The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Hossein Ghodosi: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Hossein Ghodosi, Josef Pieprzyk
    Cheating Prevention in Secret Sharing. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:328-341 [Conf]
  2. Hossein Ghodosi, Josef Pieprzyk
    Democratic Systems. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:392-402 [Conf]
  3. Hossein Ghodosi, Josef Pieprzyk
    Repudiation of Cheating and Non-repudiation of Zhang's Proxy Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ACISP, 1999, pp:129-134 [Conf]
  4. Hossein Ghodosi, Josef Pieprzyk, Chris Charnes, Reihaneh Safavi-Naini
    Cryptosystems for hierarchical groups. [Citation Graph (0, 0)][DBLP]
    ACISP, 1996, pp:275-286 [Conf]
  5. Hossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini
    Secret Sharing in Multilevel and Compartmented Groups. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:367-378 [Conf]
  6. Hossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang
    On Construction of Cumulative Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:379-390 [Conf]
  7. Josef Pieprzyk, Hossein Ghodosi, Chris Charnes, Reihaneh Safavi-Naini
    Cryptography based on transcendental numbers. [Citation Graph (0, 0)][DBLP]
    ACISP, 1996, pp:96-107 [Conf]
  8. Shahrokh Saeednia, Hossein Ghodosi
    A Self-Certified Group-Oriented Cryptosystem Without a Combiner. [Citation Graph (0, 0)][DBLP]
    ACISP, 1999, pp:192-201 [Conf]
  9. Hossein Ghodosi, Josef Pieprzyk
    A Modification to the 'Authentication of Concast Communication'. [Citation Graph (0, 0)][DBLP]
    Cryptographic Algorithms and their Uses, 2004, pp:72-77 [Conf]
  10. Jarrod Trevathan, Hossein Ghodosi, Wayne Read
    An Anonymous and Secure Continuous Double Auction Scheme. [Citation Graph (0, 0)][DBLP]
    HICSS, 2006, pp:- [Conf]
  11. Jarrod Trevathan, Wayne Read, Hossein Ghodosi
    Design issues for electronic auctions. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:340-347 [Conf]
  12. Hossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini
    Remarks on the multiple assignment secret sharing scheme. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:72-80 [Conf]
  13. Hossein Ghodosi
    An Efficient Public Key Cryptosystem Secure Against Chosen Ciphertext Attack. [Citation Graph (0, 0)][DBLP]
    ICISS, 2006, pp:303-314 [Conf]
  14. Mohamed Al-Ibrahim, Hossein Ghodosi, Josef Pieprzyk
    Authentication of Concast Communication. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2002, pp:185-198 [Conf]
  15. Ickjai Lee, Hossein Ghodosi
    Privacy and Security Enhanced Offline Oblivious Transfer for Massive Data Distribution. [Citation Graph (0, 0)][DBLP]
    WISI, 2006, pp:159-160 [Conf]
  16. Hossein Ghodosi, Josef Pieprzyk
    An Ideal and Robust Threshold RSA. [Citation Graph (0, 0)][DBLP]
    VIETCRYPT, 2006, pp:312-321 [Conf]
  17. Hossein Ghodosi, Rahim Zaare-Nahandi
    Comments on the 'm out of n oblivious transfer'. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2006, v:97, n:4, pp:153-155 [Journal]
  18. Hossein Ghodosi
    On insecurity of Naor-Pinkas' distributed oblivious transfer. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2007, v:104, n:5, pp:179-182 [Journal]

  19. Cryptanalysis of MV3 Stream Cipher. [Citation Graph (, )][DBLP]


  20. A Proactive Approach to Preventing Phishing Attacks Using Pshark. [Citation Graph (, )][DBLP]


  21. Multi-Party Computation with Omnipresent Adversary. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002