dblp.uni-trier.dewww.uni-trier.de

Reihaneh Safavi-Naini Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo
Home Page

*2009
189 Wanqing Li, Willy Susilo, Udaya Kiran Tupakula, Reihaneh Safavi-Naini, Vijay Varadharajan: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009 ACM 2009
188EESiamak Fayyaz Shahandashti, Reihaneh Safavi-Naini: Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems. AFRICACRYPT 2009: 198-216
187EEChing Yu Ng, Willy Susilo, Yi Mu, Reihaneh Safavi-Naini: New Privacy Results on Synchronized RFID Authentication Protocols against Tag Tracing. ESORICS 2009: 321-336
186EEGiovanni Di Crescenzo, Shaoquan Jiang, Reihaneh Safavi-Naini: Corruption-Localizing Hashing. ESORICS 2009: 489-504
185EELiang Lu, Reihaneh Safavi-Naini, Markus Hagenbuchner, Willy Susilo, Jeffrey Horton, Sweah Liang Yong, Ah Chung Tsoi: Ranking Attack Graphs with Graph Neural Networks. ISPEC 2009: 345-359
184EEDongvu Tonien, Reihaneh Safavi-Naini, Peter Nickolas, Yvo Desmedt: Unconditionally Secure Approximate Message Authentication. IWCC 2009: 233-247
183EEHongsong Shi, Shaoquan Jiang, Reihaneh Safavi-Naini, Mohammed Ashraful Tuhin: Optimal Secure Message Transmission by Public Discussion CoRR abs/0901.2192: (2009)
182EEAngela Piper, Reihaneh Safavi-Naini: How to Compare Image Watermarking Algorithms. T. Data Hiding and Multimedia Security 4: 1-28 (2009)
2008
181 Larry Korba, Steve Marsh, Reihaneh Safavi-Naini: Sixth Annual Conference on Privacy, Security and Trust, PST 2008, October 1-3, 2008, Fredericton, New Brunswick, Canada IEEE 2008
180 Reihaneh Safavi-Naini: Information Theoretic Security, Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008, Proceedings Springer 2008
179EEReihaneh Safavi-Naini, Shaoquan Jiang: Non-interactive conference key distribution and its applications. ASIACCS 2008: 271-282
178EEChing Yu Ng, Willy Susilo, Yi Mu, Reihaneh Safavi-Naini: RFID Privacy Models Revisited. ESORICS 2008: 251-266
177EEShaoquan Jiang, Reihaneh Safavi-Naini: An Efficient Deniable Key Exchange Protocol (Extended Abstract). Financial Cryptography 2008: 47-52
176EEJoonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: Public Key Encryption with Keyword Search Revisited. ICCSA (1) 2008: 1249-1259
175EEMichal Sramka, Reihaneh Safavi-Naini, Jörg Denzinger, Mina Askari, Jie Gao: Utility of Knowledge Extracted from Unsanitized Data when Applied to Sanitized Data. PST 2008: 227-231
174EESiamak Fayyaz Shahandashti, Reihaneh Safavi-Naini: Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures. Public Key Cryptography 2008: 121-140
173EEAdam Muhlbauer, Reihaneh Safavi-Naini, Farzad Salim, Nicholas Paul Sheppard, Jan Martin Surminen: Location constraints in digital rights management. Computer Communications 31(6): 1173-1180 (2008)
172EESid Stamm, Nicholas Paul Sheppard, Reihaneh Safavi-Naini: Implementing Trusted Terminals with a and SITDRM. Electr. Notes Theor. Comput. Sci. 197(1): 73-85 (2008)
171EEReihaneh Safavi-Naini, Peter R. Wild: Information Theoretic Bounds on Authentication Systems in Query Model. IEEE Transactions on Information Theory 54(6): 2426-2436 (2008)
2007
170EEMohammad Reza Reyhanitabar, Shuhong Wang, Reihaneh Safavi-Naini: Non-interactive Manual Channel Message Authentication Based on eTCR Hash Functions. ACISP 2007: 385-399
169EELiang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo: An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme. ACNS 2007: 65-86
168EERungrat Wiangsripanawan, Willy Susilo, Reihaneh Safavi-Naini: Design Principles for Low Latency Anonymous Network Systems Secure against Timing Attacks. ACSW Frontiers 2007: 183-191
167EESiamak Fayyaz Shahandashti, Reihaneh Safavi-Naini, Joonsang Baek: Concurrently-secure credential ownership proofs. ASIACCS 2007: 161-172
