The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Reihaneh Safavi-Naini: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Ahmad Baraani-Dastjerdi, Janusz R. Getta, Josef Pieprzyk, Reihaneh Safavi-Naini
    A Cryptographic Solution to Discretionary Access Control in Structurally Object-Oriented Databases. [Citation Graph (1, 0)][DBLP]
    Australasian Database Conference, 1995, pp:0-0 [Conf]
  2. Russell Ang, Reihaneh Safavi-Naini, Luke McAven
    Cancelable Key-Based Fingerprint Templates. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:242-252 [Conf]
  3. Mansour Esmaili, Reihaneh Safavi-Naini, Josef Pieprzyk
    Evidential reasoning in network intrusion detection systems. [Citation Graph (0, 0)][DBLP]
    ACISP, 1996, pp:253-265 [Conf]
  4. Shahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk
    On selectable collisionful hash functions. [Citation Graph (0, 0)][DBLP]
    ACISP, 1996, pp:287-298 [Conf]
  5. Shahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk
    On password-based authenticated key exchange using collisionful hash functions. [Citation Graph (0, 0)][DBLP]
    ACISP, 1996, pp:299-310 [Conf]
  6. Shahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk
    A Message Authentication Code Based on Latin Squares. [Citation Graph (0, 0)][DBLP]
    ACISP, 1997, pp:194-203 [Conf]
  7. Ahmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini
    Modeling a multi-level secure object-oriented database using views. [Citation Graph (0, 0)][DBLP]
    ACISP, 1996, pp:190-206 [Conf]
  8. Hossein Ghodosi, Josef Pieprzyk, Chris Charnes, Reihaneh Safavi-Naini
    Cryptosystems for hierarchical groups. [Citation Graph (0, 0)][DBLP]
    ACISP, 1996, pp:275-286 [Conf]
  9. Hossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini
    Secret Sharing in Multilevel and Compartmented Groups. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:367-378 [Conf]
  10. Hossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang
    On Construction of Cumulative Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:379-390 [Conf]
  11. Vu Dong Tô, Reihaneh Safavi-Naini
    Linear Code Implies Public-Key Traitor Tracing with Revocation. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:24-35 [Conf]
  12. Hartono Kurnio, Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang
    Key Management for Secure Multicast with Dynamic Controller. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:178-190 [Conf]
  13. Hartono Kurnio, Reihaneh Safavi-Naini, Huaxiong Wang
    A Secure Re-keying Scheme with Key Recovery Property. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:40-55 [Conf]
  14. Chor Wah Man, Reihaneh Safavi-Naini
    Democratic Key Escrow Scheme. [Citation Graph (0, 0)][DBLP]
    ACISP, 1997, pp:249-260 [Conf]
  15. Dingyi Pei, Yuqiang Li, Yejing Wang, Reihaneh Safavi-Naini
    Characterization of Optimal Authentication Codes with Arbitration. [Citation Graph (0, 0)][DBLP]
    ACISP, 1999, pp:303-313 [Conf]
  16. Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang
    Changing Thresholds in the Absence of Secure Channels. [Citation Graph (0, 0)][DBLP]
    ACISP, 1999, pp:177-191 [Conf]
  17. Josef Pieprzyk, Hossein Ghodosi, Chris Charnes, Reihaneh Safavi-Naini
    Cryptography based on transcendental numbers. [Citation Graph (0, 0)][DBLP]
    ACISP, 1996, pp:96-107 [Conf]
  18. Luke McAven, Reihaneh Safavi-Naini, Moti Yung
    Unconditionally Secure Encryption Under Strong Attacks. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:427-439 [Conf]
  19. Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang
    How to Construct Fail-Stop Confirmer Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:435-444 [Conf]
  20. Shahrokh Saeednia, Reihaneh Safavi-Naini
    Efficient Identity-Based Conference Key Distribution Protocols. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:320-331 [Conf]
  21. Shahrokh Saeednia, Reihaneh Safavi-Naini, Willy Susilo
    On Classifying Conference Key Distribution Protocols. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:51-59 [Conf]
  22. Reihaneh Safavi-Naini, Yejing Wang
