2009 |
183 | | Wanqing Li,
Willy Susilo,
Udaya Kiran Tupakula,
Reihaneh Safavi-Naini,
Vijay Varadharajan:
Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009
ACM 2009 |
182 | EE | Liang Lu,
Reihaneh Safavi-Naini,
Markus Hagenbuchner,
Willy Susilo,
Jeffrey Horton,
Sweah Liang Yong,
Ah Chung Tsoi:
Ranking Attack Graphs with Graph Neural Networks.
ISPEC 2009: 345-359 |
181 | EE | Hongsong Shi,
Shaoquan Jiang,
Reihaneh Safavi-Naini,
Mohammed Ashraful Tuhin:
Optimal Secure Message Transmission by Public Discussion
CoRR abs/0901.2192: (2009) |
2008 |
180 | | Larry Korba,
Steve Marsh,
Reihaneh Safavi-Naini:
Sixth Annual Conference on Privacy, Security and Trust, PST 2008, October 1-3, 2008, Fredericton, New Brunswick, Canada
IEEE 2008 |
179 | | Reihaneh Safavi-Naini:
Information Theoretic Security, Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008, Proceedings
Springer 2008 |
178 | EE | Reihaneh Safavi-Naini,
Shaoquan Jiang:
Non-interactive conference key distribution and its applications.
ASIACCS 2008: 271-282 |
177 | EE | Ching Yu Ng,
Willy Susilo,
Yi Mu,
Reihaneh Safavi-Naini:
RFID Privacy Models Revisited.
ESORICS 2008: 251-266 |
176 | EE | Shaoquan Jiang,
Reihaneh Safavi-Naini:
An Efficient Deniable Key Exchange Protocol (Extended Abstract).
Financial Cryptography 2008: 47-52 |
175 | EE | Joonsang Baek,
Reihaneh Safavi-Naini,
Willy Susilo:
Public Key Encryption with Keyword Search Revisited.
ICCSA (1) 2008: 1249-1259 |
174 | EE | Michal Sramka,
Reihaneh Safavi-Naini,
Jörg Denzinger,
Mina Askari,
Jie Gao:
Utility of Knowledge Extracted from Unsanitized Data when Applied to Sanitized Data.
PST 2008: 227-231 |
173 | EE | Siamak Fayyaz Shahandashti,
Reihaneh Safavi-Naini:
Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures.
Public Key Cryptography 2008: 121-140 |
172 | EE | Adam Muhlbauer,
Reihaneh Safavi-Naini,
Farzad Salim,
Nicholas Paul Sheppard,
Jan Martin Surminen:
Location constraints in digital rights management.
Computer Communications 31(6): 1173-1180 (2008) |
171 | EE | Sid Stamm,
Nicholas Paul Sheppard,
Reihaneh Safavi-Naini:
Implementing Trusted Terminals with a and SITDRM.
Electr. Notes Theor. Comput. Sci. 197(1): 73-85 (2008) |
170 | EE | Reihaneh Safavi-Naini,
Peter R. Wild:
Information Theoretic Bounds on Authentication Systems in Query Model.
IEEE Transactions on Information Theory 54(6): 2426-2436 (2008) |
2007 |
169 | EE | Mohammad Reza Reyhanitabar,
Shuhong Wang,
Reihaneh Safavi-Naini:
Non-interactive Manual Channel Message Authentication Based on eTCR Hash Functions.
ACISP 2007: 385-399 |
168 | EE | Liang Lu,
Reihaneh Safavi-Naini,
Jeffrey Horton,
Willy Susilo:
An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme.
ACNS 2007: 65-86 |
167 | EE | Rungrat Wiangsripanawan,
Willy Susilo,
Reihaneh Safavi-Naini:
Design Principles for Low Latency Anonymous Network Systems Secure against Timing Attacks.
ACSW Frontiers 2007: 183-191 |
166 | EE | Siamak Fayyaz Shahandashti,
Reihaneh Safavi-Naini,
Joonsang Baek:
Concurrently-secure credential ownership proofs.
ASIACCS 2007: 161-172 |
165 | EE | Reihaneh Safavi-Naini,
Shuhong Wang,
Yvo Desmedt:
Unconditionally secure ring authentication.
ASIACCS 2007: 173-181 |
164 | EE | Dongvu Tonien,
Reihaneh Safavi-Naini,
Peter R. Wild:
Combinatorial characterizations of authentication codes in verification oracle model.
ASIACCS 2007: 183-193 |
163 | EE | Rungrat Wiangsripanawan,
Willy Susilo,
Reihaneh Safavi-Naini:
Achieving Mobility and Anonymity in IP-Based Networks.
CANS 2007: 60-79 |
162 | EE | Farzad Salim,
Nicholas Paul Sheppard,
Reihaneh Safavi-Naini:
Using SITDRM for privacy rights management.
