Trapdoor-Free Group Signature Schemes from Bilinear Pairings. ASIACRYPT 2004: 372-386 |
114 | ![]() ![]() ![]() ![]() ![]() ![]() | Lan Nguyen, Reihaneh Safavi-Naini: An Efficient Verifiable Shuffle with Perfect Zero-knowledge Proof System. Cryptographic Algorithms and their Uses 2004: 40-56 |
113 | ![]() ![]() ![]() ![]() ![]() ![]() | Reihaneh Safavi-Naini: Tracing traitors: a selective survey. Digital Rights Management Workshop 2004: 72 |
112 | ![]() ![]() ![]() ![]() ![]() ![]() | Reihaneh Safavi-Naini, Nicholas Paul Sheppard, Takeyuki Uehara: Import/export in digital rights management. Digital Rights Management Workshop 2004: 99-110 |
111 | ![]() ![]() ![]() ![]() ![]() ![]() | Takeyuki Uehara, Reihaneh Safavi-Naini, Philip Ogunbona: An MPEG tolerant authentication system for video data. ICME 2004: 891-894 |
110 | ![]() ![]() ![]() ![]() ![]() ![]() | Luke McAven, Reihaneh Safavi-Naini, Moti Yung: Symmetric Authentication Codes with Secrecy and Unconditionally Secure Authenticated Encryption. INDOCRYPT 2004: 148-161 |
109 | ![]() ![]() ![]() ![]() ![]() ![]() | Glen E. Wheeler, Reihaneh Safavi-Naini, Nicholas Paul Sheppard: Weighted Segmented Digital Watermarking. IWDW 2004: 89-100 |
108 | ![]() ![]() ![]() ![]() ![]() ![]() | Reihaneh Safavi-Naini, Luke McAven, Moti Yung: General Group Authentication Codes and Their Relation to "Unconditionally-Secure Signatures". Public Key Cryptography 2004: 231-247 |
107 | ![]() ![]() ![]() ![]() ![]() ![]() | Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo: An Efficient Signature Scheme from Bilinear Pairings and Its Applications. Public Key Cryptography 2004: 277-290 |
106 | ![]() ![]() ![]() ![]() ![]() ![]() | Takeyuki Uehara, Reihaneh Safavi-Naini, Philip Ogunbona: A secure and flexible authentication system for digital images. Multimedia Syst. 9(5): 441-456 (2004) |
105 | ![]() ![]() ![]() ![]() ![]() ![]() | Vu Dong Tô, Reihaneh Safavi-Naini: On the Maximal Codes of Length 3 with the 2-Identifiable Parent Property. SIAM J. Discrete Math. 17(4): 548-570 (2004) |
2003 | ||
104 | ![]() ![]() ![]() ![]() ![]() ![]() | Reihaneh Safavi-Naini, Jennifer Seberry: Information Security and Privacy, 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings Springer 2003 |
103 | ![]() ![]() ![]() ![]() ![]() ![]() | Qiong Liu, Reihaneh Safavi-Naini, Nicholas Paul Sheppard: Digital Rights Management for Content Distribution. ACSW Frontiers 2003: 49-58 |
102 | ![]() ![]() ![]() ![]() ![]() ![]() | Vu Dong Tô, Reihaneh Safavi-Naini, Fangguo Zhang: New traitor tracing schemes using bilinear map. Digital Rights Management Workshop 2003: 67-76 |
101 | ![]() ![]() ![]() ![]() ![]() ![]() | C. Kailasanathan, Reihaneh Safavi-Naini, Philip Ogunbona: Compression Tolerant DCT Based Image Hash. ICDCS Workshops 2003: 562-567 |
100 | ![]() ![]() ![]() ![]() ![]() ![]() | Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo: Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings. INDOCRYPT 2003: 191-204 |
