dblp.uni-trier.dewww.uni-trier.de

Hossein Ghodosi

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2009
21EEHossein Ghodosi, Josef Pieprzyk: Multi-Party Computation with Omnipresent Adversary. Public Key Cryptography 2009: 180-195
2008
20EEMohammad Ali Orumiehchi, S. Fahimeh Mohebbipoor, Hossein Ghodosi: Cryptanalysis of MV3 Stream Cipher. CANS 2008: 240-251
2007
19 Josef Pieprzyk, Hossein Ghodosi, Ed Dawson: Information Security and Privacy, 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings Springer 2007
18EEHossein Ghodosi: On insecurity of Naor-Pinkas' distributed oblivious transfer. Inf. Process. Lett. 104(5): 179-182 (2007)
2006
17EEJarrod Trevathan, Hossein Ghodosi, Wayne Read: An Anonymous and Secure Continuous Double Auction Scheme. HICSS 2006
16EEHossein Ghodosi: An Efficient Public Key Cryptosystem Secure Against Chosen Ciphertext Attack. ICISS 2006: 303-314
15EEHossein Ghodosi, Josef Pieprzyk: An Ideal and Robust Threshold RSA. VIETCRYPT 2006: 312-321
14EEIckjai Lee, Hossein Ghodosi: Privacy and Security Enhanced Offline Oblivious Transfer for Massive Data Distribution. WISI 2006: 159-160
13EEHossein Ghodosi, Rahim Zaare-Nahandi: Comments on the 'm out of n oblivious transfer'. Inf. Process. Lett. 97(4): 153-155 (2006)
2005
12 Jarrod Trevathan, Wayne Read, Hossein Ghodosi: Design issues for electronic auctions. ICETE 2005: 340-347
2004
11 Hossein Ghodosi, Josef Pieprzyk: A Modification to the 'Authentication of Concast Communication'. Cryptographic Algorithms and their Uses 2004: 72-77
2002
10EEMohamed Al-Ibrahim, Hossein Ghodosi, Josef Pieprzyk: Authentication of Concast Communication. INDOCRYPT 2002: 185-198
2001
9EEHossein Ghodosi, Josef Pieprzyk: Democratic Systems. ACISP 2001: 392-402
2000
8 Hossein Ghodosi, Josef Pieprzyk: Cheating Prevention in Secret Sharing. ACISP 2000: 328-341
1999
7EEHossein Ghodosi, Josef Pieprzyk: Repudiation of Cheating and Non-repudiation of Zhang's Proxy Signature Schemes. ACISP 1999: 129-134
6EEShahrokh Saeednia, Hossein Ghodosi: A Self-Certified Group-Oriented Cryptosystem Without a Combiner. ACISP 1999: 192-201
1998
5EEHossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini: Secret Sharing in Multilevel and Compartmented Groups. ACISP 1998: 367-378
4EEHossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang: On Construction of Cumulative Secret Sharing Schemes. ACISP 1998: 379-390
1997
3 Hossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini: Remarks on the multiple assignment secret sharing scheme. ICICS 1997: 72-80
1996
2 Hossein Ghodosi, Josef Pieprzyk, Chris Charnes, Reihaneh Safavi-Naini: Cryptosystems for hierarchical groups. ACISP 1996: 275-286
1 Josef Pieprzyk, Hossein Ghodosi, Chris Charnes, Reihaneh Safavi-Naini: Cryptography based on transcendental numbers. ACISP 1996: 96-107

Coauthor Index

1Mohamed Al-Ibrahim [10]
2Chris Charnes [1] [2]
3Ed Dawson [19]
4Ickjai Lee [14]
5S. Fahimeh Mohebbipoor [20]
6Mohammad Ali Orumiehchi [20]
7Josef Pieprzyk [1] [2] [3] [4] [5] [7] [8] [9] [10] [11] [15] [19] [21]
8Wayne Read [12] [17]
9Shahrokh Saeednia [6]
10Reihaneh Safavi-Naini [1] [2] [3] [4] [5]
11Jarrod Trevathan [12] [17]
12Huaxiong Wang [4]
13Rahim Zaare-Nahandi [13]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)