2010 | ||
---|---|---|
194 | Hadi Ahmadi, Reihaneh Safavi-Naini: Secret Key Agreement over a Pair of Independent Broadcast Channels CoRR abs/1001.3908: (2010) | |
2009 | ||
193 | Wanqing Li, Willy Susilo, Udaya Kiran Tupakula, Reihaneh Safavi-Naini, Vijay Varadharajan: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009 ACM 2009 | |
192 | Michael J. Jacobson Jr., Vincent Rijmen, Reihaneh Safavi-Naini: Selected Areas in Cryptography, 16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers Springer 2009 | |
191 | Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini: Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems. AFRICACRYPT 2009: 198-216 | |
190 | Nicholas Paul Sheppard, Reihaneh Safavi-Naini: On the operational semantics of rights expression languages. Digital Rights Management Workshop 2009: 17-28 | |
189 | Ching Yu Ng, Willy Susilo, Yi Mu, Reihaneh Safavi-Naini: New Privacy Results on Synchronized RFID Authentication Protocols against Tag Tracing. ESORICS 2009: 321-336 | |
188 | Giovanni Di Crescenzo, Shaoquan Jiang, Reihaneh Safavi-Naini: Corruption-Localizing Hashing. ESORICS 2009: 489-504 | |
187 | Michal Sramka, Reihaneh Safavi-Naini, Jörg Denzinger: An Attack on the Privacy of Sanitized Data that Fuses the Outputs of Multiple Data Miners. ICDM Workshops 2009: 130-137 | |
186 | Liang Lu, Reihaneh Safavi-Naini, Markus Hagenbuchner, Willy Susilo, Jeffrey Horton, Sweah Liang Yong, Ah Chung Tsoi: Ranking Attack Graphs with Graph Neural Networks. ISPEC 2009: 345-359 | |
185 | Dongvu Tonien, Reihaneh Safavi-Naini, Peter Nickolas, Yvo Desmedt: Unconditionally Secure Approximate Message Authentication. IWCC 2009: 233-247 | |
184 | Nicholas Paul Sheppard, Reihaneh Safavi-Naini, Mohammad Jafari: A Digital Rights Management Model for Healthcare. POLICY 2009: 106-109 | |
183 | Hongsong Shi, Shaoquan Jiang, Reihaneh Safavi-Naini, Mohammed Ashraful Tuhin: Optimal Secure Message Transmission by Public Discussion CoRR abs/0901.2192: (2009) | |
182 | Angela Piper, Reihaneh Safavi-Naini: How to Compare Image Watermarking Algorithms. T. Data Hiding and Multimedia Security 4: 1-28 (2009) | |
2008 | ||
181 | Larry Korba, Steve Marsh, Reihaneh Safavi-Naini: Sixth Annual Conference on Privacy, Security and Trust, PST 2008, October 1-3, 2008, Fredericton, New Brunswick, Canada IEEE 2008 | |
180 | Reihaneh Safavi-Naini: Information Theoretic Security, Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008, Proceedings Springer 2008 | |
179 | Reihaneh Safavi-Naini, Shaoquan Jiang: Non-interactive conference key distribution and its applications. ASIACCS 2008: 271-282 | |
178 | Ching Yu Ng, Willy Susilo, Yi Mu, Reihaneh Safavi-Naini: RFID Privacy Models Revisited. ESORICS 2008: 251-266 | |
177 | Shaoquan Jiang, Reihaneh Safavi-Naini: An Efficient Deniable Key Exchange Protocol (Extended Abstract). Financial Cryptography 2008: 47-52 | |
176 | Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: Public Key Encryption with Keyword Search Revisited. ICCSA (1) 2008: 1249-1259 | |
175 | Michal Sramka, Reihaneh Safavi-Naini, Jörg Denzinger, Mina Askari, Jie Gao: Utility of Knowledge Extracted from Unsanitized Data when Applied to Sanitized Data. PST 2008: 227-231 | |
174 | Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini: Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures. Public Key Cryptography 2008: 121-140 | |
173 | Adam Muhlbauer, Reihaneh Safavi-Naini, Farzad Salim, Nicholas Paul Sheppard, Jan Martin Surminen: Location constraints in digital rights management. Computer Communications 31(6): 1173-1180 (2008) | |
172 | Sid Stamm, Nicholas Paul Sheppard, Reihaneh Safavi-Naini: Implementing Trusted Terminals with a and SITDRM. Electr. Notes Theor. Comput. Sci. 197(1): 73-85 (2008) | |
