dblp.uni-trier.dewww.uni-trier.de

Reihaneh Safavi-Naini

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2009
183 Wanqing Li, Willy Susilo, Udaya Kiran Tupakula, Reihaneh Safavi-Naini, Vijay Varadharajan: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009 ACM 2009
182EELiang Lu, Reihaneh Safavi-Naini, Markus Hagenbuchner, Willy Susilo, Jeffrey Horton, Sweah Liang Yong, Ah Chung Tsoi: Ranking Attack Graphs with Graph Neural Networks. ISPEC 2009: 345-359
181EEHongsong Shi, Shaoquan Jiang, Reihaneh Safavi-Naini, Mohammed Ashraful Tuhin: Optimal Secure Message Transmission by Public Discussion CoRR abs/0901.2192: (2009)
2008
180 Larry Korba, Steve Marsh, Reihaneh Safavi-Naini: Sixth Annual Conference on Privacy, Security and Trust, PST 2008, October 1-3, 2008, Fredericton, New Brunswick, Canada IEEE 2008
179 Reihaneh Safavi-Naini: Information Theoretic Security, Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008, Proceedings Springer 2008
178EEReihaneh Safavi-Naini, Shaoquan Jiang: Non-interactive conference key distribution and its applications. ASIACCS 2008: 271-282
177EEChing Yu Ng, Willy Susilo, Yi Mu, Reihaneh Safavi-Naini: RFID Privacy Models Revisited. ESORICS 2008: 251-266
176EEShaoquan Jiang, Reihaneh Safavi-Naini: An Efficient Deniable Key Exchange Protocol (Extended Abstract). Financial Cryptography 2008: 47-52
175EEJoonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: Public Key Encryption with Keyword Search Revisited. ICCSA (1) 2008: 1249-1259
174EEMichal Sramka, Reihaneh Safavi-Naini, Jörg Denzinger, Mina Askari, Jie Gao: Utility of Knowledge Extracted from Unsanitized Data when Applied to Sanitized Data. PST 2008: 227-231
173EESiamak Fayyaz Shahandashti, Reihaneh Safavi-Naini: Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures. Public Key Cryptography 2008: 121-140
172EEAdam Muhlbauer, Reihaneh Safavi-Naini, Farzad Salim, Nicholas Paul Sheppard, Jan Martin Surminen: Location constraints in digital rights management. Computer Communications 31(6): 1173-1180 (2008)
171EESid Stamm, Nicholas Paul Sheppard, Reihaneh Safavi-Naini: Implementing Trusted Terminals with a and SITDRM. Electr. Notes Theor. Comput. Sci. 197(1): 73-85 (2008)
170EEReihaneh Safavi-Naini, Peter R. Wild: Information Theoretic Bounds on Authentication Systems in Query Model. IEEE Transactions on Information Theory 54(6): 2426-2436 (2008)
2007
169EEMohammad Reza Reyhanitabar, Shuhong Wang, Reihaneh Safavi-Naini: Non-interactive Manual Channel Message Authentication Based on eTCR Hash Functions. ACISP 2007: 385-399
168EELiang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo: An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme. ACNS 2007: 65-86
167EERungrat Wiangsripanawan, Willy Susilo, Reihaneh Safavi-Naini: Design Principles for Low Latency Anonymous Network Systems Secure against Timing Attacks. ACSW Frontiers 2007: 183-191
166EESiamak Fayyaz Shahandashti, Reihaneh Safavi-Naini, Joonsang Baek: Concurrently-secure credential ownership proofs. ASIACCS 2007: 161-172
165EEReihaneh Safavi-Naini, Shuhong Wang, Yvo Desmedt: Unconditionally secure ring authentication. ASIACCS 2007: 173-181
164EEDongvu Tonien, Reihaneh Safavi-Naini, Peter R. Wild: Combinatorial characterizations of authentication codes in verification oracle model. ASIACCS 2007: 183-193
163EERungrat Wiangsripanawan, Willy Susilo, Reihaneh Safavi-Naini: Achieving Mobility and Anonymity in IP-Based Networks. CANS 2007: 60-79
162EEFarzad Salim, Nicholas Paul Sheppard, Reihaneh Safavi-Naini: Using SITDRM for privacy rights management. CHIMIT 2007: 11
161EEGelareh Taban, Reihaneh Safavi-Naini: Key Establishment in Heterogeneous Self-organized Networks. ESAS 2007: 58-72
160EEWenming Lu, Wanqing Li, Reihaneh Safavi-Naini, Philip Ogunbona: A Maximum Likelihood Watermark Decoding Scheme. ICME 2007: 1247-1250