CHIMIT 2007: 11 |
161 | EE | Gelareh Taban,
Reihaneh Safavi-Naini:
Key Establishment in Heterogeneous Self-organized Networks.
ESAS 2007: 58-72 |
160 | EE | Wenming Lu,
Wanqing Li,
Reihaneh Safavi-Naini,
Philip Ogunbona:
A Maximum Likelihood Watermark Decoding Scheme.
ICME 2007: 1247-1250 |
159 | EE | Liang Lu,
Jeffrey Horton,
Reihaneh Safavi-Naini,
Willy Susilo:
Transport Layer Identification of Skype Traffic.
ICOIN 2007: 465-481 |
158 | EE | Farzad Salim,
Nicholas Paul Sheppard,
Reihaneh Safavi-Naini:
Enforcing P3P Policies Using a Digital Rights Management System.
Privacy Enhancing Technologies 2007: 200-217 |
157 | EE | Dongvu Tonien,
Reihaneh Safavi-Naini:
Construction of deletion correcting codes using generalized Reed-Solomon codes and their subcodes.
Des. Codes Cryptography 42(2): 227-237 (2007) |
156 | EE | Luke McAven,
Reihaneh Safavi-Naini:
Classification of the Deletion Correcting Capabilities of Reed-Solomon Codes of Dimension 2 Over Prime Fields.
IEEE Transactions on Information Theory 53(6): 2280-2294 (2007) |
2006 |
155 | | Moti Yung,
Kaoru Kurosawa,
Reihaneh Safavi-Naini:
Proceedings of the Sixth ACM Workshop on Digital Rights Management, Alexandria, VA, USA, October 30, 2006
ACM 2006 |
154 | | Rajkumar Buyya,
Tianchi Ma,
Reihaneh Safavi-Naini,
Chris Steketee,
Willy Susilo:
The proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Hobart, Tasmania, Australia, January 2006
Australian Computer Society 2006 |
153 | | Reihaneh Safavi-Naini,
Moti Yung:
Digital Rights Management: Technologies, Issues, Challenges and Systems, First International Conference, DRMTICS 2005, Sydney, Australia, October 31 - November 2, 2005, Revised Selected Papers
Springer 2006 |
152 | | Lynn Margaret Batten,
Reihaneh Safavi-Naini:
Information Security and Privacy, 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings
Springer 2006 |
151 | EE | Dongvu Tonien,
Reihaneh Safavi-Naini:
An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families.
ACNS 2006: 82-97 |
150 | EE | Jeffrey Horton,
Reihaneh Safavi-Naini:
Detecting Policy Violations through Traffic Analysis.
ACSAC 2006: 109-120 |
149 | EE | Ling Luo,
Reihaneh Safavi-Naini,
Joonsang Baek,
Willy Susilo:
Self-organised group key management for ad hoc networks.
ASIACCS 2006: 138-147 |
148 | EE | Lan Yu,
Willy Susilo,
Reihaneh Safavi-Naini:
X2BT Trusted Reputation System: A Robust Mechanism for P2P Networks.
CANS 2006: 364-380 |
147 | EE | Duong Hieu Phan,
Reihaneh Safavi-Naini,
Dongvu Tonien:
Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability.
ICALP (2) 2006: 264-275 |
146 | EE | Wenming Lu,
Wanqing Li,
Reihaneh Safavi-Naini,
Philip Ogunbona:
A Pixel-Based Robust Imagewatermarking System.
ICME 2006: 1565-1568 |
145 | EE | Dongvu Tonien,
Willy Susilo,
Reihaneh Safavi-Naini:
Multi-party Concurrent Signatures.
ISC 2006: 131-145 |
144 | EE | Joonsang Baek,
Reihaneh Safavi-Naini,
Willy Susilo:
On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search.
ISC 2006: 217-232 |
143 | EE | Wenming Lu,
Wanqing Li,
Reihaneh Safavi-Naini,
Philip Ogunbona:
Optimal Image Watermark Decoding.
PCM 2006: 141-149 |
142 | EE | Nicholas Paul Sheppard,
Reihaneh Safavi-Naini:
Protecting Privacy with the MPEG-21 IPMP Framework.
Privacy Enhancing Technologies 2006: 152-171 |
141 | EE | Harikrishna Vasanta,
Reihaneh Safavi-Naini,
Nicholas Paul Sheppard,
Jan Martin Surminen:
Distributed Management of OMA DRM Domains.
WISA 2006: 237-251 |
140 | EE | Reihaneh Safavi-Naini,
Huaxiong Wang:
Secret sharing schemes with partial broadcast channels.
Des. Codes Cryptography 41(1): 5-22 (2006) |
139 | EE | Takeyuki Uehara,
Reihaneh Safavi-Naini,
Philip Ogunbona:
Recovering DC Coefficients in Block-Based DCT.