99 | ![]() ![]() ![]() ![]() ![]() ![]() | Angela Piper, Reihaneh Safavi-Naini, Alfred Mertins: Coefficient Selection Methods for Scalable Spread Spectrum Watermarking. IWDW 2003: 235-246 |
98 | ![]() ![]() ![]() ![]() ![]() ![]() | Robert Scealy, Reihaneh Safavi-Naini, Nicholas Paul Sheppard: Performance Measurement of Watermark Embedding Patterns. IWDW 2003: 77-85 |
97 | ![]() ![]() ![]() ![]() ![]() ![]() | Lan Nguyen, Reihaneh Safavi-Naini: Breaking and Mending Resilient Mix-Nets. Privacy Enhancing Technologies 2003: 66-80 |
96 | ![]() ![]() ![]() ![]() ![]() ![]() | Yejing Wang, Jennifer Seberry, Reihaneh Safavi-Naini, Ryoh Fuji-Hara: A Note on the Exposure Property of SBIBD. Electronic Notes in Discrete Mathematics 15: 225-227 (2003) |
95 | ![]() ![]() ![]() ![]() ![]() ![]() | Huaxiong Wang, Chaoping Xing, Reihaneh Safavi-Naini: Linear authentication codes: bounds and constructions. IEEE Transactions on Information Theory 49(4): 866-872 (2003) |
94 | ![]() ![]() ![]() ![]() ![]() ![]() | Reihaneh Safavi-Naini, Yejing Wang: Sequential traitor tracing. IEEE Transactions on Information Theory 49(5): 1319-1326 (2003) |
2002 | ||
93 | ![]() ![]() ![]() ![]() ![]() ![]() | Hartono Kurnio, Reihaneh Safavi-Naini, Huaxiong Wang: A Secure Re-keying Scheme with Key Recovery Property. ACISP 2002: 40-55 |
92 | ![]() ![]() ![]() ![]() ![]() ![]() | Keith B. Frikken, Mikhail J. Atallah, Sunil Prabhakar, Reihaneh Safavi-Naini: Optimal Parallel I/O for Range Queries through Replication. DEXA 2002: 669-678 |
91 | ![]() ![]() ![]() ![]() ![]() ![]() | Reihaneh Safavi-Naini, Yejing Wang: Traitor Tracing for Shortened and Corrupted Fingerprints. Digital Rights Management Workshop 2002: 81-100 |
90 | ![]() ![]() ![]() ![]() ![]() ![]() | Yvo Desmedt, Reihaneh Safavi-Naini, Huaxiong Wang: Redistribution of Mechanical Secret Shares. Financial Cryptography 2002: 238-252 |
89 | ![]() ![]() ![]() ![]() ![]() ![]() | Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild: Threshold MACs. ICISC 2002: 237-252 |
88 | ![]() ![]() ![]() ![]() ![]() ![]() | Hartono Kurnio, Luke McAven, Reihaneh Safavi-Naini, Huaxiong Wang: A Dynamic Group Key Distribution Scheme with Flexible User Join. ICISC 2002: 478-496 |
87 | ![]() ![]() ![]() ![]() ![]() ![]() | Willy Susilo, Reihaneh Safavi-Naini: An Efficient Fail-Stop Signature Scheme Based on Factorization. ICISC 2002: 62-74 |
86 | ![]() ![]() ![]() ![]() ![]() ![]() | Takeyuki Uehara, Reihaneh Safavi-Naini: On (In)security of "A Robust Image Authentication Method". IEEE Pacific Rim Conference on Multimedia 2002: 1025-1032 |
85 | ![]() ![]() ![]() ![]() ![]() ![]() | Gareth Brisbane, Reihaneh Safavi-Naini, Philip Ogunbona: An Algorithm for Data Hiding Using Median Cut Segmentation. IEEE Pacific Rim Conference on Multimedia 2002: 89-96 |
84 | ![]() ![]() ![]() ![]() ![]() ![]() | Vu Dong Tô, Reihaneh Safavi-Naini, Yejing Wang: A 2-Secure Code with Efficient Tracing Algorithm. INDOCRYPT 2002: 149-162 |