166EEReihaneh Safavi-Naini, Shuhong Wang, Yvo Desmedt: Unconditionally secure ring authentication. ASIACCS 2007: 173-181
165EEDongvu Tonien, Reihaneh Safavi-Naini, Peter R. Wild: Combinatorial characterizations of authentication codes in verification oracle model. ASIACCS 2007: 183-193
164EERungrat Wiangsripanawan, Willy Susilo, Reihaneh Safavi-Naini: Achieving Mobility and Anonymity in IP-Based Networks. CANS 2007: 60-79
163EEFarzad Salim, Nicholas Paul Sheppard, Reihaneh Safavi-Naini: Using SITDRM for privacy rights management. CHIMIT 2007: 11
162EEGelareh Taban, Reihaneh Safavi-Naini: Key Establishment in Heterogeneous Self-organized Networks. ESAS 2007: 58-72
161EEWenming Lu, Wanqing Li, Reihaneh Safavi-Naini, Philip Ogunbona: A Maximum Likelihood Watermark Decoding Scheme. ICME 2007: 1247-1250
160EELiang Lu, Jeffrey Horton, Reihaneh Safavi-Naini, Willy Susilo: Transport Layer Identification of Skype Traffic. ICOIN 2007: 465-481
159EEFarzad Salim, Nicholas Paul Sheppard, Reihaneh Safavi-Naini: Enforcing P3P Policies Using a Digital Rights Management System. Privacy Enhancing Technologies 2007: 200-217
158EEDongvu Tonien, Reihaneh Safavi-Naini: Construction of deletion correcting codes using generalized Reed-Solomon codes and their subcodes. Des. Codes Cryptography 42(2): 227-237 (2007)
157EELuke McAven, Reihaneh Safavi-Naini: Classification of the Deletion Correcting Capabilities of Reed-Solomon Codes of Dimension 2 Over Prime Fields. IEEE Transactions on Information Theory 53(6): 2280-2294 (2007)
2006
156 Moti Yung, Kaoru Kurosawa, Reihaneh Safavi-Naini: Proceedings of the Sixth ACM Workshop on Digital Rights Management, Alexandria, VA, USA, October 30, 2006 ACM 2006
155 Rajkumar Buyya, Tianchi Ma, Reihaneh Safavi-Naini, Chris Steketee, Willy Susilo: The proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Hobart, Tasmania, Australia, January 2006 Australian Computer Society 2006
154 Reihaneh Safavi-Naini, Moti Yung: Digital Rights Management: Technologies, Issues, Challenges and Systems, First International Conference, DRMTICS 2005, Sydney, Australia, October 31 - November 2, 2005, Revised Selected Papers Springer 2006
153 Lynn Margaret Batten, Reihaneh Safavi-Naini: Information Security and Privacy, 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings Springer 2006
152EEDongvu Tonien, Reihaneh Safavi-Naini: An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families. ACNS 2006: 82-97
151EEJeffrey Horton, Reihaneh Safavi-Naini: Detecting Policy Violations through Traffic Analysis. ACSAC 2006: 109-120
150EELing Luo, Reihaneh Safavi-Naini, Joonsang Baek, Willy Susilo: Self-organised group key management for ad hoc networks. ASIACCS 2006: 138-147
149EELan Yu, Willy Susilo, Reihaneh Safavi-Naini: X2BT Trusted Reputation System: A Robust Mechanism for P2P Networks. CANS 2006: 364-380
148EEDuong Hieu Phan, Reihaneh Safavi-Naini, Dongvu Tonien: Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability. ICALP (2) 2006: 264-275
147EEWenming Lu, Wanqing Li, Reihaneh Safavi-Naini, Philip Ogunbona: A Pixel-Based Robust Imagewatermarking System. ICME 2006: 1565-1568
146EEDongvu Tonien, Willy Susilo, Reihaneh Safavi-Naini: Multi-party Concurrent Signatures. ISC 2006: 131-145
145EEJoonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search. ISC 2006: 217-232
144EEWenming Lu, Wanqing Li, Reihaneh Safavi-Naini, Philip Ogunbona: Optimal Image Watermark Decoding. PCM 2006: 141-149
143EENicholas Paul Sheppard, Reihaneh Safavi-Naini: Protecting Privacy with the MPEG-21 IPMP Framework. Privacy Enhancing Technologies 2006: 152-171
142EEHarikrishna Vasanta, Reihaneh Safavi-Naini, Nicholas Paul Sheppard, Jan Martin Surminen: Distributed Management of OMA DRM Domains. WISA 2006: 237-251