IEEE Transactions on Image Processing 15(11): 3592-3596 (2006) |
138 | EE | Reihaneh Safavi-Naini,
Huaxiong Wang,
Duncan S. Wong:
Resilient Lkh: Secure Multicast Key Distribution Schemes.
Int. J. Found. Comput. Sci. 17(5): 1205-1222 (2006) |
137 | EE | Lan Nguyen,
Reihaneh Safavi-Naini,
Kaoru Kurosawa:
Verifiable shuffles: a formal model and a Paillier-based three-round construction with provable security.
Int. J. Inf. Sec. 5(4): 241-255 (2006) |
136 | EE | Dongvu Tonien,
Reihaneh Safavi-Naini:
Recursive constructions of secure codes and hash families using difference function families.
J. Comb. Theory, Ser. A 113(4): 664-674 (2006) |
2005 |
135 | | Reihaneh Safavi-Naini,
Moti Yung:
Proceedings of the Fifth ACM Workshop on Digital Rights Management, Alexandria, VA, USA, November 7, 2005
ACM 2005 |
134 | | Rajkumar Buyya,
Paul D. Coddington,
Paul Montague,
Reihaneh Safavi-Naini,
Nicholas Paul Sheppard,
Andrew L. Wendelborn:
ACSW Frontiers 2005, 2005 ACSW Workshops - the Australasian Workshop on Grid Computing and e-Research (AusGrid 2005) and the Third Australasian Information Security Workshop (AISW 2005), Newcastle, NSW, Australia, January/February 2005
Australian Computer Society 2005 |
133 | EE | Russell Ang,
Reihaneh Safavi-Naini,
Luke McAven:
Cancelable Key-Based Fingerprint Templates.
ACISP 2005: 242-252 |
132 | EE | Lan Nguyen,
Reihaneh Safavi-Naini:
Dynamic k-Times Anonymous Authentication.
ACNS 2005: 318-333 |
131 | EE | Joonsang Baek,
Reihaneh Safavi-Naini,
Willy Susilo:
Universal Designated Verifier Signature Proof (or How to Efficiently Prove Knowledge of a Signature).
ASIACRYPT 2005: 644-661 |
130 | EE | Liang Lu,
Reihaneh Safavi-Naini,
Jeffrey Horton,
Willy Susilo:
On Securing RTP-Based Streaming Content with Firewalls.
CANS 2005: 304-319 |
129 | EE | Yvo Desmedt,
Yongge Wang,
Reihaneh Safavi-Naini,
Huaxiong Wang:
Radio Networks with Reliable Communication.
COCOON 2005: 156-166 |
128 | EE | Joonsang Baek,
Reihaneh Safavi-Naini,
Willy Susilo:
Certificateless Public Key Encryption Without Pairing.
ISC 2005: 134-148 |
127 | EE | Joonsang Baek,
Reihaneh Safavi-Naini,
Willy Susilo:
Token-Controlled Public Key Encryption.
ISPEC 2005: 386-397 |
126 | EE | Yun Chen,
Reihaneh Safavi-Naini,
Joonsang Baek,
Xin Chen:
Server-Aided RSA Key Generation Against Collusion Attack.
MADNES 2005: 27-37 |
125 | EE | Angela Piper,
Reihaneh Safavi-Naini,
Alfred Mertins:
Resolution and quality scalable spread spectrum image watermarking.
MM&Sec 2005: 79-90 |
124 | EE | Joonsang Baek,
Reihaneh Safavi-Naini,
Willy Susilo:
Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption.
Public Key Cryptography 2005: 380-397 |
123 | | Qiong Liu,
Reihaneh Safavi-Naini,
Nicholas Paul Sheppard:
A License Transfer System for Supporting Content Portability in Digital Rights Management.
SEC 2005: 189-204 |
122 | EE | Fangguo Zhang,
Reihaneh Safavi-Naini,
Willy Susilo:
Attack on Han et al.'s ID-based confirmer (undeniable) signature at ACM-EC'03.
Applied Mathematics and Computation 170(2): 1166-1169 (2005) |
121 | EE | Keith M. Martin,
Reihaneh Safavi-Naini,
Huaxiong Wang,
Peter R. Wild:
Distributing the Encryption and Decryption of a Block Cipher.
Des. Codes Cryptography 36(3): 263-287 (2005) |
120 | EE | Reihaneh Safavi-Naini,
Chris Charnes:
MRD Hashing.
Des. Codes Cryptography 37(2): 229-242 (2005) |
119 | EE | Lan Nguyen,
Reihaneh Safavi-Naini,
Kaoru Kurosawa:
A Provably Secure and Efficient Verifiable Shuffle based on a Variant of the Paillier Cryptosystem.
J. UCS 11(6): 986-1010 (2005) |
2004 |
118 | EE | Vu Dong Tô,
Reihaneh Safavi-Naini:
Linear Code Implies Public-Key Traitor Tracing with Revocation.