    Bounds and Constructions for A3-code with Multi-senders. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:159-168 [Conf]
  23. Willy Susilo, Reihaneh Safavi-Naini, Josef Pieprzyk
    Fail-Stop Threshold Signature Schemes Based on Elliptic Curves. [Citation Graph (0, 0)][DBLP]
    ACISP, 1999, pp:103-116 [Conf]
  24. Lan Nguyen, Reihaneh Safavi-Naini
    Dynamic k-Times Anonymous Authentication. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:318-333 [Conf]
  25. Lan Nguyen, Reihaneh Safavi-Naini, Kaoru Kurosawa
    Verifiable Shuffles: A Formal Model and a Paillier-Based Efficient Construction with Provable Security. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:61-75 [Conf]
  26. Nathan Curtis, Reihaneh Safavi-Naini, Willy Susilo
    X2Rep: Enhanced Trust Semantics for the XRep Protocol. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:205-219 [Conf]
  27. Dongvu Tonien, Reihaneh Safavi-Naini
    An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:82-97 [Conf]
  28. Mansour Esmaili, Bala Balachandran, Reihaneh Safavi-Naini, Josef Pieprzyk
    Case-Based Reasoning for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1996, pp:214-223 [Conf]
  29. Qiong Liu, Reihaneh Safavi-Naini, Nicholas Paul Sheppard
    Digital Rights Management for Content Distribution. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2003, pp:49-58 [Conf]
  30. Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
    Universal Designated Verifier Signature Proof (or How to Efficiently Prove Knowledge of a Signature). [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2005, pp:644-661 [Conf]
  31. Lan Nguyen, Reihaneh Safavi-Naini
    Efficient and Provably Secure Trapdoor-Free Group Signature Schemes from Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:372-386 [Conf]
  32. Reihaneh Safavi-Naini
    Parallel Generation of Pseudo-Random Sequences. [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:176-193 [Conf]
  33. Reihaneh Safavi-Naini
    Feistel Type Authentication Codes. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:170-178 [Conf]
  34. Reihaneh Safavi-Naini, L. Tombak
    Authentication Codes under Impersonation Attack. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:35-47 [Conf]
  35. Reihaneh Safavi-Naini, L. Tombak
    Combinatorial Structure of A-codes with r-fold Security. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:211-223 [Conf]
  36. Reihaneh Safavi-Naini, Huaxiong Wang
    Bounds and Constructions for Multireceiver Authentication Codes. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:242-256 [Conf]
  37. Reihaneh Safavi-Naini, Huaxiong Wang
    Broadcast Authentication in Group Communication. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1999, pp:399-411 [Conf]
  38. L. Tombak, Reihaneh Safavi-Naini
    Authentication Codes with Perfect Protection. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:15-26 [Conf]
  39. Yejing Wang, Reihaneh Safavi-Naini
    A3-Codes under Collusion Attacks. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1999, pp:390-398 [Conf]
  40. Liang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo
    On Securing RTP-Based Streaming Content with Firewalls. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:304-319 [Conf]
  41. Lan Yu, Willy Susilo, Reihaneh Safavi-Naini
    X2BT Trusted Reputation System: A Robust Mechanism for P2P Networks. [Citation Graph (0, 0)][DBLP]
    CANS, 2006, pp:364-380 [Conf]
  42. Lan Nguyen, Reihaneh Safavi-Naini
    An Efficient Verifiable Shuffle with Perfect Zero-knowledge Proof System. [Citation Graph (0, 0)][DBLP]
    Cryptographic Algorithms and their Uses, 2004, pp:40-56 [Conf]
  43. Chris Charnes, Josef Pieprzyk, Reihaneh Safavi-Naini
    Conditionally Secure Secret Sharing Schemes with Disenrollment Capability. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1994, pp:89-95 [Conf]
  44. Ling Luo, Reihaneh Safavi-Naini, Joonsang Baek, Willy Susilo
    Self-organised group key management for ad hoc networks. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:138-147 [Conf]
  45. Reihaneh Safavi-Naini, Huaxiong Wang
    New constructions for multicast re-keying schemes using perfect hash families. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:228-234 [Conf]