159EELiang Lu, Jeffrey Horton, Reihaneh Safavi-Naini, Willy Susilo: Transport Layer Identification of Skype Traffic. ICOIN 2007: 465-481
158EEFarzad Salim, Nicholas Paul Sheppard, Reihaneh Safavi-Naini: Enforcing P3P Policies Using a Digital Rights Management System. Privacy Enhancing Technologies 2007: 200-217
157EEDongvu Tonien, Reihaneh Safavi-Naini: Construction of deletion correcting codes using generalized Reed-Solomon codes and their subcodes. Des. Codes Cryptography 42(2): 227-237 (2007)
156EELuke McAven, Reihaneh Safavi-Naini: Classification of the Deletion Correcting Capabilities of Reed-Solomon Codes of Dimension 2 Over Prime Fields. IEEE Transactions on Information Theory 53(6): 2280-2294 (2007)
2006
155 Moti Yung, Kaoru Kurosawa, Reihaneh Safavi-Naini: Proceedings of the Sixth ACM Workshop on Digital Rights Management, Alexandria, VA, USA, October 30, 2006 ACM 2006
154 Rajkumar Buyya, Tianchi Ma, Reihaneh Safavi-Naini, Chris Steketee, Willy Susilo: The proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Hobart, Tasmania, Australia, January 2006 Australian Computer Society 2006
153 Reihaneh Safavi-Naini, Moti Yung: Digital Rights Management: Technologies, Issues, Challenges and Systems, First International Conference, DRMTICS 2005, Sydney, Australia, October 31 - November 2, 2005, Revised Selected Papers Springer 2006
152 Lynn Margaret Batten, Reihaneh Safavi-Naini: Information Security and Privacy, 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings Springer 2006
151EEDongvu Tonien, Reihaneh Safavi-Naini: An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families. ACNS 2006: 82-97
150EEJeffrey Horton, Reihaneh Safavi-Naini: Detecting Policy Violations through Traffic Analysis. ACSAC 2006: 109-120
149EELing Luo, Reihaneh Safavi-Naini, Joonsang Baek, Willy Susilo: Self-organised group key management for ad hoc networks. ASIACCS 2006: 138-147
148EELan Yu, Willy Susilo, Reihaneh Safavi-Naini: X2BT Trusted Reputation System: A Robust Mechanism for P2P Networks. CANS 2006: 364-380
147EEDuong Hieu Phan, Reihaneh Safavi-Naini, Dongvu Tonien: Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability. ICALP (2) 2006: 264-275
146EEWenming Lu, Wanqing Li, Reihaneh Safavi-Naini, Philip Ogunbona: A Pixel-Based Robust Imagewatermarking System. ICME 2006: 1565-1568
145EEDongvu Tonien, Willy Susilo, Reihaneh Safavi-Naini: Multi-party Concurrent Signatures. ISC 2006: 131-145
144EEJoonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search. ISC 2006: 217-232
143EEWenming Lu, Wanqing Li, Reihaneh Safavi-Naini, Philip Ogunbona: Optimal Image Watermark Decoding. PCM 2006: 141-149
142EENicholas Paul Sheppard, Reihaneh Safavi-Naini: Protecting Privacy with the MPEG-21 IPMP Framework. Privacy Enhancing Technologies 2006: 152-171
141EEHarikrishna Vasanta, Reihaneh Safavi-Naini, Nicholas Paul Sheppard, Jan Martin Surminen: Distributed Management of OMA DRM Domains. WISA 2006: 237-251
140EEReihaneh Safavi-Naini, Huaxiong Wang: Secret sharing schemes with partial broadcast channels. Des. Codes Cryptography 41(1): 5-22 (2006)
139EETakeyuki Uehara, Reihaneh Safavi-Naini, Philip Ogunbona: Recovering DC Coefficients in Block-Based DCT. IEEE Transactions on Image Processing 15(11): 3592-3596 (2006)
138EEReihaneh Safavi-Naini, Huaxiong Wang, Duncan S. Wong: Resilient Lkh: Secure Multicast Key Distribution Schemes. Int. J. Found. Comput. Sci. 17(5): 1205-1222 (2006)
137EELan Nguyen, Reihaneh Safavi-Naini, Kaoru Kurosawa: Verifiable shuffles: a formal model and a Paillier-based three-round construction with provable security. Int. J. Inf. Sec. 5(4): 241-255 (2006)
136EEDongvu Tonien, Reihaneh Safavi-Naini: Recursive constructions of secure codes and hash families using difference function families. J. Comb. Theory, Ser. A 113(4): 664-674 (2006)
2005