83 | ![]() ![]() ![]() ![]() ![]() ![]() | Hartono Kurnio, Reihaneh Safavi-Naini, Huaxiong Wang: A Group Key Distribution Scheme with Decentralised User Join. SCN 2002: 146-163 |
82 | ![]() ![]() ![]() ![]() ![]() ![]() | Reihaneh Safavi-Naini, Huaxiong Wang: Bounds and Constructions for Threshold Shared Generation of Authenticators. Int. J. Comput. Math. 79(12): 1285-1301 (2002) |
2001 | ||
81 | ![]() ![]() ![]() ![]() ![]() ![]() | Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang: How to Construct Fail-Stop Confirmer Signature Schemes. ACISP 2001: 435-444 |
80 | ![]() ![]() ![]() ![]() ![]() ![]() | Shahrokh Saeednia, Reihaneh Safavi-Naini, Willy Susilo: On Classifying Conference Key Distribution Protocols. ACISP 2001: 51-59 |
79 | ![]() ![]() ![]() ![]() ![]() ![]() | Reihaneh Safavi-Naini, Yejing Wang: Collusion Secure q-ary Fingerprinting for Perceptual Content. Digital Rights Management Workshop 2001: 57-75 |
78 | ![]() ![]() ![]() ![]() ![]() ![]() | Hartono Kurnio, Reihaneh Safavi-Naini, Huaxiong Wang: Efficient Revocation Schemes for Secure Multicast. ICISC 2001: 160-177 |
77 | ![]() ![]() ![]() ![]() ![]() ![]() | Reihaneh Safavi-Naini, Huaxiong Wang, Chaoping Xing: Linear Authentication Codes: Bounds and Constructions. INDOCRYPT 2001: 127-135 |
76 | ![]() ![]() ![]() ![]() ![]() ![]() | Nicholas Paul Sheppard, Reihaneh Safavi-Naini, Philip Ogunbona: On multiple watermarking. MM&Sec 2001: 3-6 |
75 | ![]() ![]() ![]() ![]() ![]() ![]() | Yvo Desmedt, Reihaneh Safavi-Naini, Huaxiong Wang, Lynn Margaret Batten, Chris Charnes, Josef Pieprzyk: Broadcast anti-jamming systems. Computer Networks 35(2-3): 223-236 (2001) |
74 | ![]() ![]() ![]() ![]() ![]() ![]() | Reihaneh Safavi-Naini, Yejing Wang: New results on frame-proof codes and traceability schemes. IEEE Transactions on Information Theory 47(7): 3029-3033 (2001) |
73 | ![]() ![]() ![]() ![]() ![]() ![]() | Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang: An Efficient Construction for Fail-Stop Signature for Long Messages. J. Inf. Sci. Eng. 17(6): 879-898 (2001) |
72 | ![]() ![]() ![]() ![]() ![]() ![]() | Reihaneh Safavi-Naini, Huaxiong Wang: Broadcast authentication for group communication. Theor. Comput. Sci. 269(1-2): 1-21 (2001) |
2000 | ||
71 | ![]() ![]() ![]() ![]() ![]() ![]() | Hartono Kurnio, Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang: Key Management for Secure Multicast with Dynamic Controller. ACISP 2000: 178-190 |
70 | ![]() ![]() ![]() ![]() ![]() ![]() | Reihaneh Safavi-Naini, Huaxiong Wang: New constructions for multicast re-keying schemes using perfect hash families. ACM Conference on Computer and Communications Security 2000: 228-234 |
69 | ![]() ![]() ![]() ![]() ![]() ![]() | Reihaneh Safavi-Naini, Yejing Wang: A Combinatorial Approach to Asymmetric Traitor Tracing. COCOON 2000: 416-425 |
68 | ![]() ![]() ![]() ![]() ![]() ![]() | Reihaneh Safavi-Naini, Yejing Wang: Sequential Traitor Tracing. CRYPTO 2000: 316-332 |
67 | ![]() ![]() ![]() ![]() ![]() ![]() | Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang: Fail-Stop Signature for Long Messages. INDOCRYPT 2000: 165-177 |