171 | Reihaneh Safavi-Naini, Peter R. Wild: Information Theoretic Bounds on Authentication Systems in Query Model. IEEE Transactions on Information Theory 54(6): 2426-2436 (2008) | |
2007 | ||
170 | Mohammad Reza Reyhanitabar, Shuhong Wang, Reihaneh Safavi-Naini: Non-interactive Manual Channel Message Authentication Based on eTCR Hash Functions. ACISP 2007: 385-399 | |
169 | Liang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo: An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme. ACNS 2007: 65-86 | |
168 | Rungrat Wiangsripanawan, Willy Susilo, Reihaneh Safavi-Naini: Design Principles for Low Latency Anonymous Network Systems Secure against Timing Attacks. ACSW Frontiers 2007: 183-191 | |
167 | Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini, Joonsang Baek: Concurrently-secure credential ownership proofs. ASIACCS 2007: 161-172 | |
166 | Reihaneh Safavi-Naini, Shuhong Wang, Yvo Desmedt: Unconditionally secure ring authentication. ASIACCS 2007: 173-181 | |
165 | Dongvu Tonien, Reihaneh Safavi-Naini, Peter R. Wild: Combinatorial characterizations of authentication codes in verification oracle model. ASIACCS 2007: 183-193 | |
164 | Rungrat Wiangsripanawan, Willy Susilo, Reihaneh Safavi-Naini: Achieving Mobility and Anonymity in IP-Based Networks. CANS 2007: 60-79 | |
163 | Farzad Salim, Nicholas Paul Sheppard, Reihaneh Safavi-Naini: Using SITDRM for privacy rights management. CHIMIT 2007: 11 | |
162 | Gelareh Taban, Reihaneh Safavi-Naini: Key Establishment in Heterogeneous Self-organized Networks. ESAS 2007: 58-72 | |
161 | Wenming Lu, Wanqing Li, Reihaneh Safavi-Naini, Philip Ogunbona: A Maximum Likelihood Watermark Decoding Scheme. ICME 2007: 1247-1250 | |
160 | Liang Lu, Jeffrey Horton, Reihaneh Safavi-Naini, Willy Susilo: Transport Layer Identification of Skype Traffic. ICOIN 2007: 465-481 | |
159 | Farzad Salim, Nicholas Paul Sheppard, Reihaneh Safavi-Naini: Enforcing P3P Policies Using a Digital Rights Management System. Privacy Enhancing Technologies 2007: 200-217 | |
158 | Dongvu Tonien, Reihaneh Safavi-Naini: Construction of deletion correcting codes using generalized Reed-Solomon codes and their subcodes. Des. Codes Cryptography 42(2): 227-237 (2007) | |
157 | Luke McAven, Reihaneh Safavi-Naini: Classification of the Deletion Correcting Capabilities of Reed-Solomon Codes of Dimension 2 Over Prime Fields. IEEE Transactions on Information Theory 53(6): 2280-2294 (2007) | |
2006 | ||
156 | Moti Yung, Kaoru Kurosawa, Reihaneh Safavi-Naini: Proceedings of the Sixth ACM Workshop on Digital Rights Management, Alexandria, VA, USA, October 30, 2006 ACM 2006 | |
155 | Rajkumar Buyya, Tianchi Ma, Reihaneh Safavi-Naini, Chris Steketee, Willy Susilo: The proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Hobart, Tasmania, Australia, January 2006 Australian Computer Society 2006 | |
154 | Reihaneh Safavi-Naini, Moti Yung: Digital Rights Management: Technologies, Issues, Challenges and Systems, First International Conference, DRMTICS 2005, Sydney, Australia, October 31 - November 2, 2005, Revised Selected Papers Springer 2006 | |
153 | Lynn Margaret Batten, Reihaneh Safavi-Naini: Information Security and Privacy, 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings Springer 2006 | |
152 | Dongvu Tonien, Reihaneh Safavi-Naini: An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families. ACNS 2006: 82-97 | |
151 | Jeffrey Horton, Reihaneh Safavi-Naini: Detecting Policy Violations through Traffic Analysis. ACSAC 2006: 109-120 | |
150 | Ling Luo, Reihaneh Safavi-Naini, Joonsang Baek, Willy Susilo: Self-organised group key management for ad hoc networks. ASIACCS 2006: 138-147 | |