135 Reihaneh Safavi-Naini, Moti Yung: Proceedings of the Fifth ACM Workshop on Digital Rights Management, Alexandria, VA, USA, November 7, 2005 ACM 2005
134 Rajkumar Buyya, Paul D. Coddington, Paul Montague, Reihaneh Safavi-Naini, Nicholas Paul Sheppard, Andrew L. Wendelborn: ACSW Frontiers 2005, 2005 ACSW Workshops - the Australasian Workshop on Grid Computing and e-Research (AusGrid 2005) and the Third Australasian Information Security Workshop (AISW 2005), Newcastle, NSW, Australia, January/February 2005 Australian Computer Society 2005
133EERussell Ang, Reihaneh Safavi-Naini, Luke McAven: Cancelable Key-Based Fingerprint Templates. ACISP 2005: 242-252
132EELan Nguyen, Reihaneh Safavi-Naini: Dynamic k-Times Anonymous Authentication. ACNS 2005: 318-333
131EEJoonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: Universal Designated Verifier Signature Proof (or How to Efficiently Prove Knowledge of a Signature). ASIACRYPT 2005: 644-661
130EELiang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo: On Securing RTP-Based Streaming Content with Firewalls. CANS 2005: 304-319
129EEYvo Desmedt, Yongge Wang, Reihaneh Safavi-Naini, Huaxiong Wang: Radio Networks with Reliable Communication. COCOON 2005: 156-166
128EEJoonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: Certificateless Public Key Encryption Without Pairing. ISC 2005: 134-148
127EEJoonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: Token-Controlled Public Key Encryption. ISPEC 2005: 386-397
126EEYun Chen, Reihaneh Safavi-Naini, Joonsang Baek, Xin Chen: Server-Aided RSA Key Generation Against Collusion Attack. MADNES 2005: 27-37
125EEAngela Piper, Reihaneh Safavi-Naini, Alfred Mertins: Resolution and quality scalable spread spectrum image watermarking. MM&Sec 2005: 79-90
124EEJoonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption. Public Key Cryptography 2005: 380-397
123 Qiong Liu, Reihaneh Safavi-Naini, Nicholas Paul Sheppard: A License Transfer System for Supporting Content Portability in Digital Rights Management. SEC 2005: 189-204
122EEFangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo: Attack on Han et al.'s ID-based confirmer (undeniable) signature at ACM-EC'03. Applied Mathematics and Computation 170(2): 1166-1169 (2005)
121EEKeith M. Martin, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild: Distributing the Encryption and Decryption of a Block Cipher. Des. Codes Cryptography 36(3): 263-287 (2005)
120EEReihaneh Safavi-Naini, Chris Charnes: MRD Hashing. Des. Codes Cryptography 37(2): 229-242 (2005)
119EELan Nguyen, Reihaneh Safavi-Naini, Kaoru Kurosawa: A Provably Secure and Efficient Verifiable Shuffle based on a Variant of the Paillier Cryptosystem. J. UCS 11(6): 986-1010 (2005)
2004
118EEVu Dong Tô, Reihaneh Safavi-Naini: Linear Code Implies Public-Key Traitor Tracing with Revocation. ACISP 2004: 24-35
117EELuke McAven, Reihaneh Safavi-Naini, Moti Yung: Unconditionally Secure Encryption Under Strong Attacks. ACISP 2004: 427-439
116EENathan Curtis, Reihaneh Safavi-Naini, Willy Susilo: X2Rep: Enhanced Trust Semantics for the XRep Protocol. ACNS 2004: 205-219
115EELan Nguyen, Reihaneh Safavi-Naini, Kaoru Kurosawa: Verifiable Shuffles: A Formal Model and a Paillier-Based Efficient Construction with Provable Security. ACNS 2004: 61-75
114EELan Nguyen, Reihaneh Safavi-Naini: Efficient and Provably Secure Trapdoor-Free Group Signature Schemes from Bilinear Pairings. ASIACRYPT 2004: 372-386
113 Lan Nguyen, Reihaneh Safavi-Naini: An Efficient Verifiable Shuffle with Perfect Zero-knowledge Proof System. Cryptographic Algorithms and their Uses 2004: 40-56
112EEReihaneh Safavi-Naini: Tracing traitors: a selective survey. Digital Rights Management Workshop 2004: 72
111EEReihaneh Safavi-Naini, Nicholas Paul Sheppard, Takeyuki Uehara: Import/export in digital rights management. Digital Rights Management Workshop 2004: 99-110