ACISP 2004: 24-35 |
117 | EE | Luke McAven,
Reihaneh Safavi-Naini,
Moti Yung:
Unconditionally Secure Encryption Under Strong Attacks.
ACISP 2004: 427-439 |
116 | EE | Nathan Curtis,
Reihaneh Safavi-Naini,
Willy Susilo:
X2Rep: Enhanced Trust Semantics for the XRep Protocol.
ACNS 2004: 205-219 |
115 | EE | Lan Nguyen,
Reihaneh Safavi-Naini,
Kaoru Kurosawa:
Verifiable Shuffles: A Formal Model and a Paillier-Based Efficient Construction with Provable Security.
ACNS 2004: 61-75 |
114 | EE | Lan Nguyen,
Reihaneh Safavi-Naini:
Efficient and Provably Secure Trapdoor-Free Group Signature Schemes from Bilinear Pairings.
ASIACRYPT 2004: 372-386 |
113 | | Lan Nguyen,
Reihaneh Safavi-Naini:
An Efficient Verifiable Shuffle with Perfect Zero-knowledge Proof System.
Cryptographic Algorithms and their Uses 2004: 40-56 |
112 | EE | Reihaneh Safavi-Naini:
Tracing traitors: a selective survey.
Digital Rights Management Workshop 2004: 72 |
111 | EE | Reihaneh Safavi-Naini,
Nicholas Paul Sheppard,
Takeyuki Uehara:
Import/export in digital rights management.
Digital Rights Management Workshop 2004: 99-110 |
110 | | Takeyuki Uehara,
Reihaneh Safavi-Naini,
Philip Ogunbona:
An MPEG tolerant authentication system for video data.
ICME 2004: 891-894 |
109 | EE | Luke McAven,
Reihaneh Safavi-Naini,
Moti Yung:
Symmetric Authentication Codes with Secrecy and Unconditionally Secure Authenticated Encryption.
INDOCRYPT 2004: 148-161 |
108 | EE | Glen E. Wheeler,
Reihaneh Safavi-Naini,
Nicholas Paul Sheppard:
Weighted Segmented Digital Watermarking.
IWDW 2004: 89-100 |
107 | EE | Reihaneh Safavi-Naini,
Luke McAven,
Moti Yung:
General Group Authentication Codes and Their Relation to "Unconditionally-Secure Signatures".
Public Key Cryptography 2004: 231-247 |
106 | EE | Fangguo Zhang,
Reihaneh Safavi-Naini,
Willy Susilo:
An Efficient Signature Scheme from Bilinear Pairings and Its Applications.
Public Key Cryptography 2004: 277-290 |
105 | EE | Takeyuki Uehara,
Reihaneh Safavi-Naini,
Philip Ogunbona:
A secure and flexible authentication system for digital images.
Multimedia Syst. 9(5): 441-456 (2004) |
104 | EE | Vu Dong Tô,
Reihaneh Safavi-Naini:
On the Maximal Codes of Length 3 with the 2-Identifiable Parent Property.
SIAM J. Discrete Math. 17(4): 548-570 (2004) |
2003 |
103 | | Reihaneh Safavi-Naini,
Jennifer Seberry:
Information Security and Privacy, 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings
Springer 2003 |
102 | EE | Qiong Liu,
Reihaneh Safavi-Naini,
Nicholas Paul Sheppard:
Digital Rights Management for Content Distribution.
ACSW Frontiers 2003: 49-58 |
101 | EE | Vu Dong Tô,
Reihaneh Safavi-Naini,
Fangguo Zhang:
New traitor tracing schemes using bilinear map.
Digital Rights Management Workshop 2003: 67-76 |
100 | EE | C. Kailasanathan,
Reihaneh Safavi-Naini,
Philip Ogunbona:
Compression Tolerant DCT Based Image Hash.
ICDCS Workshops 2003: 562-567 |
99 | EE | Fangguo Zhang,
Reihaneh Safavi-Naini,
Willy Susilo:
Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings.
INDOCRYPT 2003: 191-204 |
98 | EE | Angela Piper,
Reihaneh Safavi-Naini,
Alfred Mertins:
Coefficient Selection Methods for Scalable Spread Spectrum Watermarking.
IWDW 2003: 235-246 |
97 | EE | Robert Scealy,
Reihaneh Safavi-Naini,
Nicholas Paul Sheppard:
Performance Measurement of Watermark Embedding Patterns.
IWDW 2003: 77-85 |
96 | EE | Lan Nguyen,
Reihaneh Safavi-Naini:
Breaking and Mending Resilient Mix-Nets.
Privacy Enhancing Technologies 2003: 66-80 |
95 | EE | Yejing Wang,
Jennifer Seberry,
Reihaneh Safavi-Naini,
Ryoh Fuji-Hara:
A Note on the Exposure Property of SBIBD.
Electronic Notes in Discrete Mathematics 15: 225-227 (2003) |
94 | | Huaxiong Wang,
Chaoping Xing,
Reihaneh Safavi-Naini:
Linear authentication codes: bounds and constructions.