149 | Lan Yu, Willy Susilo, Reihaneh Safavi-Naini: X2BT Trusted Reputation System: A Robust Mechanism for P2P Networks. CANS 2006: 364-380 | |
148 | Duong Hieu Phan, Reihaneh Safavi-Naini, Dongvu Tonien: Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability. ICALP (2) 2006: 264-275 | |
147 | Wenming Lu, Wanqing Li, Reihaneh Safavi-Naini, Philip Ogunbona: A Pixel-Based Robust Imagewatermarking System. ICME 2006: 1565-1568 | |
146 | Dongvu Tonien, Willy Susilo, Reihaneh Safavi-Naini: Multi-party Concurrent Signatures. ISC 2006: 131-145 | |
145 | Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search. ISC 2006: 217-232 | |
144 | Wenming Lu, Wanqing Li, Reihaneh Safavi-Naini, Philip Ogunbona: Optimal Image Watermark Decoding. PCM 2006: 141-149 | |
143 | Nicholas Paul Sheppard, Reihaneh Safavi-Naini: Protecting Privacy with the MPEG-21 IPMP Framework. Privacy Enhancing Technologies 2006: 152-171 | |
142 | Harikrishna Vasanta, Reihaneh Safavi-Naini, Nicholas Paul Sheppard, Jan Martin Surminen: Distributed Management of OMA DRM Domains. WISA 2006: 237-251 | |
141 | Reihaneh Safavi-Naini, Huaxiong Wang: Secret sharing schemes with partial broadcast channels. Des. Codes Cryptography 41(1): 5-22 (2006) | |
140 | Takeyuki Uehara, Reihaneh Safavi-Naini, Philip Ogunbona: Recovering DC Coefficients in Block-Based DCT. IEEE Transactions on Image Processing 15(11): 3592-3596 (2006) | |
139 | Reihaneh Safavi-Naini, Huaxiong Wang, Duncan S. Wong: Resilient Lkh: Secure Multicast Key Distribution Schemes. Int. J. Found. Comput. Sci. 17(5): 1205-1222 (2006) | |
138 | Lan Nguyen, Reihaneh Safavi-Naini, Kaoru Kurosawa: Verifiable shuffles: a formal model and a Paillier-based three-round construction with provable security. Int. J. Inf. Sec. 5(4): 241-255 (2006) | |
137 | Dongvu Tonien, Reihaneh Safavi-Naini: Recursive constructions of secure codes and hash families using difference function families. J. Comb. Theory, Ser. A 113(4): 664-674 (2006) | |
2005 | ||
136 | Reihaneh Safavi-Naini, Moti Yung: Proceedings of the Fifth ACM Workshop on Digital Rights Management, Alexandria, VA, USA, November 7, 2005 ACM 2005 | |
135 | Rajkumar Buyya, Paul D. Coddington, Paul Montague, Reihaneh Safavi-Naini, Nicholas Paul Sheppard, Andrew L. Wendelborn: ACSW Frontiers 2005, 2005 ACSW Workshops - the Australasian Workshop on Grid Computing and e-Research (AusGrid 2005) and the Third Australasian Information Security Workshop (AISW 2005), Newcastle, NSW, Australia, January/February 2005 Australian Computer Society 2005 | |
134 | Russell Ang, Reihaneh Safavi-Naini, Luke McAven: Cancelable Key-Based Fingerprint Templates. ACISP 2005: 242-252 | |
133 | Lan Nguyen, Reihaneh Safavi-Naini: Dynamic k-Times Anonymous Authentication. ACNS 2005: 318-333 | |
132 | Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: Universal Designated Verifier Signature Proof (or How to Efficiently Prove Knowledge of a Signature). ASIACRYPT 2005: 644-661 | |
131 | Liang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo: On Securing RTP-Based Streaming Content with Firewalls. CANS 2005: 304-319 | |
130 | Yvo Desmedt, Yongge Wang, Reihaneh Safavi-Naini, Huaxiong Wang: Radio Networks with Reliable Communication. COCOON 2005: 156-166 | |
129 | Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: Certificateless Public Key Encryption Without Pairing. ISC 2005: 134-148 | |
128 | Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: Token-Controlled Public Key Encryption. ISPEC 2005: 386-397 | |
127 | Yun Chen, Reihaneh Safavi-Naini, Joonsang Baek, Xin Chen: Server-Aided RSA Key Generation Against Collusion Attack. MADNES 2005: 27-37 | |
126 | Angela Piper, Reihaneh Safavi-Naini, Alfred Mertins: Resolution and quality scalable spread spectrum image watermarking. MM&Sec 2005: 79-90 | |