110 Takeyuki Uehara, Reihaneh Safavi-Naini, Philip Ogunbona: An MPEG tolerant authentication system for video data. ICME 2004: 891-894
109EELuke McAven, Reihaneh Safavi-Naini, Moti Yung: Symmetric Authentication Codes with Secrecy and Unconditionally Secure Authenticated Encryption. INDOCRYPT 2004: 148-161
108EEGlen E. Wheeler, Reihaneh Safavi-Naini, Nicholas Paul Sheppard: Weighted Segmented Digital Watermarking. IWDW 2004: 89-100
107EEReihaneh Safavi-Naini, Luke McAven, Moti Yung: General Group Authentication Codes and Their Relation to "Unconditionally-Secure Signatures". Public Key Cryptography 2004: 231-247
106EEFangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo: An Efficient Signature Scheme from Bilinear Pairings and Its Applications. Public Key Cryptography 2004: 277-290
105EETakeyuki Uehara, Reihaneh Safavi-Naini, Philip Ogunbona: A secure and flexible authentication system for digital images. Multimedia Syst. 9(5): 441-456 (2004)
104EEVu Dong Tô, Reihaneh Safavi-Naini: On the Maximal Codes of Length 3 with the 2-Identifiable Parent Property. SIAM J. Discrete Math. 17(4): 548-570 (2004)
2003
103 Reihaneh Safavi-Naini, Jennifer Seberry: Information Security and Privacy, 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings Springer 2003
102EEQiong Liu, Reihaneh Safavi-Naini, Nicholas Paul Sheppard: Digital Rights Management for Content Distribution. ACSW Frontiers 2003: 49-58
101EEVu Dong Tô, Reihaneh Safavi-Naini, Fangguo Zhang: New traitor tracing schemes using bilinear map. Digital Rights Management Workshop 2003: 67-76
100EEC. Kailasanathan, Reihaneh Safavi-Naini, Philip Ogunbona: Compression Tolerant DCT Based Image Hash. ICDCS Workshops 2003: 562-567
99EEFangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo: Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings. INDOCRYPT 2003: 191-204
98EEAngela Piper, Reihaneh Safavi-Naini, Alfred Mertins: Coefficient Selection Methods for Scalable Spread Spectrum Watermarking. IWDW 2003: 235-246
97EERobert Scealy, Reihaneh Safavi-Naini, Nicholas Paul Sheppard: Performance Measurement of Watermark Embedding Patterns. IWDW 2003: 77-85
96EELan Nguyen, Reihaneh Safavi-Naini: Breaking and Mending Resilient Mix-Nets. Privacy Enhancing Technologies 2003: 66-80
95EEYejing Wang, Jennifer Seberry, Reihaneh Safavi-Naini, Ryoh Fuji-Hara: A Note on the Exposure Property of SBIBD. Electronic Notes in Discrete Mathematics 15: 225-227 (2003)
94 Huaxiong Wang, Chaoping Xing, Reihaneh Safavi-Naini: Linear authentication codes: bounds and constructions. IEEE Transactions on Information Theory 49(4): 866-872 (2003)
93 Reihaneh Safavi-Naini, Yejing Wang: Sequential traitor tracing. IEEE Transactions on Information Theory 49(5): 1319-1326 (2003)
2002
92EEHartono Kurnio, Reihaneh Safavi-Naini, Huaxiong Wang: A Secure Re-keying Scheme with Key Recovery Property. ACISP 2002: 40-55
91EEKeith B. Frikken, Mikhail J. Atallah, Sunil Prabhakar, Reihaneh Safavi-Naini: Optimal Parallel I/O for Range Queries through Replication. DEXA 2002: 669-678
90EEReihaneh Safavi-Naini, Yejing Wang: Traitor Tracing for Shortened and Corrupted Fingerprints. Digital Rights Management Workshop 2002: 81-100
89EEYvo Desmedt, Reihaneh Safavi-Naini, Huaxiong Wang: Redistribution of Mechanical Secret Shares. Financial Cryptography 2002: 238-252
88EEKeith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild: Threshold MACs. ICISC 2002: 237-252
87EEHartono Kurnio, Luke McAven, Reihaneh Safavi-Naini, Huaxiong Wang: A Dynamic Group Key Distribution Scheme with Flexible User Join. ICISC 2002: 478-496
86EEWilly Susilo, Reihaneh Safavi-Naini: An Efficient Fail-Stop Signature Scheme Based on Factorization. ICISC 2002: 62-74
85EETakeyuki Uehara, Reihaneh Safavi-Naini: On (In)security of "A Robust Image Authentication Method". IEEE Pacific Rim Conference on Multimedia 2002: 1025-1032