IEEE Transactions on Information Theory 49(4): 866-872 (2003) |
93 | | Reihaneh Safavi-Naini,
Yejing Wang:
Sequential traitor tracing.
IEEE Transactions on Information Theory 49(5): 1319-1326 (2003) |
2002 |
92 | EE | Hartono Kurnio,
Reihaneh Safavi-Naini,
Huaxiong Wang:
A Secure Re-keying Scheme with Key Recovery Property.
ACISP 2002: 40-55 |
91 | EE | Keith B. Frikken,
Mikhail J. Atallah,
Sunil Prabhakar,
Reihaneh Safavi-Naini:
Optimal Parallel I/O for Range Queries through Replication.
DEXA 2002: 669-678 |
90 | EE | Reihaneh Safavi-Naini,
Yejing Wang:
Traitor Tracing for Shortened and Corrupted Fingerprints.
Digital Rights Management Workshop 2002: 81-100 |
89 | EE | Yvo Desmedt,
Reihaneh Safavi-Naini,
Huaxiong Wang:
Redistribution of Mechanical Secret Shares.
Financial Cryptography 2002: 238-252 |
88 | EE | Keith M. Martin,
Josef Pieprzyk,
Reihaneh Safavi-Naini,
Huaxiong Wang,
Peter R. Wild:
Threshold MACs.
ICISC 2002: 237-252 |
87 | EE | Hartono Kurnio,
Luke McAven,
Reihaneh Safavi-Naini,
Huaxiong Wang:
A Dynamic Group Key Distribution Scheme with Flexible User Join.
ICISC 2002: 478-496 |
86 | EE | Willy Susilo,
Reihaneh Safavi-Naini:
An Efficient Fail-Stop Signature Scheme Based on Factorization.
ICISC 2002: 62-74 |
85 | EE | Takeyuki Uehara,
Reihaneh Safavi-Naini:
On (In)security of "A Robust Image Authentication Method".
IEEE Pacific Rim Conference on Multimedia 2002: 1025-1032 |
84 | EE | Gareth Brisbane,
Reihaneh Safavi-Naini,
Philip Ogunbona:
An Algorithm for Data Hiding Using Median Cut Segmentation.
IEEE Pacific Rim Conference on Multimedia 2002: 89-96 |
83 | EE | Vu Dong Tô,
Reihaneh Safavi-Naini,
Yejing Wang:
A 2-Secure Code with Efficient Tracing Algorithm.
INDOCRYPT 2002: 149-162 |
82 | EE | Hartono Kurnio,
Reihaneh Safavi-Naini,
Huaxiong Wang:
A Group Key Distribution Scheme with Decentralised User Join.
SCN 2002: 146-163 |
81 | EE | Reihaneh Safavi-Naini,
Huaxiong Wang:
Bounds and Constructions for Threshold Shared Generation of Authenticators.
Int. J. Comput. Math. 79(12): 1285-1301 (2002) |
2001 |
80 | EE | Reihaneh Safavi-Naini,
Willy Susilo,
Huaxiong Wang:
How to Construct Fail-Stop Confirmer Signature Schemes.
ACISP 2001: 435-444 |
79 | EE | Shahrokh Saeednia,
Reihaneh Safavi-Naini,
Willy Susilo:
On Classifying Conference Key Distribution Protocols.
ACISP 2001: 51-59 |
78 | EE | Reihaneh Safavi-Naini,
Yejing Wang:
Collusion Secure q-ary Fingerprinting for Perceptual Content.
Digital Rights Management Workshop 2001: 57-75 |
77 | EE | Hartono Kurnio,
Reihaneh Safavi-Naini,
Huaxiong Wang:
Efficient Revocation Schemes for Secure Multicast.
ICISC 2001: 160-177 |
76 | EE | Reihaneh Safavi-Naini,
Huaxiong Wang,
Chaoping Xing:
Linear Authentication Codes: Bounds and Constructions.
INDOCRYPT 2001: 127-135 |
75 | EE | Nicholas Paul Sheppard,
Reihaneh Safavi-Naini,
Philip Ogunbona:
On multiple watermarking.
MM&Sec 2001: 3-6 |
74 | EE | Yvo Desmedt,
Reihaneh Safavi-Naini,
Huaxiong Wang,
Lynn Margaret Batten,
Chris Charnes,
Josef Pieprzyk:
Broadcast anti-jamming systems.
Computer Networks 35(2-3): 223-236 (2001) |
73 | | Reihaneh Safavi-Naini,
Yejing Wang:
New results on frame-proof codes and traceability schemes.
IEEE Transactions on Information Theory 47(7): 3029-3033 (2001) |
72 | EE | Reihaneh Safavi-Naini,
Willy Susilo,
Huaxiong Wang:
An Efficient Construction for Fail-Stop Signature for Long Messages.