125 | Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption. Public Key Cryptography 2005: 380-397 | |
124 | Qiong Liu, Reihaneh Safavi-Naini, Nicholas Paul Sheppard: A License Transfer System for Supporting Content Portability in Digital Rights Management. SEC 2005: 189-204 | |
123 | Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo: Attack on Han et al.'s ID-based confirmer (undeniable) signature at ACM-EC'03. Applied Mathematics and Computation 170(2): 1166-1169 (2005) | |
122 | Keith M. Martin, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild: Distributing the Encryption and Decryption of a Block Cipher. Des. Codes Cryptography 36(3): 263-287 (2005) | |
121 | Reihaneh Safavi-Naini, Chris Charnes: MRD Hashing. Des. Codes Cryptography 37(2): 229-242 (2005) | |
120 | Lan Nguyen, Reihaneh Safavi-Naini, Kaoru Kurosawa: A Provably Secure and Efficient Verifiable Shuffle based on a Variant of the Paillier Cryptosystem. J. UCS 11(6): 986-1010 (2005) | |
2004 | ||
119 | Vu Dong Tô, Reihaneh Safavi-Naini: Linear Code Implies Public-Key Traitor Tracing with Revocation. ACISP 2004: 24-35 | |
118 | Luke McAven, Reihaneh Safavi-Naini, Moti Yung: Unconditionally Secure Encryption Under Strong Attacks. ACISP 2004: 427-439 | |
117 | Nathan Curtis, Reihaneh Safavi-Naini, Willy Susilo: X2Rep: Enhanced Trust Semantics for the XRep Protocol. ACNS 2004: 205-219 | |
116 | Lan Nguyen, Reihaneh Safavi-Naini, Kaoru Kurosawa: Verifiable Shuffles: A Formal Model and a Paillier-Based Efficient Construction with Provable Security. ACNS 2004: 61-75 | |
115 | Lan Nguyen, Reihaneh Safavi-Naini: Efficient and Provably Secure Trapdoor-Free Group Signature Schemes from Bilinear Pairings. ASIACRYPT 2004: 372-386 | |
114 | Lan Nguyen, Reihaneh Safavi-Naini: An Efficient Verifiable Shuffle with Perfect Zero-knowledge Proof System. Cryptographic Algorithms and their Uses 2004: 40-56 | |
113 | Reihaneh Safavi-Naini: Tracing traitors: a selective survey. Digital Rights Management Workshop 2004: 72 | |
112 | Reihaneh Safavi-Naini, Nicholas Paul Sheppard, Takeyuki Uehara: Import/export in digital rights management. Digital Rights Management Workshop 2004: 99-110 | |
111 | Takeyuki Uehara, Reihaneh Safavi-Naini, Philip Ogunbona: An MPEG tolerant authentication system for video data. ICME 2004: 891-894 | |
110 | Luke McAven, Reihaneh Safavi-Naini, Moti Yung: Symmetric Authentication Codes with Secrecy and Unconditionally Secure Authenticated Encryption. INDOCRYPT 2004: 148-161 | |
109 | Glen E. Wheeler, Reihaneh Safavi-Naini, Nicholas Paul Sheppard: Weighted Segmented Digital Watermarking. IWDW 2004: 89-100 | |
108 | Reihaneh Safavi-Naini, Luke McAven, Moti Yung: General Group Authentication Codes and Their Relation to "Unconditionally-Secure Signatures". Public Key Cryptography 2004: 231-247 | |
107 | Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo: An Efficient Signature Scheme from Bilinear Pairings and Its Applications. Public Key Cryptography 2004: 277-290 | |
106 | Takeyuki Uehara, Reihaneh Safavi-Naini, Philip Ogunbona: A secure and flexible authentication system for digital images. Multimedia Syst. 9(5): 441-456 (2004) | |
105 | Vu Dong Tô, Reihaneh Safavi-Naini: On the Maximal Codes of Length 3 with the 2-Identifiable Parent Property. SIAM J. Discrete Math. 17(4): 548-570 (2004) | |
2003 | ||
104 | Reihaneh Safavi-Naini, Jennifer Seberry: Information Security and Privacy, 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings Springer 2003 | |
103 | Qiong Liu, Reihaneh Safavi-Naini, Nicholas Paul Sheppard: Digital Rights Management for Content Distribution. ACSW Frontiers 2003: 49-58 | |