84EEGareth Brisbane, Reihaneh Safavi-Naini, Philip Ogunbona: An Algorithm for Data Hiding Using Median Cut Segmentation. IEEE Pacific Rim Conference on Multimedia 2002: 89-96
83EEVu Dong Tô, Reihaneh Safavi-Naini, Yejing Wang: A 2-Secure Code with Efficient Tracing Algorithm. INDOCRYPT 2002: 149-162
82EEHartono Kurnio, Reihaneh Safavi-Naini, Huaxiong Wang: A Group Key Distribution Scheme with Decentralised User Join. SCN 2002: 146-163
81EEReihaneh Safavi-Naini, Huaxiong Wang: Bounds and Constructions for Threshold Shared Generation of Authenticators. Int. J. Comput. Math. 79(12): 1285-1301 (2002)
2001
80EEReihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang: How to Construct Fail-Stop Confirmer Signature Schemes. ACISP 2001: 435-444
79EEShahrokh Saeednia, Reihaneh Safavi-Naini, Willy Susilo: On Classifying Conference Key Distribution Protocols. ACISP 2001: 51-59
78EEReihaneh Safavi-Naini, Yejing Wang: Collusion Secure q-ary Fingerprinting for Perceptual Content. Digital Rights Management Workshop 2001: 57-75
77EEHartono Kurnio, Reihaneh Safavi-Naini, Huaxiong Wang: Efficient Revocation Schemes for Secure Multicast. ICISC 2001: 160-177
76EEReihaneh Safavi-Naini, Huaxiong Wang, Chaoping Xing: Linear Authentication Codes: Bounds and Constructions. INDOCRYPT 2001: 127-135
75EENicholas Paul Sheppard, Reihaneh Safavi-Naini, Philip Ogunbona: On multiple watermarking. MM&Sec 2001: 3-6
74EEYvo Desmedt, Reihaneh Safavi-Naini, Huaxiong Wang, Lynn Margaret Batten, Chris Charnes, Josef Pieprzyk: Broadcast anti-jamming systems. Computer Networks 35(2-3): 223-236 (2001)
73 Reihaneh Safavi-Naini, Yejing Wang: New results on frame-proof codes and traceability schemes. IEEE Transactions on Information Theory 47(7): 3029-3033 (2001)
72EEReihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang: An Efficient Construction for Fail-Stop Signature for Long Messages. J. Inf. Sci. Eng. 17(6): 879-898 (2001)
71EEReihaneh Safavi-Naini, Huaxiong Wang: Broadcast authentication for group communication. Theor. Comput. Sci. 269(1-2): 1-21 (2001)
2000
70 Hartono Kurnio, Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang: Key Management for Secure Multicast with Dynamic Controller. ACISP 2000: 178-190
69EEReihaneh Safavi-Naini, Huaxiong Wang: New constructions for multicast re-keying schemes using perfect hash families. ACM Conference on Computer and Communications Security 2000: 228-234
68EEReihaneh Safavi-Naini, Yejing Wang: A Combinatorial Approach to Asymmetric Traitor Tracing. COCOON 2000: 416-425
67EEReihaneh Safavi-Naini, Yejing Wang: Sequential Traitor Tracing. CRYPTO 2000: 316-332
66EEReihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang: Fail-Stop Signature for Long Messages. INDOCRYPT 2000: 165-177
65EEReihaneh Safavi-Naini, Yejing Wang: Anonymous Traceability Schemes with Unconditional Security. INDOCRYPT 2000: 250-261
64EEReihaneh Safavi-Naini, Willy Susilo: Threshold Fail-Stop Signature Schemes Based on Discrete Logarithm and Factorization. ISW 2000: 292-307
63EEGareth Brisbane, Reihaneh Safavi-Naini, Philip Ogunbona: Region-Based Watermarking by Distribution Adjustment. ISW 2000: 54-68
62EEWilly Susilo, Reihaneh Safavi-Naini, Marc Gysin, Jennifer Seberry: A New and Efficient Fail-stop Signature Scheme. Comput. J. 43(5): 430-437 (2000)
1999
61 Josef Pieprzyk, Reihaneh Safavi-Naini, Jennifer Seberry: Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings Springer 1999
60EEWilly Susilo, Reihaneh Safavi-Naini, Josef Pieprzyk: Fail-Stop Threshold Signature Schemes Based on Elliptic Curves. ACISP 1999: 103-116
59EEKeith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang: Changing Thresholds in the Absence of Secure Channels. ACISP 1999: 177-191
58EEDingyi Pei, Yuqiang Li, Yejing Wang, Reihaneh Safavi-Naini: Characterization of Optimal Authentication Codes with Arbitration. ACISP 1999: 303-313