J. Inf. Sci. Eng. 17(6): 879-898 (2001) |
71 | EE | Reihaneh Safavi-Naini,
Huaxiong Wang:
Broadcast authentication for group communication.
Theor. Comput. Sci. 269(1-2): 1-21 (2001) |
2000 |
70 | | Hartono Kurnio,
Reihaneh Safavi-Naini,
Willy Susilo,
Huaxiong Wang:
Key Management for Secure Multicast with Dynamic Controller.
ACISP 2000: 178-190 |
69 | EE | Reihaneh Safavi-Naini,
Huaxiong Wang:
New constructions for multicast re-keying schemes using perfect hash families.
ACM Conference on Computer and Communications Security 2000: 228-234 |
68 | EE | Reihaneh Safavi-Naini,
Yejing Wang:
A Combinatorial Approach to Asymmetric Traitor Tracing.
COCOON 2000: 416-425 |
67 | EE | Reihaneh Safavi-Naini,
Yejing Wang:
Sequential Traitor Tracing.
CRYPTO 2000: 316-332 |
66 | EE | Reihaneh Safavi-Naini,
Willy Susilo,
Huaxiong Wang:
Fail-Stop Signature for Long Messages.
INDOCRYPT 2000: 165-177 |
65 | EE | Reihaneh Safavi-Naini,
Yejing Wang:
Anonymous Traceability Schemes with Unconditional Security.
INDOCRYPT 2000: 250-261 |
64 | EE | Reihaneh Safavi-Naini,
Willy Susilo:
Threshold Fail-Stop Signature Schemes Based on Discrete Logarithm and Factorization.
ISW 2000: 292-307 |
63 | EE | Gareth Brisbane,
Reihaneh Safavi-Naini,
Philip Ogunbona:
Region-Based Watermarking by Distribution Adjustment.
ISW 2000: 54-68 |
62 | EE | Willy Susilo,
Reihaneh Safavi-Naini,
Marc Gysin,
Jennifer Seberry:
A New and Efficient Fail-stop Signature Scheme.
Comput. J. 43(5): 430-437 (2000) |
1999 |
61 | | Josef Pieprzyk,
Reihaneh Safavi-Naini,
Jennifer Seberry:
Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings
Springer 1999 |
60 | EE | Willy Susilo,
Reihaneh Safavi-Naini,
Josef Pieprzyk:
Fail-Stop Threshold Signature Schemes Based on Elliptic Curves.
ACISP 1999: 103-116 |
59 | EE | Keith M. Martin,
Josef Pieprzyk,
Reihaneh Safavi-Naini,
Huaxiong Wang:
Changing Thresholds in the Absence of Secure Channels.
ACISP 1999: 177-191 |
58 | EE | Dingyi Pei,
Yuqiang Li,
Yejing Wang,
Reihaneh Safavi-Naini:
Characterization of Optimal Authentication Codes with Arbitration.
ACISP 1999: 303-313 |
57 | | Yejing Wang,
Reihaneh Safavi-Naini:
A3-Codes under Collusion Attacks.
ASIACRYPT 1999: 390-398 |
56 | | Reihaneh Safavi-Naini,
Huaxiong Wang:
Broadcast Authentication in Group Communication.
ASIACRYPT 1999: 399-411 |
55 | | Takeyuki Uehara,
Reihaneh Safavi-Naini:
Attack on Liu/Farrell/Boyd Arithmetic Coding Encryption Scheme.
Communications and Multimedia Security 1999: 273-290 |
54 | | Reihaneh Safavi-Naini,
Huaxiong Wang,
Kwok-Yan Lam:
A New Approach to Robust Threshold RSA Signature Schemes.
ICISC 1999: 184-196 |
53 | EE | Willy Susilo,
Reihaneh Safavi-Naini,
Josef Pieprzyk:
RSA-Based Fail-Stop Signature Schemes.
ICPP Workshops 1999: 161-166 |
52 | EE | Gareth Brisbane,
Reihaneh Safavi-Naini,
Philip Ogunbona:
Region-Based Watermarking for Images.
ISW 1999: 154-166 |
51 | | Keith M. Martin,
Josef Pieprzyk,
Reihaneh Safavi-Naini,
Huaxiong Wang:
Changing Thresholds in the Absence of Secure Channels.
Australian Computer Journal 31(2): 34-43 (1999) |
50 | | Keith M. Martin,
Reihaneh Safavi-Naini,
Huaxiong Wang:
Bounds and Techniques for Efficient Redistribution of Secret Shares to New Access Structures.
Comput. J. 42(8): 638-649 (1999) |
49 | | Reihaneh Safavi-Naini,
Huaxiong Wang:
Multireceiver Authentication Codes: Models, Bounds, Constructions, and Extensions.
Inf. Comput. 151(1-2): 148-172 (1999) |
1998 |
48 | EE | Reihaneh Safavi-Naini,
Yejing Wang:
Bounds and Constructions for A3-code with Multi-senders.