102 | Vu Dong Tô, Reihaneh Safavi-Naini, Fangguo Zhang: New traitor tracing schemes using bilinear map. Digital Rights Management Workshop 2003: 67-76 | |
101 | C. Kailasanathan, Reihaneh Safavi-Naini, Philip Ogunbona: Compression Tolerant DCT Based Image Hash. ICDCS Workshops 2003: 562-567 | |
100 | Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo: Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings. INDOCRYPT 2003: 191-204 | |
99 | Angela Piper, Reihaneh Safavi-Naini, Alfred Mertins: Coefficient Selection Methods for Scalable Spread Spectrum Watermarking. IWDW 2003: 235-246 | |
98 | Robert Scealy, Reihaneh Safavi-Naini, Nicholas Paul Sheppard: Performance Measurement of Watermark Embedding Patterns. IWDW 2003: 77-85 | |
97 | Lan Nguyen, Reihaneh Safavi-Naini: Breaking and Mending Resilient Mix-Nets. Privacy Enhancing Technologies 2003: 66-80 | |
96 | Yejing Wang, Jennifer Seberry, Reihaneh Safavi-Naini, Ryoh Fuji-Hara: A Note on the Exposure Property of SBIBD. Electronic Notes in Discrete Mathematics 15: 225-227 (2003) | |
95 | Huaxiong Wang, Chaoping Xing, Reihaneh Safavi-Naini: Linear authentication codes: bounds and constructions. IEEE Transactions on Information Theory 49(4): 866-872 (2003) | |
94 | Reihaneh Safavi-Naini, Yejing Wang: Sequential traitor tracing. IEEE Transactions on Information Theory 49(5): 1319-1326 (2003) | |
2002 | ||
93 | Hartono Kurnio, Reihaneh Safavi-Naini, Huaxiong Wang: A Secure Re-keying Scheme with Key Recovery Property. ACISP 2002: 40-55 | |
92 | Keith B. Frikken, Mikhail J. Atallah, Sunil Prabhakar, Reihaneh Safavi-Naini: Optimal Parallel I/O for Range Queries through Replication. DEXA 2002: 669-678 | |
91 | Reihaneh Safavi-Naini, Yejing Wang: Traitor Tracing for Shortened and Corrupted Fingerprints. Digital Rights Management Workshop 2002: 81-100 | |
90 | Yvo Desmedt, Reihaneh Safavi-Naini, Huaxiong Wang: Redistribution of Mechanical Secret Shares. Financial Cryptography 2002: 238-252 | |
89 | Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild: Threshold MACs. ICISC 2002: 237-252 | |
88 | Hartono Kurnio, Luke McAven, Reihaneh Safavi-Naini, Huaxiong Wang: A Dynamic Group Key Distribution Scheme with Flexible User Join. ICISC 2002: 478-496 | |
87 | Willy Susilo, Reihaneh Safavi-Naini: An Efficient Fail-Stop Signature Scheme Based on Factorization. ICISC 2002: 62-74 | |
86 | Takeyuki Uehara, Reihaneh Safavi-Naini: On (In)security of "A Robust Image Authentication Method". IEEE Pacific Rim Conference on Multimedia 2002: 1025-1032 | |
85 | Gareth Brisbane, Reihaneh Safavi-Naini, Philip Ogunbona: An Algorithm for Data Hiding Using Median Cut Segmentation. IEEE Pacific Rim Conference on Multimedia 2002: 89-96 | |
84 | Vu Dong Tô, Reihaneh Safavi-Naini, Yejing Wang: A 2-Secure Code with Efficient Tracing Algorithm. INDOCRYPT 2002: 149-162 | |
83 | Hartono Kurnio, Reihaneh Safavi-Naini, Huaxiong Wang: A Group Key Distribution Scheme with Decentralised User Join. SCN 2002: 146-163 | |
82 | Reihaneh Safavi-Naini, Huaxiong Wang: Bounds and Constructions for Threshold Shared Generation of Authenticators. Int. J. Comput. Math. 79(12): 1285-1301 (2002) | |
2001 | ||
81 | Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang: How to Construct Fail-Stop Confirmer Signature Schemes. ACISP 2001: 435-444 | |
80 | Shahrokh Saeednia, Reihaneh Safavi-Naini, Willy Susilo: On Classifying Conference Key Distribution Protocols. ACISP 2001: 51-59 | |
79 | Reihaneh Safavi-Naini, Yejing Wang: Collusion Secure q-ary Fingerprinting for Perceptual Content. Digital Rights Management Workshop 2001: 57-75 | |
78 | Hartono Kurnio, Reihaneh Safavi-Naini, Huaxiong Wang: Efficient Revocation Schemes for Secure Multicast. ICISC 2001: 160-177 | |