66 | ![]() ![]() ![]() ![]() ![]() ![]() | Reihaneh Safavi-Naini, Yejing Wang: Anonymous Traceability Schemes with Unconditional Security. INDOCRYPT 2000: 250-261 |
65 | ![]() ![]() ![]() ![]() ![]() ![]() | Reihaneh Safavi-Naini, Willy Susilo: Threshold Fail-Stop Signature Schemes Based on Discrete Logarithm and Factorization. ISW 2000: 292-307 |
64 | ![]() ![]() ![]() ![]() ![]() ![]() | Gareth Brisbane, Reihaneh Safavi-Naini, Philip Ogunbona: Region-Based Watermarking by Distribution Adjustment. ISW 2000: 54-68 |
63 | ![]() ![]() ![]() ![]() ![]() ![]() | Willy Susilo, Reihaneh Safavi-Naini, Marc Gysin, Jennifer Seberry: A New and Efficient Fail-stop Signature Scheme. Comput. J. 43(5): 430-437 (2000) |
1999 | ||
62 | ![]() ![]() ![]() ![]() ![]() ![]() | Josef Pieprzyk, Reihaneh Safavi-Naini, Jennifer Seberry: Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings Springer 1999 |
61 | ![]() ![]() ![]() ![]() ![]() ![]() | Willy Susilo, Reihaneh Safavi-Naini, Josef Pieprzyk: Fail-Stop Threshold Signature Schemes Based on Elliptic Curves. ACISP 1999: 103-116 |
60 | ![]() ![]() ![]() ![]() ![]() ![]() | Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang: Changing Thresholds in the Absence of Secure Channels. ACISP 1999: 177-191 |
59 | ![]() ![]() ![]() ![]() ![]() ![]() | Dingyi Pei, Yuqiang Li, Yejing Wang, Reihaneh Safavi-Naini: Characterization of Optimal Authentication Codes with Arbitration. ACISP 1999: 303-313 |
58 | ![]() ![]() ![]() ![]() ![]() ![]() | Yejing Wang, Reihaneh Safavi-Naini: A3-Codes under Collusion Attacks. ASIACRYPT 1999: 390-398 |
57 | ![]() ![]() ![]() ![]() ![]() ![]() | Reihaneh Safavi-Naini, Huaxiong Wang: Broadcast Authentication in Group Communication. ASIACRYPT 1999: 399-411 |
56 | ![]() ![]() ![]() ![]() ![]() ![]() | Takeyuki Uehara, Reihaneh Safavi-Naini: Attack on Liu/Farrell/Boyd Arithmetic Coding Encryption Scheme. Communications and Multimedia Security 1999: 273-290 |
55 | ![]() ![]() ![]() ![]() ![]() ![]() | Reihaneh Safavi-Naini, Huaxiong Wang, Kwok-Yan Lam: A New Approach to Robust Threshold RSA Signature Schemes. ICISC 1999: 184-196 |
54 | ![]() ![]() ![]() ![]() ![]() ![]() | Willy Susilo, Reihaneh Safavi-Naini, Josef Pieprzyk: RSA-Based Fail-Stop Signature Schemes. ICPP Workshops 1999: 161-166 |
53 | ![]() ![]() ![]() ![]() ![]() ![]() | Gareth Brisbane, Reihaneh Safavi-Naini, Philip Ogunbona: Region-Based Watermarking for Images. ISW 1999: 154-166 |
52 | ![]() ![]() ![]() ![]() ![]() ![]() | Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang: Changing Thresholds in the Absence of Secure Channels. Australian Computer Journal 31(2): 34-43 (1999) |
51 | ![]() ![]() ![]() ![]() ![]() ![]() | Keith M. Martin, Reihaneh Safavi-Naini, Huaxiong Wang: Bounds and Techniques for Efficient Redistribution of Secret Shares to New Access Structures. Comput. J. 42(8): 638-649 (1999) |