57 Yejing Wang, Reihaneh Safavi-Naini: A3-Codes under Collusion Attacks. ASIACRYPT 1999: 390-398
56 Reihaneh Safavi-Naini, Huaxiong Wang: Broadcast Authentication in Group Communication. ASIACRYPT 1999: 399-411
55 Takeyuki Uehara, Reihaneh Safavi-Naini: Attack on Liu/Farrell/Boyd Arithmetic Coding Encryption Scheme. Communications and Multimedia Security 1999: 273-290
54 Reihaneh Safavi-Naini, Huaxiong Wang, Kwok-Yan Lam: A New Approach to Robust Threshold RSA Signature Schemes. ICISC 1999: 184-196
53EEWilly Susilo, Reihaneh Safavi-Naini, Josef Pieprzyk: RSA-Based Fail-Stop Signature Schemes. ICPP Workshops 1999: 161-166
52EEGareth Brisbane, Reihaneh Safavi-Naini, Philip Ogunbona: Region-Based Watermarking for Images. ISW 1999: 154-166
51 Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang: Changing Thresholds in the Absence of Secure Channels. Australian Computer Journal 31(2): 34-43 (1999)
50 Keith M. Martin, Reihaneh Safavi-Naini, Huaxiong Wang: Bounds and Techniques for Efficient Redistribution of Secret Shares to New Access Structures. Comput. J. 42(8): 638-649 (1999)
49 Reihaneh Safavi-Naini, Huaxiong Wang: Multireceiver Authentication Codes: Models, Bounds, Constructions, and Extensions. Inf. Comput. 151(1-2): 148-172 (1999)
1998
48EEReihaneh Safavi-Naini, Yejing Wang: Bounds and Constructions for A3-code with Multi-senders. ACISP 1998: 159-168
47EEShahrokh Saeednia, Reihaneh Safavi-Naini: Efficient Identity-Based Conference Key Distribution Protocols. ACISP 1998: 320-331
46EEHossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini: Secret Sharing in Multilevel and Compartmented Groups. ACISP 1998: 367-378
45EEHossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang: On Construction of Cumulative Secret Sharing Schemes. ACISP 1998: 379-390
44EEReihaneh Safavi-Naini, Huaxiong Wang: Bounds and Constructions for Multireceiver Authentication Codes. ASIACRYPT 1998: 242-256
43EEReihaneh Safavi-Naini, Huaxiong Wang: New Results on Multi-Receiver Authentication Codes. EUROCRYPT 1998: 527-541
42EEReihaneh Safavi-Naini, Shahram Bakhtiari, Chris Charnes: MRD Hashing. FSE 1998: 134-149
41EEShahrokh Saeednia, Reihaneh Safavi-Naini: On the Security of Girault`s Identification Scheme. Public Key Cryptography 1998: 149-153
40 Reihaneh Safavi-Naini: Three Systems for Threshold Generation of Authenticators. Des. Codes Cryptography 13(3): 299-312 (1998)
1997
39 Shahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk: A Message Authentication Code Based on Latin Squares. ACISP 1997: 194-203
38 Chor Wah Man, Reihaneh Safavi-Naini: Democratic Key Escrow Scheme. ACISP 1997: 249-260
37 Keith M. Martin, Reihaneh Safavi-Naini: Multisender authentication systems with unconditional security. ICICS 1997: 130-143
36 Hossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini: Remarks on the multiple assignment secret sharing scheme. ICICS 1997: 72-80
35 Chris Charnes, Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini: Secret sharing in hierarchical groups. ICICS 1997: 81-86
34 Shahrokh Saeednia, Reihaneh Safavi-Naini: A New Identity-Based Key Exchange Protocol Minimizing Computation and Communication. ISW 1997: 328-334
33EEAhmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini: A Multi-Level View Model for Secure Object-Oriented Databases. Data Knowl. Eng. 23(2): 97-117 (1997)
32EEShahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk: On the Weakness of Gong's Collisionful Hash Functions. J. UCS 3(3): 185-196 (1997)
31EEAhmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini, Janusz R. Getta: Using Cryptographic Hash Functions for Discretionary Access Control in Object-Oriented Databases. J. UCS 3(6): 730-753 (1997)
1996
30 Ahmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini: Modeling a multi-level secure object-oriented database using views. ACISP 1996: 190-206