  46. Reihaneh Safavi-Naini, Yejing Wang
    Collusion Secure q-ary Fingerprinting for Perceptual Content. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2001, pp:57-75 [Conf]
  47. Reihaneh Safavi-Naini, Yejing Wang
    Traitor Tracing for Shortened and Corrupted Fingerprints. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2002, pp:81-100 [Conf]
  48. L. Tombak, Reihaneh Safavi-Naini
    Authentication Codes That Are r-Fold Secure Against Spoofing. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1994, pp:166-169 [Conf]
  49. Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini, Joonsang Baek
    Concurrently-secure credential ownership proofs. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:161-172 [Conf]
  50. Dongvu Tonien, Reihaneh Safavi-Naini, Peter R. Wild
    Combinatorial characterizations of authentication codes in verification oracle model. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:183-193 [Conf]
  51. Reihaneh Safavi-Naini, Shuhong Wang, Yvo Desmedt
    Unconditionally secure ring authentication. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:173-181 [Conf]
  52. Takeyuki Uehara, Reihaneh Safavi-Naini
    Attack on Liu/Farrell/Boyd Arithmetic Coding Encryption Scheme. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1999, pp:273-290 [Conf]
  53. Yvo Desmedt, Yongge Wang, Reihaneh Safavi-Naini, Huaxiong Wang
    Radio Networks with Reliable Communication. [Citation Graph (0, 0)][DBLP]
    COCOON, 2005, pp:156-166 [Conf]
  54. Reihaneh Safavi-Naini
    Three Systems for Shared Generation of Authenticators. [Citation Graph (0, 0)][DBLP]
    COCOON, 1996, pp:401-410 [Conf]
  55. Reihaneh Safavi-Naini, Yejing Wang
    A Combinatorial Approach to Asymmetric Traitor Tracing. [Citation Graph (0, 0)][DBLP]
    COCOON, 2000, pp:416-425 [Conf]
  56. Shahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk
    Keyed Hash Functions. [Citation Graph (0, 0)][DBLP]
    Cryptography: Policy and Algorithms, 1995, pp:201-214 [Conf]
  57. Reihaneh Safavi-Naini, Yejing Wang
    Sequential Traitor Tracing. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2000, pp:316-332 [Conf]
  58. E. A. Campbell, Reihaneh Safavi-Naini, P. A. Pleasants
    Partial Belief and Probabilistic Reasoning in the Analysis of Secure Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 1992, pp:84-91 [Conf]
  59. Keith B. Frikken, Mikhail J. Atallah, Sunil Prabhakar, Reihaneh Safavi-Naini
    Optimal Parallel I/O for Range Queries through Replication. [Citation Graph (0, 0)][DBLP]
    DEXA, 2002, pp:669-678 [Conf]
  60. Ahmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini, Janusz R. Getta
    A Model of Authorization for Object-Oriented Databases based on Object Views. [Citation Graph (0, 0)][DBLP]
    DOOD, 1995, pp:503-520 [Conf]
  61. Reihaneh Safavi-Naini
    Tracing traitors: a selective survey. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2004, pp:72- [Conf]
  62. Vu Dong Tô, Reihaneh Safavi-Naini, Fangguo Zhang
    New traitor tracing schemes using bilinear map. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2003, pp:67-76 [Conf]
  63. Reihaneh Safavi-Naini, Nicholas Paul Sheppard, Takeyuki Uehara
    Import/export in digital rights management. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2004, pp:99-110 [Conf]
  64. Ahmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini, Janusz R. Getta
    A Cryptographic Mechanism for Object-Instance-Based Authorization in Object-Oriented Database Systems. [Citation Graph (0, 10)][DBLP]
    OOER, 1995, pp:44-54 [Conf]
  65. Chris Charnes, Luke O'Connor, Josef Pieprzyk, Reihaneh Safavi-Naini, Yuliang Zheng
    Comments on Soviet Encryption Algorithm. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:433-438 [Conf]
  66. Josef Pieprzyk, Reihaneh Safavi-Naini
    Randomized Authentication Systems. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:472-481 [Conf]
  67. Reihaneh Safavi-Naini, L. Tombak
    Optimal Authentication Systems. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1993, pp:12-27 [Conf]
  68. Reihaneh Safavi-Naini, L. Tombak