50 | ![]() ![]() ![]() ![]() ![]() ![]() | Reihaneh Safavi-Naini, Huaxiong Wang: Multireceiver Authentication Codes: Models, Bounds, Constructions, and Extensions. Inf. Comput. 151(1-2): 148-172 (1999) |
1998 | ||
49 | ![]() ![]() ![]() ![]() ![]() ![]() | Reihaneh Safavi-Naini, Yejing Wang: Bounds and Constructions for A3-code with Multi-senders. ACISP 1998: 159-168 |
48 | ![]() ![]() ![]() ![]() ![]() ![]() | Shahrokh Saeednia, Reihaneh Safavi-Naini: Efficient Identity-Based Conference Key Distribution Protocols. ACISP 1998: 320-331 |
47 | ![]() ![]() ![]() ![]() ![]() ![]() | Hossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini: Secret Sharing in Multilevel and Compartmented Groups. ACISP 1998: 367-378 |
46 | ![]() ![]() ![]() ![]() ![]() ![]() | Hossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang: On Construction of Cumulative Secret Sharing Schemes. ACISP 1998: 379-390 |
45 | ![]() ![]() ![]() ![]() ![]() ![]() | Reihaneh Safavi-Naini, Huaxiong Wang: Bounds and Constructions for Multireceiver Authentication Codes. ASIACRYPT 1998: 242-256 |
44 | ![]() ![]() ![]() ![]() ![]() ![]() | Reihaneh Safavi-Naini, Huaxiong Wang: New Results on Multi-Receiver Authentication Codes. EUROCRYPT 1998: 527-541 |
43 | ![]() ![]() ![]() ![]() ![]() ![]() | Reihaneh Safavi-Naini, Shahram Bakhtiari, Chris Charnes: MRD Hashing. FSE 1998: 134-149 |
42 | ![]() ![]() ![]() ![]() ![]() ![]() | Shahrokh Saeednia, Reihaneh Safavi-Naini: On the Security of Girault`s Identification Scheme. Public Key Cryptography 1998: 149-153 |
41 | ![]() ![]() ![]() ![]() ![]() ![]() | Reihaneh Safavi-Naini: Three Systems for Threshold Generation of Authenticators. Des. Codes Cryptography 13(3): 299-312 (1998) |
1997 | ||
40 | ![]() ![]() ![]() ![]() ![]() ![]() | Shahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk: A Message Authentication Code Based on Latin Squares. ACISP 1997: 194-203 |
39 | ![]() ![]() ![]() ![]() ![]() ![]() | Chor Wah Man, Reihaneh Safavi-Naini: Democratic Key Escrow Scheme. ACISP 1997: 249-260 |
38 | ![]() ![]() ![]() ![]() ![]() ![]() | Keith M. Martin, Reihaneh Safavi-Naini: Multisender authentication systems with unconditional security. ICICS 1997: 130-143 |
37 | ![]() ![]() ![]() ![]() ![]() ![]() | Hossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini: Remarks on the multiple assignment secret sharing scheme. ICICS 1997: 72-80 |
36 | ![]() ![]() ![]() ![]() ![]() ![]() | Chris Charnes, Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini: Secret sharing in hierarchical groups. ICICS 1997: 81-86 |
35 | ![]() ![]() ![]() ![]() ![]() ![]() | Shahrokh Saeednia, Reihaneh Safavi-Naini: A New Identity-Based Key Exchange Protocol Minimizing Computation and Communication. ISW 1997: 328-334 |
34 | ![]() ![]() ![]() ![]() ![]() ![]() | Ahmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini: A Multi-Level View Model for Secure Object-Oriented Databases. Data Knowl. Eng. 23(2): 97-117 (1997) |
33 | ![]() ![]() ![]() ![]() ![]() ![]() | Shahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk: On the Weakness of Gong's Collisionful Hash Functions. J. UCS 3(3): 185-196 (1997) |