29 Mansour Esmaili, Reihaneh Safavi-Naini, Josef Pieprzyk: Evidential reasoning in network intrusion detection systems. ACISP 1996: 253-265
28 Hossein Ghodosi, Josef Pieprzyk, Chris Charnes, Reihaneh Safavi-Naini: Cryptosystems for hierarchical groups. ACISP 1996: 275-286
27 Shahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk: On selectable collisionful hash functions. ACISP 1996: 287-298
26 Shahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk: On password-based authenticated key exchange using collisionful hash functions. ACISP 1996: 299-310
25 Josef Pieprzyk, Hossein Ghodosi, Chris Charnes, Reihaneh Safavi-Naini: Cryptography based on transcendental numbers. ACISP 1996: 96-107
24EEMansour Esmaili, Bala Balachandran, Reihaneh Safavi-Naini, Josef Pieprzyk: Case-Based Reasoning for Intrusion Detection. ACSAC 1996: 214-223
23 Reihaneh Safavi-Naini: Three Systems for Shared Generation of Authenticators. COCOON 1996: 401-410
22 Reihaneh Safavi-Naini, L. Tombak: Near-perfect protection and key strategies in authentication codes under spoofing attack of order r. Ars Comb. 44: (1996)
21 Reihaneh Safavi-Naini, L. Tombak: Authentication Codes in Plaintext and Chosen-Content Attacks. Des. Codes Cryptography 7(1-2): 83-99 (1996)
1995
20 Josef Pieprzyk, Reihaneh Safavi-Naini: Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28 - December 1, 1994, Proceedings Springer 1995
19 Ahmad Baraani-Dastjerdi, Janusz R. Getta, Josef Pieprzyk, Reihaneh Safavi-Naini: A Cryptographic Solution to Discretionary Access Control in Structurally Object-Oriented Databases. Australasian Database Conference 1995: 0-
18 Shahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk: Keyed Hash Functions. Cryptography: Policy and Algorithms 1995: 201-214
17 Ahmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini, Janusz R. Getta: A Model of Authorization for Object-Oriented Databases based on Object Views. DOOD 1995: 503-520
16EEAhmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini, Janusz R. Getta: A Cryptographic Mechanism for Object-Instance-Based Authorization in Object-Oriented Database Systems. OOER 1995: 44-54
1994
15EEL. Tombak, Reihaneh Safavi-Naini: Authentication Codes That Are r-Fold Secure Against Spoofing. ACM Conference on Computer and Communications Security 1994: 166-169
14EEChris Charnes, Josef Pieprzyk, Reihaneh Safavi-Naini: Conditionally Secure Secret Sharing Schemes with Disenrollment Capability. ACM Conference on Computer and Communications Security 1994: 89-95
13 Reihaneh Safavi-Naini, L. Tombak: Combinatorial Structure of A-codes with r-fold Security. ASIACRYPT 1994: 211-223
12EEReihaneh Safavi-Naini, L. Tombak: Authentication Codes in Plaintext and Chosen-content Attacks. EUROCRYPT 1994: 254-265
11EEChris Charnes, Luke O'Connor, Josef Pieprzyk, Reihaneh Safavi-Naini, Yuliang Zheng: Comments on Soviet Encryption Algorithm. EUROCRYPT 1994: 433-438
10 Jonathan Giddy, Reihaneh Safavi-Naini: Automated Cryptanalysis of Transposition Ciphers. Comput. J. 37(5): 429-436 (1994)
1993
9EEReihaneh Safavi-Naini, L. Tombak: Optimal Authentication Systems. EUROCRYPT 1993: 12-27
1992
8 L. Tombak, Reihaneh Safavi-Naini: Authentication Codes with Perfect Protection. AUSCRYPT 1992: 15-26
7 Reihaneh Safavi-Naini, L. Tombak: Authentication Codes under Impersonation Attack. AUSCRYPT 1992: 35-47
6 E. A. Campbell, Reihaneh Safavi-Naini, P. A. Pleasants: Partial Belief and Probabilistic Reasoning in the Analysis of Secure Protocols. CSFW 1992: 84-91
1991
5 Reihaneh Safavi-Naini: Feistel Type Authentication Codes. ASIACRYPT 1991: 170-178
4EEJosef Pieprzyk, Reihaneh Safavi-Naini: Randomized Authentication Systems. EUROCRYPT 1991: 472-481
3 Reihaneh Safavi-Naini, Jennifer Seberry: Error-correcting codes for authentication and subliminal channels. IEEE Transactions on Information Theory 37(1): 13-17 (1991)
1990