141EEReihaneh Safavi-Naini, Huaxiong Wang: Secret sharing schemes with partial broadcast channels. Des. Codes Cryptography 41(1): 5-22 (2006)
140EETakeyuki Uehara, Reihaneh Safavi-Naini, Philip Ogunbona: Recovering DC Coefficients in Block-Based DCT. IEEE Transactions on Image Processing 15(11): 3592-3596 (2006)
139EEReihaneh Safavi-Naini, Huaxiong Wang, Duncan S. Wong: Resilient Lkh: Secure Multicast Key Distribution Schemes. Int. J. Found. Comput. Sci. 17(5): 1205-1222 (2006)
138EELan Nguyen, Reihaneh Safavi-Naini, Kaoru Kurosawa: Verifiable shuffles: a formal model and a Paillier-based three-round construction with provable security. Int. J. Inf. Sec. 5(4): 241-255 (2006)
137EEDongvu Tonien, Reihaneh Safavi-Naini: Recursive constructions of secure codes and hash families using difference function families. J. Comb. Theory, Ser. A 113(4): 664-674 (2006)
2005
136 Reihaneh Safavi-Naini, Moti Yung: Proceedings of the Fifth ACM Workshop on Digital Rights Management, Alexandria, VA, USA, November 7, 2005 ACM 2005
135 Rajkumar Buyya, Paul D. Coddington, Paul Montague, Reihaneh Safavi-Naini, Nicholas Paul Sheppard, Andrew L. Wendelborn: ACSW Frontiers 2005, 2005 ACSW Workshops - the Australasian Workshop on Grid Computing and e-Research (AusGrid 2005) and the Third Australasian Information Security Workshop (AISW 2005), Newcastle, NSW, Australia, January/February 2005 Australian Computer Society 2005
134EERussell Ang, Reihaneh Safavi-Naini, Luke McAven: Cancelable Key-Based Fingerprint Templates. ACISP 2005: 242-252
133EELan Nguyen, Reihaneh Safavi-Naini: Dynamic k-Times Anonymous Authentication. ACNS 2005: 318-333
132EEJoonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: Universal Designated Verifier Signature Proof (or How to Efficiently Prove Knowledge of a Signature). ASIACRYPT 2005: 644-661
131EELiang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo: On Securing RTP-Based Streaming Content with Firewalls. CANS 2005: 304-319
130EEYvo Desmedt, Yongge Wang, Reihaneh Safavi-Naini, Huaxiong Wang: Radio Networks with Reliable Communication. COCOON 2005: 156-166
129EEJoonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: Certificateless Public Key Encryption Without Pairing. ISC 2005: 134-148
128EEJoonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: Token-Controlled Public Key Encryption. ISPEC 2005: 386-397
127EEYun Chen, Reihaneh Safavi-Naini, Joonsang Baek, Xin Chen: Server-Aided RSA Key Generation Against Collusion Attack. MADNES 2005: 27-37
126EEAngela Piper, Reihaneh Safavi-Naini, Alfred Mertins: Resolution and quality scalable spread spectrum image watermarking. MM&Sec 2005: 79-90
125EEJoonsang Baek, Reihaneh Safavi-Naini, Willy Susilo: Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption. Public Key Cryptography 2005: 380-397
124 Qiong Liu, Reihaneh Safavi-Naini, Nicholas Paul Sheppard: A License Transfer System for Supporting Content Portability in Digital Rights Management. SEC 2005: 189-204
123EEFangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo: Attack on Han et al.'s ID-based confirmer (undeniable) signature at ACM-EC'03. Applied Mathematics and Computation 170(2): 1166-1169 (2005)
122EEKeith M. Martin, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild: Distributing the Encryption and Decryption of a Block Cipher. Des. Codes Cryptography 36(3): 263-287 (2005)
121EEReihaneh Safavi-Naini, Chris Charnes: MRD Hashing. Des. Codes Cryptography 37(2): 229-242 (2005)
120EELan Nguyen, Reihaneh Safavi-Naini, Kaoru Kurosawa: A Provably Secure and Efficient Verifiable Shuffle based on a Variant of the Paillier Cryptosystem. J. UCS 11(6): 986-1010 (2005)
2004
119EEVu Dong Tô, Reihaneh Safavi-Naini: Linear Code Implies Public-Key Traitor Tracing with Revocation. ACISP 2004: 24-35