    Authentication Codes in Plaintext and Chosen-content Attacks. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:254-265 [Conf]
  69. Reihaneh Safavi-Naini, Huaxiong Wang
    New Results on Multi-Receiver Authentication Codes. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:527-541 [Conf]
  70. Yvo Desmedt, Reihaneh Safavi-Naini, Huaxiong Wang
    Redistribution of Mechanical Secret Shares. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2002, pp:238-252 [Conf]
  71. Reihaneh Safavi-Naini, Shahram Bakhtiari, Chris Charnes
    MRD Hashing. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1998, pp:134-149 [Conf]
  72. Duong Hieu Phan, Reihaneh Safavi-Naini, Dongvu Tonien
    Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:264-275 [Conf]
  73. C. Kailasanathan, Reihaneh Safavi-Naini, Philip Ogunbona
    Compression Tolerant DCT Based Image Hash. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2003, pp:562-567 [Conf]
  74. Hossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini
    Remarks on the multiple assignment secret sharing scheme. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:72-80 [Conf]
  75. Chris Charnes, Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini
    Secret sharing in hierarchical groups. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:81-86 [Conf]
  76. Keith M. Martin, Reihaneh Safavi-Naini
    Multisender authentication systems with unconditional security. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:130-143 [Conf]
  77. Hartono Kurnio, Luke McAven, Reihaneh Safavi-Naini, Huaxiong Wang
    A Dynamic Group Key Distribution Scheme with Flexible User Join. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:478-496 [Conf]
  78. Hartono Kurnio, Reihaneh Safavi-Naini, Huaxiong Wang
    Efficient Revocation Schemes for Secure Multicast. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:160-177 [Conf]
  79. Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild
    Threshold MACs. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:237-252 [Conf]
  80. Reihaneh Safavi-Naini, Huaxiong Wang, Kwok-Yan Lam
    A New Approach to Robust Threshold RSA Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ICISC, 1999, pp:184-196 [Conf]
  81. Willy Susilo, Reihaneh Safavi-Naini
    An Efficient Fail-Stop Signature Scheme Based on Factorization. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:62-74 [Conf]
  82. Takeyuki Uehara, Reihaneh Safavi-Naini, Philip Ogunbona
    An MPEG tolerant authentication system for video data. [Citation Graph (0, 0)][DBLP]
    ICME, 2004, pp:891-894 [Conf]
  83. Willy Susilo, Reihaneh Safavi-Naini, Josef Pieprzyk
    RSA-Based Fail-Stop Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ICPP Workshops, 1999, pp:161-166 [Conf]
  84. Luke McAven, Reihaneh Safavi-Naini, Moti Yung
    Symmetric Authentication Codes with Secrecy and Unconditionally Secure Authenticated Encryption. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:148-161 [Conf]
  85. Reihaneh Safavi-Naini, Huaxiong Wang, Chaoping Xing
    Linear Authentication Codes: Bounds and Constructions. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2001, pp:127-135 [Conf]
  86. Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang
    Fail-Stop Signature for Long Messages. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2000, pp:165-177 [Conf]
  87. Reihaneh Safavi-Naini, Yejing Wang
    Anonymous Traceability Schemes with Unconditional Security. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2000, pp:250-261 [Conf]
  88. Vu Dong Tô, Reihaneh Safavi-Naini, Yejing Wang
    A 2-Secure Code with Efficient Tracing Algorithm. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2002, pp:149-162 [Conf]
  89. Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo
    Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2003, pp:191-204 [Conf]
  90. Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
    Token-Controlled Public Key Encryption. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:386-397 [Conf]
  91. Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
    Certificateless Public Key Encryption Without Pairing. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:134-148 [Conf]
