2009 |
21 | EE | Hossein Ghodosi,
Josef Pieprzyk:
Multi-Party Computation with Omnipresent Adversary.
Public Key Cryptography 2009: 180-195 |
2008 |
20 | EE | Mohammad Ali Orumiehchi,
S. Fahimeh Mohebbipoor,
Hossein Ghodosi:
Cryptanalysis of MV3 Stream Cipher.
CANS 2008: 240-251 |
2007 |
19 | | Josef Pieprzyk,
Hossein Ghodosi,
Ed Dawson:
Information Security and Privacy, 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings
Springer 2007 |
18 | EE | Hossein Ghodosi:
On insecurity of Naor-Pinkas' distributed oblivious transfer.
Inf. Process. Lett. 104(5): 179-182 (2007) |
2006 |
17 | EE | Jarrod Trevathan,
Hossein Ghodosi,
Wayne Read:
An Anonymous and Secure Continuous Double Auction Scheme.
HICSS 2006 |
16 | EE | Hossein Ghodosi:
An Efficient Public Key Cryptosystem Secure Against Chosen Ciphertext Attack.
ICISS 2006: 303-314 |
15 | EE | Hossein Ghodosi,
Josef Pieprzyk:
An Ideal and Robust Threshold RSA.
VIETCRYPT 2006: 312-321 |
14 | EE | Ickjai Lee,
Hossein Ghodosi:
Privacy and Security Enhanced Offline Oblivious Transfer for Massive Data Distribution.
WISI 2006: 159-160 |
13 | EE | Hossein Ghodosi,
Rahim Zaare-Nahandi:
Comments on the 'm out of n oblivious transfer'.
Inf. Process. Lett. 97(4): 153-155 (2006) |
2005 |
12 | | Jarrod Trevathan,
Wayne Read,
Hossein Ghodosi:
Design issues for electronic auctions.
ICETE 2005: 340-347 |
2004 |
11 | | Hossein Ghodosi,
Josef Pieprzyk:
A Modification to the 'Authentication of Concast Communication'.
Cryptographic Algorithms and their Uses 2004: 72-77 |
2002 |
10 | EE | Mohamed Al-Ibrahim,
Hossein Ghodosi,
Josef Pieprzyk:
Authentication of Concast Communication.
INDOCRYPT 2002: 185-198 |
2001 |
9 | EE | Hossein Ghodosi,
Josef Pieprzyk:
Democratic Systems.
ACISP 2001: 392-402 |
2000 |
8 | | Hossein Ghodosi,
Josef Pieprzyk:
Cheating Prevention in Secret Sharing.
ACISP 2000: 328-341 |
1999 |
7 | EE | Hossein Ghodosi,
Josef Pieprzyk:
Repudiation of Cheating and Non-repudiation of Zhang's Proxy Signature Schemes.
ACISP 1999: 129-134 |
6 | EE | Shahrokh Saeednia,
Hossein Ghodosi:
A Self-Certified Group-Oriented Cryptosystem Without a Combiner.
ACISP 1999: 192-201 |
1998 |
5 | EE | Hossein Ghodosi,
Josef Pieprzyk,
Reihaneh Safavi-Naini:
Secret Sharing in Multilevel and Compartmented Groups.
ACISP 1998: 367-378 |
4 | EE | Hossein Ghodosi,
Josef Pieprzyk,
Reihaneh Safavi-Naini,
Huaxiong Wang:
On Construction of Cumulative Secret Sharing Schemes.
ACISP 1998: 379-390 |
1997 |
3 | | Hossein Ghodosi,
Josef Pieprzyk,
Reihaneh Safavi-Naini:
Remarks on the multiple assignment secret sharing scheme.
ICICS 1997: 72-80 |
1996 |
2 | | Hossein Ghodosi,
Josef Pieprzyk,
Chris Charnes,
Reihaneh Safavi-Naini:
Cryptosystems for hierarchical groups.
ACISP 1996: 275-286 |
1 | | Josef Pieprzyk,
Hossein Ghodosi,
Chris Charnes,
Reihaneh Safavi-Naini:
Cryptography based on transcendental numbers.
ACISP 1996: 96-107 |