118EELuke McAven, Reihaneh Safavi-Naini, Moti Yung: Unconditionally Secure Encryption Under Strong Attacks. ACISP 2004: 427-439
117EENathan Curtis, Reihaneh Safavi-Naini, Willy Susilo: X2Rep: Enhanced Trust Semantics for the XRep Protocol. ACNS 2004: 205-219
116EELan Nguyen, Reihaneh Safavi-Naini, Kaoru Kurosawa: Verifiable Shuffles: A Formal Model and a Paillier-Based Efficient Construction with Provable Security. ACNS 2004: 61-75
115EELan Nguyen, Reihaneh Safavi-Naini: Efficient and Provably Secure Trapdoor-Free Group Signature Schemes from Bilinear Pairings. ASIACRYPT 2004: 372-386
114 Lan Nguyen, Reihaneh Safavi-Naini: An Efficient Verifiable Shuffle with Perfect Zero-knowledge Proof System. Cryptographic Algorithms and their Uses 2004: 40-56
113EEReihaneh Safavi-Naini: Tracing traitors: a selective survey. Digital Rights Management Workshop 2004: 72
112EEReihaneh Safavi-Naini, Nicholas Paul Sheppard, Takeyuki Uehara: Import/export in digital rights management. Digital Rights Management Workshop 2004: 99-110
111 Takeyuki Uehara, Reihaneh Safavi-Naini, Philip Ogunbona: An MPEG tolerant authentication system for video data. ICME 2004: 891-894
110EELuke McAven, Reihaneh Safavi-Naini, Moti Yung: Symmetric Authentication Codes with Secrecy and Unconditionally Secure Authenticated Encryption. INDOCRYPT 2004: 148-161
109EEGlen E. Wheeler, Reihaneh Safavi-Naini, Nicholas Paul Sheppard: Weighted Segmented Digital Watermarking. IWDW 2004: 89-100
108EEReihaneh Safavi-Naini, Luke McAven, Moti Yung: General Group Authentication Codes and Their Relation to "Unconditionally-Secure Signatures". Public Key Cryptography 2004: 231-247
107EEFangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo: An Efficient Signature Scheme from Bilinear Pairings and Its Applications. Public Key Cryptography 2004: 277-290
106EETakeyuki Uehara, Reihaneh Safavi-Naini, Philip Ogunbona: A secure and flexible authentication system for digital images. Multimedia Syst. 9(5): 441-456 (2004)
105EEVu Dong Tô, Reihaneh Safavi-Naini: On the Maximal Codes of Length 3 with the 2-Identifiable Parent Property. SIAM J. Discrete Math. 17(4): 548-570 (2004)
2003
104 Reihaneh Safavi-Naini, Jennifer Seberry: Information Security and Privacy, 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings Springer 2003
103EEQiong Liu, Reihaneh Safavi-Naini, Nicholas Paul Sheppard: Digital Rights Management for Content Distribution. ACSW Frontiers 2003: 49-58
102EEVu Dong Tô, Reihaneh Safavi-Naini, Fangguo Zhang: New traitor tracing schemes using bilinear map. Digital Rights Management Workshop 2003: 67-76
101EEC. Kailasanathan, Reihaneh Safavi-Naini, Philip Ogunbona: Compression Tolerant DCT Based Image Hash. ICDCS Workshops 2003: 562-567
100EEFangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo: Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings. INDOCRYPT 2003: 191-204
99EEAngela Piper, Reihaneh Safavi-Naini, Alfred Mertins: Coefficient Selection Methods for Scalable Spread Spectrum Watermarking. IWDW 2003: 235-246
98EERobert Scealy, Reihaneh Safavi-Naini, Nicholas Paul Sheppard: Performance Measurement of Watermark Embedding Patterns. IWDW 2003: 77-85
97EELan Nguyen, Reihaneh Safavi-Naini: Breaking and Mending Resilient Mix-Nets. Privacy Enhancing Technologies 2003: 66-80
96EEYejing Wang, Jennifer Seberry, Reihaneh Safavi-Naini, Ryoh Fuji-Hara: A Note on the Exposure Property of SBIBD. Electronic Notes in Discrete Mathematics 15: 225-227 (2003)
95 Huaxiong Wang, Chaoping Xing, Reihaneh Safavi-Naini: Linear authentication codes: bounds and constructions. IEEE Transactions on Information Theory 49(4): 866-872 (2003)
94 Reihaneh Safavi-Naini, Yejing Wang: Sequential traitor tracing. IEEE Transactions on Information Theory 49(5): 1319-1326 (2003)