  92. Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
    On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:217-232 [Conf]
  93. Gareth Brisbane, Reihaneh Safavi-Naini, Philip Ogunbona
    Region-Based Watermarking by Distribution Adjustment. [Citation Graph (0, 0)][DBLP]
    ISW, 2000, pp:54-68 [Conf]
  94. Gareth Brisbane, Reihaneh Safavi-Naini, Philip Ogunbona
    Region-Based Watermarking for Images. [Citation Graph (0, 0)][DBLP]
    ISW, 1999, pp:154-166 [Conf]
  95. Dongvu Tonien, Willy Susilo, Reihaneh Safavi-Naini
    Multi-party Concurrent Signatures. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:131-145 [Conf]
  96. Shahrokh Saeednia, Reihaneh Safavi-Naini
    A New Identity-Based Key Exchange Protocol Minimizing Computation and Communication. [Citation Graph (0, 0)][DBLP]
    ISW, 1997, pp:328-334 [Conf]
  97. Reihaneh Safavi-Naini, Willy Susilo
    Threshold Fail-Stop Signature Schemes Based on Discrete Logarithm and Factorization. [Citation Graph (0, 0)][DBLP]
    ISW, 2000, pp:292-307 [Conf]
  98. Angela Piper, Reihaneh Safavi-Naini, Alfred Mertins
    Coefficient Selection Methods for Scalable Spread Spectrum Watermarking. [Citation Graph (0, 0)][DBLP]
    IWDW, 2003, pp:235-246 [Conf]
  99. Robert Scealy, Reihaneh Safavi-Naini, Nicholas Paul Sheppard
    Performance Measurement of Watermark Embedding Patterns. [Citation Graph (0, 0)][DBLP]
    IWDW, 2003, pp:77-85 [Conf]
  100. Glen E. Wheeler, Reihaneh Safavi-Naini, Nicholas Paul Sheppard
    Weighted Segmented Digital Watermarking. [Citation Graph (0, 0)][DBLP]
    IWDW, 2004, pp:89-100 [Conf]
  101. Yun Chen, Reihaneh Safavi-Naini, Joonsang Baek, Xin Chen
    Server-Aided RSA Key Generation Against Collusion Attack. [Citation Graph (0, 0)][DBLP]
    MADNES, 2005, pp:27-37 [Conf]
  102. Gareth Brisbane, Reihaneh Safavi-Naini, Philip Ogunbona
    An Algorithm for Data Hiding Using Median Cut Segmentation. [Citation Graph (0, 0)][DBLP]
    IEEE Pacific Rim Conference on Multimedia, 2002, pp:89-96 [Conf]
  103. Wenming Lu, Wanqing Li, Reihaneh Safavi-Naini, Philip Ogunbona
    Optimal Image Watermark Decoding. [Citation Graph (0, 0)][DBLP]
    PCM, 2006, pp:141-149 [Conf]
  104. Takeyuki Uehara, Reihaneh Safavi-Naini
    On (In)security of "A Robust Image Authentication Method". [Citation Graph (0, 0)][DBLP]
    IEEE Pacific Rim Conference on Multimedia, 2002, pp:1025-1032 [Conf]
  105. Nicholas Paul Sheppard, Reihaneh Safavi-Naini
    Protecting Privacy with the MPEG-21 IPMP Framework. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2006, pp:152-171 [Conf]
  106. Lan Nguyen, Reihaneh Safavi-Naini
    Breaking and Mending Resilient Mix-Nets. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2003, pp:66-80 [Conf]
  107. Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
    Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2005, pp:380-397 [Conf]
  108. Shahrokh Saeednia, Reihaneh Safavi-Naini
    On the Security of Girault`s Identification Scheme. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1998, pp:149-153 [Conf]
  109. Reihaneh Safavi-Naini, Luke McAven, Moti Yung
    General Group Authentication Codes and Their Relation to "Unconditionally-Secure Signatures". [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:231-247 [Conf]
  110. Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo
    An Efficient Signature Scheme from Bilinear Pairings and Its Applications. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:277-290 [Conf]
  111. Hartono Kurnio, Reihaneh Safavi-Naini, Huaxiong Wang
    A Group Key Distribution Scheme with Decentralised User Join. [Citation Graph (0, 0)][DBLP]
    SCN, 2002, pp:146-163 [Conf]
  112. Qiong Liu, Reihaneh Safavi-Naini, Nicholas Paul Sheppard
    A License Transfer System for Supporting Content Portability in Digital Rights Management. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:189-204 [Conf]
  113. Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang
    Changing Thresholds in the Absence of Secure Channels. [Citation Graph (0, 0)][DBLP]
    Australian Computer Journal, 1999, v:31, n:2, pp:34-43 [Journal]