77 | Reihaneh Safavi-Naini, Huaxiong Wang, Chaoping Xing: Linear Authentication Codes: Bounds and Constructions. INDOCRYPT 2001: 127-135 | |
76 | Nicholas Paul Sheppard, Reihaneh Safavi-Naini, Philip Ogunbona: On multiple watermarking. MM&Sec 2001: 3-6 | |
75 | Yvo Desmedt, Reihaneh Safavi-Naini, Huaxiong Wang, Lynn Margaret Batten, Chris Charnes, Josef Pieprzyk: Broadcast anti-jamming systems. Computer Networks 35(2-3): 223-236 (2001) | |
74 | Reihaneh Safavi-Naini, Yejing Wang: New results on frame-proof codes and traceability schemes. IEEE Transactions on Information Theory 47(7): 3029-3033 (2001) | |
73 | Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang: An Efficient Construction for Fail-Stop Signature for Long Messages. J. Inf. Sci. Eng. 17(6): 879-898 (2001) | |
72 | Reihaneh Safavi-Naini, Huaxiong Wang: Broadcast authentication for group communication. Theor. Comput. Sci. 269(1-2): 1-21 (2001) | |
2000 | ||
71 | Hartono Kurnio, Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang: Key Management for Secure Multicast with Dynamic Controller. ACISP 2000: 178-190 | |
70 | Reihaneh Safavi-Naini, Huaxiong Wang: New constructions for multicast re-keying schemes using perfect hash families. ACM Conference on Computer and Communications Security 2000: 228-234 | |
69 | Reihaneh Safavi-Naini, Yejing Wang: A Combinatorial Approach to Asymmetric Traitor Tracing. COCOON 2000: 416-425 | |
68 | Reihaneh Safavi-Naini, Yejing Wang: Sequential Traitor Tracing. CRYPTO 2000: 316-332 | |
67 | Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang: Fail-Stop Signature for Long Messages. INDOCRYPT 2000: 165-177 | |
66 | Reihaneh Safavi-Naini, Yejing Wang: Anonymous Traceability Schemes with Unconditional Security. INDOCRYPT 2000: 250-261 | |
65 | Reihaneh Safavi-Naini, Willy Susilo: Threshold Fail-Stop Signature Schemes Based on Discrete Logarithm and Factorization. ISW 2000: 292-307 | |
64 | Gareth Brisbane, Reihaneh Safavi-Naini, Philip Ogunbona: Region-Based Watermarking by Distribution Adjustment. ISW 2000: 54-68 | |
63 | Willy Susilo, Reihaneh Safavi-Naini, Marc Gysin, Jennifer Seberry: A New and Efficient Fail-stop Signature Scheme. Comput. J. 43(5): 430-437 (2000) | |
1999 | ||
62 | Josef Pieprzyk, Reihaneh Safavi-Naini, Jennifer Seberry: Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings Springer 1999 | |
61 | Willy Susilo, Reihaneh Safavi-Naini, Josef Pieprzyk: Fail-Stop Threshold Signature Schemes Based on Elliptic Curves. ACISP 1999: 103-116 | |
60 | Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang: Changing Thresholds in the Absence of Secure Channels. ACISP 1999: 177-191 | |
59 | Dingyi Pei, Yuqiang Li, Yejing Wang, Reihaneh Safavi-Naini: Characterization of Optimal Authentication Codes with Arbitration. ACISP 1999: 303-313 | |
58 | Yejing Wang, Reihaneh Safavi-Naini: A3-Codes under Collusion Attacks. ASIACRYPT 1999: 390-398 | |
57 | Reihaneh Safavi-Naini, Huaxiong Wang: Broadcast Authentication in Group Communication. ASIACRYPT 1999: 399-411 | |
56 | Takeyuki Uehara, Reihaneh Safavi-Naini: Attack on Liu/Farrell/Boyd Arithmetic Coding Encryption Scheme. Communications and Multimedia Security 1999: 273-290 | |
55 | Reihaneh Safavi-Naini, Huaxiong Wang, Kwok-Yan Lam: A New Approach to Robust Threshold RSA Signature Schemes. ICISC 1999: 184-196 | |
54 | Willy Susilo, Reihaneh Safavi-Naini, Josef Pieprzyk: RSA-Based Fail-Stop Signature Schemes. ICPP Workshops 1999: 161-166 | |
53 | Gareth Brisbane, Reihaneh Safavi-Naini, Philip Ogunbona: Region-Based Watermarking for Images. ISW 1999: 154-166 | |
52 | Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang: Changing Thresholds in the Absence of Secure Channels. Australian Computer Journal 31(2): 34-43 (1999) | |