2002
93EEHartono Kurnio, Reihaneh Safavi-Naini, Huaxiong Wang: A Secure Re-keying Scheme with Key Recovery Property. ACISP 2002: 40-55
92EEKeith B. Frikken, Mikhail J. Atallah, Sunil Prabhakar, Reihaneh Safavi-Naini: Optimal Parallel I/O for Range Queries through Replication. DEXA 2002: 669-678
91EEReihaneh Safavi-Naini, Yejing Wang: Traitor Tracing for Shortened and Corrupted Fingerprints. Digital Rights Management Workshop 2002: 81-100
90EEYvo Desmedt, Reihaneh Safavi-Naini, Huaxiong Wang: Redistribution of Mechanical Secret Shares. Financial Cryptography 2002: 238-252
89EEKeith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild: Threshold MACs. ICISC 2002: 237-252
88EEHartono Kurnio, Luke McAven, Reihaneh Safavi-Naini, Huaxiong Wang: A Dynamic Group Key Distribution Scheme with Flexible User Join. ICISC 2002: 478-496
87EEWilly Susilo, Reihaneh Safavi-Naini: An Efficient Fail-Stop Signature Scheme Based on Factorization. ICISC 2002: 62-74
86EETakeyuki Uehara, Reihaneh Safavi-Naini: On (In)security of "A Robust Image Authentication Method". IEEE Pacific Rim Conference on Multimedia 2002: 1025-1032
85EEGareth Brisbane, Reihaneh Safavi-Naini, Philip Ogunbona: An Algorithm for Data Hiding Using Median Cut Segmentation. IEEE Pacific Rim Conference on Multimedia 2002: 89-96
84EEVu Dong Tô, Reihaneh Safavi-Naini, Yejing Wang: A 2-Secure Code with Efficient Tracing Algorithm. INDOCRYPT 2002: 149-162
83EEHartono Kurnio, Reihaneh Safavi-Naini, Huaxiong Wang: A Group Key Distribution Scheme with Decentralised User Join. SCN 2002: 146-163
82EEReihaneh Safavi-Naini, Huaxiong Wang: Bounds and Constructions for Threshold Shared Generation of Authenticators. Int. J. Comput. Math. 79(12): 1285-1301 (2002)
2001
81EEReihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang: How to Construct Fail-Stop Confirmer Signature Schemes. ACISP 2001: 435-444
80EEShahrokh Saeednia, Reihaneh Safavi-Naini, Willy Susilo: On Classifying Conference Key Distribution Protocols. ACISP 2001: 51-59
79EEReihaneh Safavi-Naini, Yejing Wang: Collusion Secure q-ary Fingerprinting for Perceptual Content. Digital Rights Management Workshop 2001: 57-75
78EEHartono Kurnio, Reihaneh Safavi-Naini, Huaxiong Wang: Efficient Revocation Schemes for Secure Multicast. ICISC 2001: 160-177
77EEReihaneh Safavi-Naini, Huaxiong Wang, Chaoping Xing: Linear Authentication Codes: Bounds and Constructions. INDOCRYPT 2001: 127-135
76EENicholas Paul Sheppard, Reihaneh Safavi-Naini, Philip Ogunbona: On multiple watermarking. MM&Sec 2001: 3-6
75EEYvo Desmedt, Reihaneh Safavi-Naini, Huaxiong Wang, Lynn Margaret Batten, Chris Charnes, Josef Pieprzyk: Broadcast anti-jamming systems. Computer Networks 35(2-3): 223-236 (2001)
74 Reihaneh Safavi-Naini, Yejing Wang: New results on frame-proof codes and traceability schemes. IEEE Transactions on Information Theory 47(7): 3029-3033 (2001)
73EEReihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang: An Efficient Construction for Fail-Stop Signature for Long Messages. J. Inf. Sci. Eng. 17(6): 879-898 (2001)
72EEReihaneh Safavi-Naini, Huaxiong Wang: Broadcast authentication for group communication. Theor. Comput. Sci. 269(1-2): 1-21 (2001)
2000
71 Hartono Kurnio, Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang: Key Management for Secure Multicast with Dynamic Controller. ACISP 2000: 178-190
70EEReihaneh Safavi-Naini, Huaxiong Wang: New constructions for multicast re-keying schemes using perfect hash families. ACM Conference on Computer and Communications Security 2000: 228-234
69EEReihaneh Safavi-Naini, Yejing Wang: A Combinatorial Approach to Asymmetric Traitor Tracing. COCOON 2000: 416-425
68EEReihaneh Safavi-Naini, Yejing Wang: Sequential Traitor Tracing. CRYPTO 2000: 316-332
67EEReihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang: Fail-Stop Signature for Long Messages. INDOCRYPT 2000: 165-177
66EEReihaneh Safavi-Naini, Yejing Wang: Anonymous Traceability Schemes with Unconditional Security. INDOCRYPT 2000: 250-261
65EEReihaneh Safavi-Naini, Willy Susilo: Threshold Fail-Stop Signature Schemes Based on Discrete Logarithm and Factorization. ISW 2000: 292-307
64EEGareth Brisbane, Reihaneh Safavi-Naini, Philip Ogunbona: Region-Based Watermarking by Distribution Adjustment. ISW 2000: 54-68
63EEWilly Susilo, Reihaneh Safavi-Naini, Marc Gysin, Jennifer Seberry: A New and Efficient Fail-stop Signature Scheme. Comput. J. 43(5): 430-437 (2000)
1999
62 Josef Pieprzyk, Reihaneh Safavi-Naini, Jennifer Seberry: Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings Springer 1999
61EEWilly Susilo, Reihaneh Safavi-Naini, Josef Pieprzyk: Fail-Stop Threshold Signature Schemes Based on Elliptic Curves. ACISP 1999: 103-116
60EEKeith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang: Changing Thresholds in the Absence of Secure Channels. ACISP 1999: 177-191
59EEDingyi Pei, Yuqiang Li, Yejing Wang, Reihaneh Safavi-Naini: Characterization of Optimal Authentication Codes with Arbitration. ACISP 1999: 303-313
58EEYejing Wang, Reihaneh Safavi-Naini: A3-Codes under Collusion Attacks. ASIACRYPT 1999: 390-398
57EEReihaneh Safavi-Naini, Huaxiong Wang: Broadcast Authentication in Group Communication. ASIACRYPT 1999: 399-411
56 Takeyuki Uehara, Reihaneh Safavi-Naini: Attack on Liu/Farrell/Boyd Arithmetic Coding Encryption Scheme. Communications and Multimedia Security 1999: 273-290
55 Reihaneh Safavi-Naini, Huaxiong Wang, Kwok-Yan Lam: A New Approach to Robust Threshold RSA Signature Schemes. ICISC 1999: 184-196
54EEWilly Susilo, Reihaneh Safavi-Naini, Josef Pieprzyk: RSA-Based Fail-Stop Signature Schemes. ICPP Workshops 1999: 161-166
53EEGareth Brisbane, Reihaneh Safavi-Naini, Philip Ogunbona: Region-Based Watermarking for Images. ISW 1999: 154-166
52 Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang: Changing Thresholds in the Absence of Secure Channels. Australian Computer Journal 31(2): 34-43 (1999)
51 Keith M. Martin, Reihaneh Safavi-Naini, Huaxiong Wang: Bounds and Techniques for Efficient Redistribution of Secret Shares to New Access Structures. Comput. J. 42(8): 638-649 (1999)
50 Reihaneh Safavi-Naini, Huaxiong Wang: Multireceiver Authentication Codes: Models, Bounds, Constructions, and Extensions. Inf. Comput. 151(1-2): 148-172 (1999)
1998
49EEReihaneh Safavi-Naini, Yejing Wang: Bounds and Constructions for A3-code with Multi-senders. ACISP 1998: 159-168
48EEShahrokh Saeednia, Reihaneh Safavi-Naini: Efficient Identity-Based Conference Key Distribution Protocols. ACISP 1998: 320-331
47EEHossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini: Secret Sharing in Multilevel and Compartmented Groups. ACISP 1998: 367-378
46EEHossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang: On Construction of Cumulative Secret Sharing Schemes. ACISP 1998: 379-390
45EEReihaneh Safavi-Naini, Huaxiong Wang: Bounds and Constructions for Multireceiver Authentication Codes. ASIACRYPT 1998: 242-256
44EEReihaneh Safavi-Naini, Huaxiong Wang: New Results on Multi-Receiver Authentication Codes. EUROCRYPT 1998: 527-541
43EEReihaneh Safavi-Naini, Shahram Bakhtiari, Chris Charnes: MRD Hashing. FSE 1998: 134-149
42EEShahrokh Saeednia, Reihaneh Safavi-Naini: On the Security of Girault`s Identification Scheme. Public Key Cryptography 1998: 149-153
41 Reihaneh Safavi-Naini: Three Systems for Threshold Generation of Authenticators. Des. Codes Cryptography 13(3): 299-312 (1998)
1997
40 Shahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk: A Message Authentication Code Based on Latin Squares. ACISP 1997: 194-203