  114. Reihaneh Safavi-Naini, L. Tombak
    Near-perfect protection and key strategies in authentication codes under spoofing attack of order r. [Citation Graph (0, 0)][DBLP]
    Ars Comb., 1996, v:44, n:, pp:- [Journal]
  115. Jonathan Giddy, Reihaneh Safavi-Naini
    Automated Cryptanalysis of Transposition Ciphers. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1994, v:37, n:5, pp:429-436 [Journal]
  116. Keith M. Martin, Reihaneh Safavi-Naini, Huaxiong Wang
    Bounds and Techniques for Efficient Redistribution of Secret Shares to New Access Structures. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1999, v:42, n:8, pp:638-649 [Journal]
  117. Willy Susilo, Reihaneh Safavi-Naini, Marc Gysin, Jennifer Seberry
    A New and Efficient Fail-stop Signature Scheme. [Citation Graph (0, 0)][DBLP]
    Comput. J., 2000, v:43, n:5, pp:430-437 [Journal]
  118. Yvo Desmedt, Reihaneh Safavi-Naini, Huaxiong Wang, Lynn Margaret Batten, Chris Charnes, Josef Pieprzyk
    Broadcast anti-jamming systems. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2001, v:35, n:2-3, pp:223-236 [Journal]
  119. Keith M. Martin, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild
    Distributing the Encryption and Decryption of a Block Cipher. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:36, n:3, pp:263-287 [Journal]
  120. Reihaneh Safavi-Naini
    Three Systems for Threshold Generation of Authenticators. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1998, v:13, n:3, pp:299-312 [Journal]
  121. Reihaneh Safavi-Naini, Chris Charnes
    MRD Hashing. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:37, n:2, pp:229-242 [Journal]
  122. Reihaneh Safavi-Naini, L. Tombak
    Authentication Codes in Plaintext and Chosen-Content Attacks. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1996, v:7, n:1-2, pp:83-99 [Journal]
  123. Reihaneh Safavi-Naini, Huaxiong Wang
    Secret sharing schemes with partial broadcast channels. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2006, v:41, n:1, pp:5-22 [Journal]
  124. Dongvu Tonien, Reihaneh Safavi-Naini
    Construction of deletion correcting codes using generalized Reed-Solomon codes and their subcodes. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2007, v:42, n:2, pp:227-237 [Journal]
  125. Ahmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini
    A Multi-Level View Model for Secure Object-Oriented Databases. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 1997, v:23, n:2, pp:97-117 [Journal]
  126. Reihaneh Safavi-Naini, Ian F. Blake
    Generalized t-Designs and Weighted Majority Decoding [Citation Graph (0, 0)][DBLP]
    Information and Control, 1979, v:42, n:3, pp:261-282 [Journal]
  127. Reihaneh Safavi-Naini, Huaxiong Wang
    Multireceiver Authentication Codes: Models, Bounds, Constructions, and Extensions. [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 1999, v:151, n:1-2, pp:148-172 [Journal]
  128. Reihaneh Safavi-Naini, Huaxiong Wang
    Bounds and Constructions for Threshold Shared Generation of Authenticators. [Citation Graph (0, 0)][DBLP]
    Int. J. Comput. Math., 2002, v:79, n:12, pp:1285-1301 [Journal]
  129. Reihaneh Safavi-Naini, Huaxiong Wang, Duncan S. Wong
    Resilient Lkh: Secure Multicast Key Distribution Schemes. [Citation Graph (0, 0)][DBLP]
    Int. J. Found. Comput. Sci., 2006, v:17, n:5, pp:1205-1222 [Journal]
  130. Lan Nguyen, Reihaneh Safavi-Naini, Kaoru Kurosawa
    Verifiable shuffles: a formal model and a Paillier-based three-round construction with provable security. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2006, v:5, n:4, pp:241-255 [Journal]
  131. Dongvu Tonien, Reihaneh Safavi-Naini
    Recursive constructions of secure codes and hash families using difference function families. [Citation Graph (0, 0)][DBLP]
    J. Comb. Theory, Ser. A, 2006, v:113, n:4, pp:664-674 [Journal]
  132. Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang
    An Efficient Construction for Fail-Stop Signature for Long Messages. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2001, v:17, n:6, pp:879-898 [Journal]
  133. Shahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk
    On the Weakness of Gong's Collisionful Hash Functions. [Citation Graph (0, 0)][DBLP]
    J. UCS, 1997, v:3, n:3, pp:185-196 [Journal]
  134. Ahmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini, Janusz R. Getta
    Using Cryptographic Hash Functions for Discretionary Access Control in Object-Oriented Databases. [Citation Graph (0, 0)][DBLP]
    J. UCS, 1997, v:3, n:6, pp:730-753 [Journal]
  135. Lan Nguyen, Reihaneh Safavi-Naini, Kaoru Kurosawa
    A Provably Secure and Effcient Verifiable Shuffle based on a Variant of the Paillier Cryptosystem. [Citation Graph (0, 0)][DBLP]
    J. UCS, 2005, v:11, n:6, pp:986-1010 [Journal]
  136. Takeyuki Uehara, Reihaneh Safavi-Naini, Philip Ogunbona
    A secure and flexible authentication system for digital images. [Citation Graph (0, 0)][DBLP]
    Multimedia Syst., 2004, v:9, n:5, pp:441-456 [Journal]
  137. Vu Dong Tô, Reihaneh Safavi-Naini
    On the Maximal Codes of Length 3 with the 2-Identifiable Parent Property. [Citation Graph (0, 0)][DBLP]
    SIAM J. Discrete Math., 2004, v:17, n:4, pp:548-570 [Journal]
  138. Reihaneh Safavi-Naini, Huaxiong Wang
    Broadcast authentication for group communication. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2001, v:269, n:1-2, pp:1-21 [Journal]
  139. Takeyuki Uehara, Reihaneh Safavi-Naini, Philip Ogunbona
    Recovering DC Coefficients in Block-Based DCT. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Image Processing, 2006, v:15, n:11, pp:3592-3596 [Journal]
  140. Reihaneh Safavi-Naini, Jennifer Seberry
    Error-correcting codes for authentication and subliminal channels. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1991, v:37, n:1, pp:13-17 [Journal]
  141. Reihaneh Safavi-Naini, Yejing Wang
    New results on frame-proof codes and traceability schemes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2001, v:47, n:7, pp:3029-3033 [Journal]
  142. Reihaneh Safavi-Naini, Yejing Wang
    Sequential traitor tracing. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2003, v:49, n:5, pp:1319-1326 [Journal]
  143. Huaxiong Wang, Chaoping Xing, Reihaneh Safavi-Naini
    Linear authentication codes: bounds and constructions. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2003, v:49, n:4, pp:866-872 [Journal]
  144. Luke McAven, Reihaneh Safavi-Naini
    Classification of the Deletion Correcting Capabilities of Reed-Solomon Codes of Dimension 2 Over Prime Fields. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2007, v:53, n:6, pp:2280-2294 [Journal]
  145. Mohammad Reza Reyhanitabar, Shuhong Wang, Reihaneh Safavi-Naini
    Non-interactive Manual Channel Message Authentication Based on eTCR Hash Functions. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:385-399 [Conf]
  146. Liang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo
    An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:65-86 [Conf]
  147. Jeffrey Horton, Reihaneh Safavi-Naini
    Detecting Policy Violations through Traffic Analysis. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:109-120 [Conf]
  148. Rungrat Wiangsripanawan, Willy Susilo, Reihaneh Safavi-Naini
    Achieving Mobility and Anonymity in IP-Based Networks. [Citation Graph (0, 0)][DBLP]
    CANS, 2007, pp:60-79 [Conf]
  149. Gelareh Taban, Reihaneh Safavi-Naini
    Key Establishment in Heterogeneous Self-organized Networks. [Citation Graph (0, 0)][DBLP]
    ESAS, 2007, pp:58-72 [Conf]
  150. Farzad Salim, Nicholas Paul Sheppard, Reihaneh Safavi-Naini
    Enforcing P3P Policies Using a Digital Rights Management System. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2007, pp:200-217 [Conf]
  151. Harikrishna Vasanta, Reihaneh Safavi-Naini, Nicholas Paul Sheppard, Jan Martin Surminen
    Distributed Management of OMA DRM Domains. [Citation Graph (0, 0)][DBLP]
    WISA, 2006, pp:237-251 [Conf]
  152. Nicholas Paul Sheppard, Reihaneh Safavi-Naini, Philip Ogunbona
    On multiple watermarking. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2001, pp:3-6 [Conf]
  153. Angela Piper, Reihaneh Safavi-Naini, Alfred Mertins
    Resolution and quality scalable spread spectrum image watermarking. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2005, pp:79-90 [Conf]