51 | Keith M. Martin, Reihaneh Safavi-Naini, Huaxiong Wang: Bounds and Techniques for Efficient Redistribution of Secret Shares to New Access Structures. Comput. J. 42(8): 638-649 (1999) | |
50 | Reihaneh Safavi-Naini, Huaxiong Wang: Multireceiver Authentication Codes: Models, Bounds, Constructions, and Extensions. Inf. Comput. 151(1-2): 148-172 (1999) | |
1998 | ||
49 | Reihaneh Safavi-Naini, Yejing Wang: Bounds and Constructions for A3-code with Multi-senders. ACISP 1998: 159-168 | |
48 | Shahrokh Saeednia, Reihaneh Safavi-Naini: Efficient Identity-Based Conference Key Distribution Protocols. ACISP 1998: 320-331 | |
47 | Hossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini: Secret Sharing in Multilevel and Compartmented Groups. ACISP 1998: 367-378 | |
46 | Hossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang: On Construction of Cumulative Secret Sharing Schemes. ACISP 1998: 379-390 | |
45 | Reihaneh Safavi-Naini, Huaxiong Wang: Bounds and Constructions for Multireceiver Authentication Codes. ASIACRYPT 1998: 242-256 | |
44 | Reihaneh Safavi-Naini, Huaxiong Wang: New Results on Multi-Receiver Authentication Codes. EUROCRYPT 1998: 527-541 | |
43 | Reihaneh Safavi-Naini, Shahram Bakhtiari, Chris Charnes: MRD Hashing. FSE 1998: 134-149 | |
42 | Shahrokh Saeednia, Reihaneh Safavi-Naini: On the Security of Girault`s Identification Scheme. Public Key Cryptography 1998: 149-153 | |
41 | Reihaneh Safavi-Naini: Three Systems for Threshold Generation of Authenticators. Des. Codes Cryptography 13(3): 299-312 (1998) | |
1997 | ||
40 | Shahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk: A Message Authentication Code Based on Latin Squares. ACISP 1997: 194-203 | |
39 | Chor Wah Man, Reihaneh Safavi-Naini: Democratic Key Escrow Scheme. ACISP 1997: 249-260 | |
38 | Keith M. Martin, Reihaneh Safavi-Naini: Multisender authentication systems with unconditional security. ICICS 1997: 130-143 | |
37 | Hossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini: Remarks on the multiple assignment secret sharing scheme. ICICS 1997: 72-80 | |
36 | Chris Charnes, Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini: Secret sharing in hierarchical groups. ICICS 1997: 81-86 | |
35 | Shahrokh Saeednia, Reihaneh Safavi-Naini: A New Identity-Based Key Exchange Protocol Minimizing Computation and Communication. ISW 1997: 328-334 | |
34 | Ahmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini: A Multi-Level View Model for Secure Object-Oriented Databases. Data Knowl. Eng. 23(2): 97-117 (1997) | |
33 | Shahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk: On the Weakness of Gong's Collisionful Hash Functions. J. UCS 3(3): 185-196 (1997) | |
32 | Ahmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini, Janusz R. Getta: Using Cryptographic Hash Functions for Discretionary Access Control in Object-Oriented Databases. J. UCS 3(6): 730-753 (1997) | |
1996 | ||
31 | Ahmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini: Modeling a multi-level secure object-oriented database using views. ACISP 1996: 190-206 | |
30 | Mansour Esmaili, Reihaneh Safavi-Naini, Josef Pieprzyk: Evidential reasoning in network intrusion detection systems. ACISP 1996: 253-265 | |
29 | Hossein Ghodosi, Josef Pieprzyk, Chris Charnes, Reihaneh Safavi-Naini: Cryptosystems for hierarchical groups. ACISP 1996: 275-286 | |
28 | Shahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk: On selectable collisionful hash functions. ACISP 1996: 287-298 | |
27 | Shahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk: On password-based authenticated key exchange using collisionful hash functions. ACISP 1996: 299-310 | |
26 | Josef Pieprzyk, Hossein Ghodosi, Chris Charnes, Reihaneh Safavi-Naini: Cryptography based on transcendental numbers. ACISP 1996: 96-107 | |