39 Chor Wah Man, Reihaneh Safavi-Naini: Democratic Key Escrow Scheme. ACISP 1997: 249-260
38 Keith M. Martin, Reihaneh Safavi-Naini: Multisender authentication systems with unconditional security. ICICS 1997: 130-143
37 Hossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini: Remarks on the multiple assignment secret sharing scheme. ICICS 1997: 72-80
36 Chris Charnes, Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini: Secret sharing in hierarchical groups. ICICS 1997: 81-86
35 Shahrokh Saeednia, Reihaneh Safavi-Naini: A New Identity-Based Key Exchange Protocol Minimizing Computation and Communication. ISW 1997: 328-334
34EEAhmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini: A Multi-Level View Model for Secure Object-Oriented Databases. Data Knowl. Eng. 23(2): 97-117 (1997)
33EEShahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk: On the Weakness of Gong's Collisionful Hash Functions. J. UCS 3(3): 185-196 (1997)
32EEAhmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini, Janusz R. Getta: Using Cryptographic Hash Functions for Discretionary Access Control in Object-Oriented Databases. J. UCS 3(6): 730-753 (1997)
1996
31 Ahmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini: Modeling a multi-level secure object-oriented database using views. ACISP 1996: 190-206
30 Mansour Esmaili, Reihaneh Safavi-Naini, Josef Pieprzyk: Evidential reasoning in network intrusion detection systems. ACISP 1996: 253-265
29 Hossein Ghodosi, Josef Pieprzyk, Chris Charnes, Reihaneh Safavi-Naini: Cryptosystems for hierarchical groups. ACISP 1996: 275-286
28 Shahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk: On selectable collisionful hash functions. ACISP 1996: 287-298
27 Shahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk: On password-based authenticated key exchange using collisionful hash functions. ACISP 1996: 299-310
26 Josef Pieprzyk, Hossein Ghodosi, Chris Charnes, Reihaneh Safavi-Naini: Cryptography based on transcendental numbers. ACISP 1996: 96-107
25EEMansour Esmaili, Bala Balachandran, Reihaneh Safavi-Naini, Josef Pieprzyk: Case-Based Reasoning for Intrusion Detection. ACSAC 1996: 214-223
24 Reihaneh Safavi-Naini: Three Systems for Shared Generation of Authenticators. COCOON 1996: 401-410
23 Mansour Esmaili, Reihaneh Safavi-Naini, Josef Pieprzyk: Computer Intrusion Detection and Incomplete Information. IEA/AIE 1996: 778
22 Reihaneh Safavi-Naini, L. Tombak: Near-perfect protection and key strategies in authentication codes under spoofing attack of order r. Ars Comb. 44: (1996)
21 Reihaneh Safavi-Naini, L. Tombak: Authentication Codes in Plaintext and Chosen-Content Attacks. Des. Codes Cryptography 7(1-2): 83-99 (1996)
1995
20 Josef Pieprzyk, Reihaneh Safavi-Naini: Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28 - December 1, 1994, Proceedings Springer 1995
19 Ahmad Baraani-Dastjerdi, Janusz R. Getta, Josef Pieprzyk, Reihaneh Safavi-Naini: A Cryptographic Solution to Discretionary Access Control in Structurally Object-Oriented Databases. Australasian Database Conference 1995: 0-
18 Shahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk: Keyed Hash Functions. Cryptography: Policy and Algorithms 1995: 201-214
17EEAhmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini, Janusz R. Getta: A Model of Authorization for Object-Oriented Databases based on Object Views. DOOD 1995: 503-520
16EEAhmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini, Janusz R. Getta: A Cryptographic Mechanism for Object-Instance-Based Authorization in Object-Oriented Database Systems. OOER 1995: 44-54
1994
15EEL. Tombak, Reihaneh Safavi-Naini: Authentication Codes That Are r-Fold Secure Against Spoofing. ACM Conference on Computer and Communications Security 1994: 166-169