ACISP 1998: 159-168 |
47 | EE | Shahrokh Saeednia,
Reihaneh Safavi-Naini:
Efficient Identity-Based Conference Key Distribution Protocols.
ACISP 1998: 320-331 |
46 | EE | Hossein Ghodosi,
Josef Pieprzyk,
Reihaneh Safavi-Naini:
Secret Sharing in Multilevel and Compartmented Groups.
ACISP 1998: 367-378 |
45 | EE | Hossein Ghodosi,
Josef Pieprzyk,
Reihaneh Safavi-Naini,
Huaxiong Wang:
On Construction of Cumulative Secret Sharing Schemes.
ACISP 1998: 379-390 |
44 | EE | Reihaneh Safavi-Naini,
Huaxiong Wang:
Bounds and Constructions for Multireceiver Authentication Codes.
ASIACRYPT 1998: 242-256 |
43 | EE | Reihaneh Safavi-Naini,
Huaxiong Wang:
New Results on Multi-Receiver Authentication Codes.
EUROCRYPT 1998: 527-541 |
42 | EE | Reihaneh Safavi-Naini,
Shahram Bakhtiari,
Chris Charnes:
MRD Hashing.
FSE 1998: 134-149 |
41 | EE | Shahrokh Saeednia,
Reihaneh Safavi-Naini:
On the Security of Girault`s Identification Scheme.
Public Key Cryptography 1998: 149-153 |
40 | | Reihaneh Safavi-Naini:
Three Systems for Threshold Generation of Authenticators.
Des. Codes Cryptography 13(3): 299-312 (1998) |
1997 |
39 | | Shahram Bakhtiari,
Reihaneh Safavi-Naini,
Josef Pieprzyk:
A Message Authentication Code Based on Latin Squares.
ACISP 1997: 194-203 |
38 | | Chor Wah Man,
Reihaneh Safavi-Naini:
Democratic Key Escrow Scheme.
ACISP 1997: 249-260 |
37 | | Keith M. Martin,
Reihaneh Safavi-Naini:
Multisender authentication systems with unconditional security.
ICICS 1997: 130-143 |
36 | | Hossein Ghodosi,
Josef Pieprzyk,
Reihaneh Safavi-Naini:
Remarks on the multiple assignment secret sharing scheme.
ICICS 1997: 72-80 |
35 | | Chris Charnes,
Keith M. Martin,
Josef Pieprzyk,
Reihaneh Safavi-Naini:
Secret sharing in hierarchical groups.
ICICS 1997: 81-86 |
34 | | Shahrokh Saeednia,
Reihaneh Safavi-Naini:
A New Identity-Based Key Exchange Protocol Minimizing Computation and Communication.
ISW 1997: 328-334 |
33 | EE | Ahmad Baraani-Dastjerdi,
Josef Pieprzyk,
Reihaneh Safavi-Naini:
A Multi-Level View Model for Secure Object-Oriented Databases.
Data Knowl. Eng. 23(2): 97-117 (1997) |
32 | EE | Shahram Bakhtiari,
Reihaneh Safavi-Naini,
Josef Pieprzyk:
On the Weakness of Gong's Collisionful Hash Functions.
J. UCS 3(3): 185-196 (1997) |
31 | EE | Ahmad Baraani-Dastjerdi,
Josef Pieprzyk,
Reihaneh Safavi-Naini,
Janusz R. Getta:
Using Cryptographic Hash Functions for Discretionary Access Control in Object-Oriented Databases.
J. UCS 3(6): 730-753 (1997) |
1996 |
30 | | Ahmad Baraani-Dastjerdi,
Josef Pieprzyk,
Reihaneh Safavi-Naini:
Modeling a multi-level secure object-oriented database using views.
ACISP 1996: 190-206 |
29 | | Mansour Esmaili,
Reihaneh Safavi-Naini,
Josef Pieprzyk:
Evidential reasoning in network intrusion detection systems.
ACISP 1996: 253-265 |
28 | | Hossein Ghodosi,
Josef Pieprzyk,
Chris Charnes,
Reihaneh Safavi-Naini:
Cryptosystems for hierarchical groups.
ACISP 1996: 275-286 |
27 | | Shahram Bakhtiari,
Reihaneh Safavi-Naini,
Josef Pieprzyk:
On selectable collisionful hash functions.
ACISP 1996: 287-298 |
26 | | Shahram Bakhtiari,
Reihaneh Safavi-Naini,
Josef Pieprzyk:
On password-based authenticated key exchange using collisionful hash functions.
ACISP 1996: 299-310 |
25 | | Josef Pieprzyk,
Hossein Ghodosi,
Chris Charnes,
Reihaneh Safavi-Naini:
Cryptography based on transcendental numbers.