2 Reihaneh Safavi-Naini: Parallel Generation of Pseudo-Random Sequences. AUSCRYPT 1990: 176-193
1979
1 Reihaneh Safavi-Naini, Ian F. Blake: Generalized t-Designs and Weighted Majority Decoding Information and Control 42(3): 261-282 (1979)

Coauthor Index

1Russell Ang [133]
2Mina Askari [174]
3Mikhail J. Atallah [91]
4Joonsang Baek [124] [126] [127] [128] [131] [144] [149] [166] [175]
5Shahram Bakhtiari [18] [26] [27] [32] [39] [42]
6Bala Balachandran [24]
7Ahmad Baraani-Dastjerdi [16] [17] [19] [30] [31] [33]
8Lynn Margaret Batten [74] [152]
9Ian F. Blake [1]
10Gareth Brisbane [52] [63] [84]
11Rajkumar Buyya [134] [154]
12E. A. Campbell [6]
13Chris Charnes [11] [14] [25] [28] [35] [42] [74] [120]
14Xin Chen [126]
15Yun Chen [126]
16Paul D. Coddington [134]
17Nathan Curtis [116]
18Jörg Denzinger [174]
19Yvo Desmedt [74] [89] [129] [165]
20Mansour Esmaili [24] [29]
21Keith B. Frikken [91]
22Ryoh Fuji-Hara [95]
23Jie Gao [174]
24Janusz R. Getta [16] [17] [19] [31]
25Hossein Ghodosi [25] [28] [36] [45] [46]
26Jonathan Giddy [10]
27Marc Gysin [62]
28Markus Hagenbuchner [182]
29Jeffrey Horton [130] [150] [159] [168] [182]
30Shaoquan Jiang [176] [178] [181]
31C. Kailasanathan [100]
32Larry Korba [180]
33Hartono Kurnio [70] [77] [82] [87] [92]
34Kaoru Kurosawa [115] [119] [137] [155]
35Kwok-Yan Lam [54]
36Wanqing Li [143] [146] [160] [183]
37Yuqiang Li [58]
38Qiong Liu [102] [123]
39Liang Lu [130] [159] [168] [182]
40Wenming Lu [143] [146] [160]
41Ling Luo [149]
42Tianchi Ma [154]
43Chor Wah Man [38]
44Steve Marsh [180]
45Keith M. Martin [35] [37] [50] [51] [59] [88] [121]
46Luke McAven [87] [107] [109] [117] [133] [156]
47Alfred Mertins [98] [125]
48Paul Montague [134]
49Yi Mu [177]
50Adam Muhlbauer [172]
51Ching Yu Ng [177]
52Lan Nguyen [96] [113] [114] [115] [119] [132] [137]
53Luke O'Connor [11]
54Philip Ogunbona [52] [63] [75] [84] [100] [105] [110] [139] [143] [146] [160]
55Dingyi Pei [58]
56Duong Hieu Phan [147]
57Josef Pieprzyk [4] [11] [14] [16] [17] [18] [19] [20] [24] [25] [26] [27] [28] [29] [30] [31] [32] [33] [35] [36] [39] [45] [46] [51] [53] [59] [60] [61] [74] [88]
58Angela Piper [98] [125]
59P. A. Pleasants [6]
60Sunil Prabhakar [91]
61Mohammad Reza Reyhanitabar [169]
62Shahrokh Saeednia [34] [41] [47] [79]
63Farzad Salim [158] [162] [172]
64Robert Scealy [97]
65Jennifer Seberry (Jennifer Seberry Wallis) [3] [61] [62] [95] [103]
66Siamak Fayyaz Shahandashti [166] [173]
67Nicholas Paul Sheppard [75] [97] [102] [108] [111] [123] [134] [141] [142] [158] [162] [171] [172]
68Hongsong Shi [181]
69Michal Sramka [174]
70Sid Stamm [171]
71Chris Steketee [154]
72Jan Martin Surminen [141] [172]
73Willy Susilo [53] [60] [62] [64] [66] [70] [72] [79] [80] [86] [99] [106] [116] [122] [124] [127] [128] [130] [131] [144] [145] [148] [149] [154] [159] [163] [167] [168] [175] [177] [182] [183]
74Gelareh Taban [161]
75Vu Dong Tô [83] [101] [104] [118]
76L. Tombak [7] [8] [9] [12] [13] [15] [21] [22]
77Dongvu Tonien [136] [145] [147] [151] [157] [164]
78Ah Chung Tsoi [182]
79Mohammed Ashraful Tuhin [181]
80Udaya Kiran Tupakula [183]
81Takeyuki Uehara [55] [85] [105] [110] [111] [139]
82Vijay Varadharajan [183]
83Harikrishna Vasanta [141]
84Huaxiong Wang [43] [44] [45] [49] [50] [51] [54] [56] [59] [66] [69] [70] [71] [72] [74] [76] [77] [80] [81] [82] [87] [88] [89] [92] [94] [121] [129] [138] [140]
85Shuhong Wang [165] [169]
86Yejing Wang [48] [57] [58] [65] [67] [68] [73] [78] [83] [90] [93] [95]
87Yongge Wang [129]
88Andrew L. Wendelborn [134]
89Glen E. Wheeler [108]
90Rungrat Wiangsripanawan [163] [167]
91Peter R. Wild [88] [121] [164] [170]
92Duncan S. Wong [138]
93Chaoping Xing [76] [94]
94Sweah Liang Yong [182]
95Lan Yu [148]
96Moti Yung (Mordechai M. Yung) [107] [109] [117] [135] [153] [155]
97Fangguo Zhang [99] [101] [106] [122]
98Yuliang Zheng [11]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)