25 | Mansour Esmaili, Bala Balachandran, Reihaneh Safavi-Naini, Josef Pieprzyk: Case-Based Reasoning for Intrusion Detection. ACSAC 1996: 214-223 | |
24 | Reihaneh Safavi-Naini: Three Systems for Shared Generation of Authenticators. COCOON 1996: 401-410 | |
23 | Mansour Esmaili, Reihaneh Safavi-Naini, Josef Pieprzyk: Computer Intrusion Detection and Incomplete Information. IEA/AIE 1996: 778 | |
22 | Reihaneh Safavi-Naini, L. Tombak: Near-perfect protection and key strategies in authentication codes under spoofing attack of order r. Ars Comb. 44: (1996) | |
21 | Reihaneh Safavi-Naini, L. Tombak: Authentication Codes in Plaintext and Chosen-Content Attacks. Des. Codes Cryptography 7(1-2): 83-99 (1996) | |
1995 | ||
20 | Josef Pieprzyk, Reihaneh Safavi-Naini: Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28 - December 1, 1994, Proceedings Springer 1995 | |
19 | Ahmad Baraani-Dastjerdi, Janusz R. Getta, Josef Pieprzyk, Reihaneh Safavi-Naini: A Cryptographic Solution to Discretionary Access Control in Structurally Object-Oriented Databases. Australasian Database Conference 1995: 0- | |
18 | Shahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk: Keyed Hash Functions. Cryptography: Policy and Algorithms 1995: 201-214 | |
17 | Ahmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini, Janusz R. Getta: A Model of Authorization for Object-Oriented Databases based on Object Views. DOOD 1995: 503-520 | |
16 | Ahmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini, Janusz R. Getta: A Cryptographic Mechanism for Object-Instance-Based Authorization in Object-Oriented Database Systems. OOER 1995: 44-54 | |
1994 | ||
15 | L. Tombak, Reihaneh Safavi-Naini: Authentication Codes That Are r-Fold Secure Against Spoofing. ACM Conference on Computer and Communications Security 1994: 166-169 | |
14 | Chris Charnes, Josef Pieprzyk, Reihaneh Safavi-Naini: Conditionally Secure Secret Sharing Schemes with Disenrollment Capability. ACM Conference on Computer and Communications Security 1994: 89-95 | |
13 | Reihaneh Safavi-Naini, L. Tombak: Combinatorial Structure of A-codes with r-fold Security. ASIACRYPT 1994: 211-223 | |
12 | Reihaneh Safavi-Naini, L. Tombak: Authentication Codes in Plaintext and Chosen-content Attacks. EUROCRYPT 1994: 254-265 | |
11 | Chris Charnes, Luke O'Connor, Josef Pieprzyk, Reihaneh Safavi-Naini, Yuliang Zheng: Comments on Soviet Encryption Algorithm. EUROCRYPT 1994: 433-438 | |
10 | Jonathan Giddy, Reihaneh Safavi-Naini: Automated Cryptanalysis of Transposition Ciphers. Comput. J. 37(5): 429-436 (1994) | |
1993 | ||
9 | Reihaneh Safavi-Naini, L. Tombak: Optimal Authentication Systems. EUROCRYPT 1993: 12-27 | |
1992 | ||
8 | L. Tombak, Reihaneh Safavi-Naini: Authentication Codes with Perfect Protection. AUSCRYPT 1992: 15-26 | |
7 | Reihaneh Safavi-Naini, L. Tombak: Authentication Codes under Impersonation Attack. AUSCRYPT 1992: 35-47 | |
6 | E. A. Campbell, Reihaneh Safavi-Naini, P. A. Pleasants: Partial Belief and Probabilistic Reasoning in the Analysis of Secure Protocols. CSFW 1992: 84-91 | |
1991 | ||
5 | Reihaneh Safavi-Naini: Feistel Type Authentication Codes. ASIACRYPT 1991: 170-178 | |
4 | Josef Pieprzyk, Reihaneh Safavi-Naini: Randomized Authentication Systems. EUROCRYPT 1991: 472-481 | |
3 | Reihaneh Safavi-Naini, Jennifer Seberry: Error-correcting codes for authentication and subliminal channels. IEEE Transactions on Information Theory 37(1): 13-17 (1991) | |
1990 | ||
2 | Reihaneh Safavi-Naini: Parallel Generation of Pseudo-Random Sequences. AUSCRYPT 1990: 176-193 | |
1979 | ||
1 | Reihaneh Safavi-Naini, Ian F. Blake: Generalized t-Designs and Weighted Majority Decoding Information and Control 42(3): 261-282 (1979) |