ACISP 1996: 96-107 |
24 | EE | Mansour Esmaili,
Bala Balachandran,
Reihaneh Safavi-Naini,
Josef Pieprzyk:
Case-Based Reasoning for Intrusion Detection.
ACSAC 1996: 214-223 |
23 | | Reihaneh Safavi-Naini:
Three Systems for Shared Generation of Authenticators.
COCOON 1996: 401-410 |
22 | | Reihaneh Safavi-Naini,
L. Tombak:
Near-perfect protection and key strategies in authentication codes under spoofing attack of order r.
Ars Comb. 44: (1996) |
21 | | Reihaneh Safavi-Naini,
L. Tombak:
Authentication Codes in Plaintext and Chosen-Content Attacks.
Des. Codes Cryptography 7(1-2): 83-99 (1996) |
1995 |
20 | | Josef Pieprzyk,
Reihaneh Safavi-Naini:
Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28 - December 1, 1994, Proceedings
Springer 1995 |
19 | | Ahmad Baraani-Dastjerdi,
Janusz R. Getta,
Josef Pieprzyk,
Reihaneh Safavi-Naini:
A Cryptographic Solution to Discretionary Access Control in Structurally Object-Oriented Databases.
Australasian Database Conference 1995: 0- |
18 | | Shahram Bakhtiari,
Reihaneh Safavi-Naini,
Josef Pieprzyk:
Keyed Hash Functions.
Cryptography: Policy and Algorithms 1995: 201-214 |
17 | | Ahmad Baraani-Dastjerdi,
Josef Pieprzyk,
Reihaneh Safavi-Naini,
Janusz R. Getta:
A Model of Authorization for Object-Oriented Databases based on Object Views.
DOOD 1995: 503-520 |
16 | EE | Ahmad Baraani-Dastjerdi,
Josef Pieprzyk,
Reihaneh Safavi-Naini,
Janusz R. Getta:
A Cryptographic Mechanism for Object-Instance-Based Authorization in Object-Oriented Database Systems.
OOER 1995: 44-54 |
1994 |
15 | EE | L. Tombak,
Reihaneh Safavi-Naini:
Authentication Codes That Are r-Fold Secure Against Spoofing.
ACM Conference on Computer and Communications Security 1994: 166-169 |
14 | EE | Chris Charnes,
Josef Pieprzyk,
Reihaneh Safavi-Naini:
Conditionally Secure Secret Sharing Schemes with Disenrollment Capability.
ACM Conference on Computer and Communications Security 1994: 89-95 |
13 | | Reihaneh Safavi-Naini,
L. Tombak:
Combinatorial Structure of A-codes with r-fold Security.
ASIACRYPT 1994: 211-223 |
12 | EE | Reihaneh Safavi-Naini,
L. Tombak:
Authentication Codes in Plaintext and Chosen-content Attacks.
EUROCRYPT 1994: 254-265 |
11 | EE | Chris Charnes,
Luke O'Connor,
Josef Pieprzyk,
Reihaneh Safavi-Naini,
Yuliang Zheng:
Comments on Soviet Encryption Algorithm.
EUROCRYPT 1994: 433-438 |
10 | | Jonathan Giddy,
Reihaneh Safavi-Naini:
Automated Cryptanalysis of Transposition Ciphers.
Comput. J. 37(5): 429-436 (1994) |
1993 |
9 | EE | Reihaneh Safavi-Naini,
L. Tombak:
Optimal Authentication Systems.
EUROCRYPT 1993: 12-27 |
1992 |
8 | | L. Tombak,
Reihaneh Safavi-Naini:
Authentication Codes with Perfect Protection.
AUSCRYPT 1992: 15-26 |
7 | | Reihaneh Safavi-Naini,
L. Tombak:
Authentication Codes under Impersonation Attack.
AUSCRYPT 1992: 35-47 |
6 | | E. A. Campbell,
Reihaneh Safavi-Naini,
P. A. Pleasants:
Partial Belief and Probabilistic Reasoning in the Analysis of Secure Protocols.
CSFW 1992: 84-91 |
1991 |
5 | | Reihaneh Safavi-Naini:
Feistel Type Authentication Codes.
ASIACRYPT 1991: 170-178 |
4 | EE | Josef Pieprzyk,
Reihaneh Safavi-Naini:
Randomized Authentication Systems.
EUROCRYPT 1991: 472-481 |
3 | | Reihaneh Safavi-Naini,
Jennifer Seberry:
Error-correcting codes for authentication and subliminal channels.
IEEE Transactions on Information Theory 37(1): 13-17 (1991) |
1990 |
2 | | Reihaneh Safavi-Naini:
Parallel Generation of Pseudo-Random Sequences.
AUSCRYPT 1990: 176-193 |
1979 |
1 | | Reihaneh Safavi-Naini,
Ian F. Blake:
Generalized t-Designs and Weighted Majority Decoding
Information and Control 42(3): 261-282 (1979) |