  154. Design Principles for Low Latency Anonymous Network Systems Secure against Timing Attacks. [Citation Graph (, )][DBLP]


  155. Automated Security Proof for Symmetric Encryption Modes. [Citation Graph (, )][DBLP]


  156. Non-interactive conference key distribution and its applications. [Citation Graph (, )][DBLP]


  157. Securing wireless sensor networks against large-scale node capture attacks. [Citation Graph (, )][DBLP]


  158. On the operational semantics of rights expression languages. [Citation Graph (, )][DBLP]


  159. A practice-oriented framework for measuring privacy and utility in data sanitization systems. [Citation Graph (, )][DBLP]


  160. RFID Privacy Models Revisited. [Citation Graph (, )][DBLP]


  161. New Privacy Results on Synchronized RFID Authentication Protocols against Tag Tracing. [Citation Graph (, )][DBLP]


  162. Corruption-Localizing Hashing. [Citation Graph (, )][DBLP]


  163. An Efficient Deniable Key Exchange Protocol (Extended Abstract). [Citation Graph (, )][DBLP]


  164. Public Key Encryption with Keyword Search Revisited. [Citation Graph (, )][DBLP]


  165. An Attack on the Privacy of Sanitized Data that Fuses the Outputs of Multiple Data Miners. [Citation Graph (, )][DBLP]


  166. A Pixel-Based Robust Imagewatermarking System. [Citation Graph (, )][DBLP]


  167. A Maximum Likelihood Watermark Decoding Scheme. [Citation Graph (, )][DBLP]


  168. Transport Layer Identification of Skype Traffic. [Citation Graph (, )][DBLP]


  169. Computer Intrusion Detection and Incomplete Information. [Citation Graph (, )][DBLP]


  170. Ranking Attack Graphs with Graph Neural Networks. [Citation Graph (, )][DBLP]


  171. Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures. [Citation Graph (, )][DBLP]


  172. A Digital Rights Management Model for Healthcare. [Citation Graph (, )][DBLP]


  173. Utility of Knowledge Extracted from Unsanitized Data when Applied to Sanitized Data. [Citation Graph (, )][DBLP]


  174. Threshold Attribute-Based Signcryption. [Citation Graph (, )][DBLP]


  175. On Applicability of Random Graphs for Modeling Random Key Predistribution for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  176. Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems. [Citation Graph (, )][DBLP]


  177. Simple and Communication Complexity Efficient Almost Secure and Perfectly Secure Message Transmission Schemes. [Citation Graph (, )][DBLP]


  178. Using SITDRM for privacy rights management. [Citation Graph (, )][DBLP]


  179. Unconditionally Secure Approximate Message Authentication. [Citation Graph (, )][DBLP]


  180. Distributed Detection of Wormhole Attacks in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  181. Location constraints in digital rights management. [Citation Graph (, )][DBLP]


  182. Optimal Secure Message Transmission by Public Discussion [Citation Graph (, )][DBLP]


  183. Secret Key Agreement over a Pair of Independent Broadcast Channels [Citation Graph (, )][DBLP]


  184. New Results on Secret Key Establishment over a Pair of Broadcast Channels [Citation Graph (, )][DBLP]


  185. Implementing Trusted Terminals with a and SITDRM. [Citation Graph (, )][DBLP]


Search in 2.294secs, Finished in 2.300secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002