32 | ![]() ![]() ![]() ![]() ![]() ![]() | Ahmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini, Janusz R. Getta: Using Cryptographic Hash Functions for Discretionary Access Control in Object-Oriented Databases. J. UCS 3(6): 730-753 (1997) |
1996 | ||
31 | ![]() ![]() ![]() ![]() ![]() ![]() | Ahmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini: Modeling a multi-level secure object-oriented database using views. ACISP 1996: 190-206 |
30 | ![]() ![]() ![]() ![]() ![]() ![]() | Mansour Esmaili, Reihaneh Safavi-Naini, Josef Pieprzyk: Evidential reasoning in network intrusion detection systems. ACISP 1996: 253-265 |
29 | ![]() ![]() ![]() ![]() ![]() ![]() | Hossein Ghodosi, Josef Pieprzyk, Chris Charnes, Reihaneh Safavi-Naini: Cryptosystems for hierarchical groups. ACISP 1996: 275-286 |
28 | ![]() ![]() ![]() ![]() ![]() ![]() | Shahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk: On selectable collisionful hash functions. ACISP 1996: 287-298 |
27 | ![]() ![]() ![]() ![]() ![]() ![]() | Shahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk: On password-based authenticated key exchange using collisionful hash functions. ACISP 1996: 299-310 |
26 | ![]() ![]() ![]() ![]() ![]() ![]() | Josef Pieprzyk, Hossein Ghodosi, Chris Charnes, Reihaneh Safavi-Naini: Cryptography based on transcendental numbers. ACISP 1996: 96-107 |
25 | ![]() ![]() ![]() ![]() ![]() ![]() | Mansour Esmaili, Bala Balachandran, Reihaneh Safavi-Naini, Josef Pieprzyk: Case-Based Reasoning for Intrusion Detection. ACSAC 1996: 214-223 |
24 | ![]() ![]() ![]() ![]() ![]() ![]() | Reihaneh Safavi-Naini: Three Systems for Shared Generation of Authenticators. COCOON 1996: 401-410 |
23 | ![]() ![]() ![]() ![]() ![]() ![]() | Mansour Esmaili, Reihaneh Safavi-Naini, Josef Pieprzyk: Computer Intrusion Detection and Incomplete Information. IEA/AIE 1996: 778 |
22 | ![]() ![]() ![]() ![]() ![]() ![]() | Reihaneh Safavi-Naini, L. Tombak: Near-perfect protection and key strategies in authentication codes under spoofing attack of order r. Ars Comb. 44: (1996) |
21 | ![]() ![]() ![]() ![]() ![]() ![]() | Reihaneh Safavi-Naini, L. Tombak: Authentication Codes in Plaintext and Chosen-Content Attacks. Des. Codes Cryptography 7(1-2): 83-99 (1996) |
1995 | ||
20 | ![]() ![]() ![]() ![]() ![]() ![]() | Josef Pieprzyk, Reihaneh Safavi-Naini: Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28 - December 1, 1994, Proceedings Springer 1995 |
19 | ![]() ![]() ![]() ![]() ![]() ![]() | Ahmad Baraani-Dastjerdi, Janusz R. Getta, Josef Pieprzyk, Reihaneh Safavi-Naini: A Cryptographic Solution to Discretionary Access Control in Structurally Object-Oriented Databases. Australasian Database Conference 1995: 0- |
18 | ![]() ![]() ![]() ![]() ![]() ![]() | Shahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk: Keyed Hash Functions. Cryptography: Policy and Algorithms 1995: 201-214 |
17 | ![]() ![]() ![]() ![]() ![]() ![]() | Ahmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini, Janusz R. Getta: A Model of Authorization for Object-Oriented Databases based on Object Views. DOOD 1995: 503-520 |
16 | ![]() ![]() ![]() ![]() ![]() ![]() | Ahmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini, Janusz R. Getta: A Cryptographic Mechanism for Object-Instance-Based Authorization in Object-Oriented Database Systems. OOER 1995: 44-54 |
1994 | ||
15 | ![]() ![]() ![]() ![]() ![]() ![]() | L. Tombak, Reihaneh Safavi-Naini: Authentication Codes That Are r-Fold Secure Against Spoofing. ACM Conference on Computer and Communications Security 1994: 166-169 |
14 | ![]() ![]() ![]() ![]() ![]() ![]() | Chris Charnes, Josef Pieprzyk, Reihaneh Safavi-Naini: Conditionally Secure Secret Sharing Schemes with Disenrollment Capability. ACM Conference on Computer and Communications Security 1994: 89-95 |
13 | ![]() ![]() ![]() ![]() ![]() ![]() | Reihaneh Safavi-Naini, L. Tombak: Combinatorial Structure of A-codes with r-fold Security. ASIACRYPT 1994: 211-223 |
12 | ![]() ![]() ![]() ![]() ![]() ![]() | Reihaneh Safavi-Naini, L. Tombak: Authentication Codes in Plaintext and Chosen-content Attacks. EUROCRYPT 1994: 254-265 |
11 | ![]() ![]() ![]() ![]() ![]() ![]() | Chris Charnes, Luke O'Connor, Josef Pieprzyk, Reihaneh Safavi-Naini, Yuliang Zheng: Comments on Soviet Encryption Algorithm. EUROCRYPT 1994: 433-438 |
10 | ![]() ![]() ![]() ![]() ![]() ![]() | Jonathan Giddy, Reihaneh Safavi-Naini: Automated Cryptanalysis of Transposition Ciphers. Comput. J. 37(5): 429-436 (1994) |
1993 | ||
9 | ![]() ![]() ![]() ![]() ![]() ![]() | Reihaneh Safavi-Naini, L. Tombak: Optimal Authentication Systems. EUROCRYPT 1993: 12-27 |
1992 | ||
8 | ![]() ![]() ![]() ![]() ![]() ![]() | L. Tombak, Reihaneh Safavi-Naini: Authentication Codes with Perfect Protection. AUSCRYPT 1992: 15-26 |
7 | ![]() ![]() ![]() ![]() ![]() ![]() | Reihaneh Safavi-Naini, L. Tombak: Authentication Codes under Impersonation Attack. AUSCRYPT 1992: 35-47 |
6 | ![]() ![]() ![]() ![]() ![]() ![]() | E. A. Campbell, Reihaneh Safavi-Naini, P. A. Pleasants: Partial Belief and Probabilistic Reasoning in the Analysis of Secure Protocols. CSFW 1992: 84-91 |
1991 | ||
5 | ![]() ![]() ![]() ![]() ![]() ![]() | Reihaneh Safavi-Naini: Feistel Type Authentication Codes. ASIACRYPT 1991: 170-178 |
4 | ![]() ![]() ![]() ![]() ![]() ![]() | Josef Pieprzyk, Reihaneh Safavi-Naini: Randomized Authentication Systems. EUROCRYPT 1991: 472-481 |
3 | ![]() ![]() ![]() ![]() ![]() ![]() | Reihaneh Safavi-Naini, Jennifer Seberry: Error-correcting codes for authentication and subliminal channels. IEEE Transactions on Information Theory 37(1): 13-17 (1991) |
1990 | ||
2 | ![]() ![]() ![]() ![]() ![]() ![]() | Reihaneh Safavi-Naini: Parallel Generation of Pseudo-Random Sequences. AUSCRYPT 1990: 176-193 |
1979 | ||
1 | ![]() ![]() ![]() ![]() ![]() ![]() | Reihaneh Safavi-Naini, Ian F. Blake: Generalized t-Designs and Weighted Majority Decoding Information and Control 42(3): 261-282 (1979) |