14EEChris Charnes, Josef Pieprzyk, Reihaneh Safavi-Naini: Conditionally Secure Secret Sharing Schemes with Disenrollment Capability. ACM Conference on Computer and Communications Security 1994: 89-95
13EEReihaneh Safavi-Naini, L. Tombak: Combinatorial Structure of A-codes with r-fold Security. ASIACRYPT 1994: 211-223
12EEReihaneh Safavi-Naini, L. Tombak: Authentication Codes in Plaintext and Chosen-content Attacks. EUROCRYPT 1994: 254-265
11EEChris Charnes, Luke O'Connor, Josef Pieprzyk, Reihaneh Safavi-Naini, Yuliang Zheng: Comments on Soviet Encryption Algorithm. EUROCRYPT 1994: 433-438
10 Jonathan Giddy, Reihaneh Safavi-Naini: Automated Cryptanalysis of Transposition Ciphers. Comput. J. 37(5): 429-436 (1994)
1993
9EEReihaneh Safavi-Naini, L. Tombak: Optimal Authentication Systems. EUROCRYPT 1993: 12-27
1992
8 L. Tombak, Reihaneh Safavi-Naini: Authentication Codes with Perfect Protection. AUSCRYPT 1992: 15-26
7 Reihaneh Safavi-Naini, L. Tombak: Authentication Codes under Impersonation Attack. AUSCRYPT 1992: 35-47
6 E. A. Campbell, Reihaneh Safavi-Naini, P. A. Pleasants: Partial Belief and Probabilistic Reasoning in the Analysis of Secure Protocols. CSFW 1992: 84-91
1991
5EEReihaneh Safavi-Naini: Feistel Type Authentication Codes. ASIACRYPT 1991: 170-178
4EEJosef Pieprzyk, Reihaneh Safavi-Naini: Randomized Authentication Systems. EUROCRYPT 1991: 472-481
3 Reihaneh Safavi-Naini, Jennifer Seberry: Error-correcting codes for authentication and subliminal channels. IEEE Transactions on Information Theory 37(1): 13-17 (1991)
1990
2EEReihaneh Safavi-Naini: Parallel Generation of Pseudo-Random Sequences. AUSCRYPT 1990: 176-193
1979
1 Reihaneh Safavi-Naini, Ian F. Blake: Generalized t-Designs and Weighted Majority Decoding Information and Control 42(3): 261-282 (1979)

Coauthor Index

1Russell Ang [134]
2Mina Askari [175]
3Mikhail J. Atallah [92]
4Joonsang Baek [125] [127] [128] [129] [132] [145] [150] [167] [176]
5Shahram Bakhtiari [18] [27] [28] [33] [40] [43]
6Bala Balachandran [25]
7Ahmad Baraani-Dastjerdi [16] [17] [19] [31] [32] [34]
8Lynn Margaret Batten [75] [153]
9Ian F. Blake [1]
10Gareth Brisbane [53] [64] [85]
11Rajkumar Buyya [135] [155]
12E. A. Campbell [6]
13Chris Charnes [11] [14] [26] [29] [36] [43] [75] [121]
14Xin Chen [127]
15Yun Chen [127]
16Paul D. Coddington [135]
17Giovanni Di Crescenzo [186]
18Nathan Curtis [117]
19Jörg Denzinger [175]
20Yvo Desmedt [75] [90] [130] [166] [184]
21Mansour Esmaili [23] [25] [30]
22Keith B. Frikken [92]
23Ryoh Fuji-Hara [96]
24Jie Gao [175]
25Janusz R. Getta [16] [17] [19] [32]
26Hossein Ghodosi [26] [29] [37] [46] [47]
27Jonathan Giddy [10]
28Marc Gysin [63]
29Markus Hagenbuchner [185]
30Jeffrey Horton [131] [151] [160] [169] [185]
31Shaoquan Jiang [177] [179] [183] [186]
32C. Kailasanathan [101]
33Larry Korba [181]
34Hartono Kurnio [71] [78] [83] [88] [93]
35Kaoru Kurosawa [116] [120] [138] [156]
36Kwok-Yan Lam [55]
37Wanqing Li [144] [147] [161] [189]
38Yuqiang Li [59]
39Qiong Liu [103] [124]
40Liang Lu [131] [160] [169] [185]
41Wenming Lu [144] [147] [161]
42Ling Luo [150]
43Tianchi Ma [155]
44Chor Wah Man [39]
45Steve Marsh [181]
46Keith M. Martin [36] [38] [51] [52] [60] [89] [122]
47Luke McAven [88] [108] [110] [118] [134] [157]
48Alfred Mertins [99] [126]
49Paul Montague [135]
50Yi Mu [178] [187]
51Adam Muhlbauer [173]
52Ching Yu Ng [178] [187]
53Lan Nguyen [97] [114] [115] [116] [120] [133] [138]
54Peter Nickolas [184]
55Luke O'Connor [11]
56Philip Ogunbona [53] [64] [76] [85] [101] [106] [111] [140] [144] [147] [161]
57Dingyi Pei [59]
58Duong Hieu Phan [148]
59Josef Pieprzyk [4] [11] [14] [16] [17] [18] [19] [20] [23] [25] [26] [27] [28] [29] [30] [31] [32] [33] [34] [36] [37] [40] [46] [47] [52] [54] [60] [61] [62] [75] [89]
60Angela Piper [99] [126] [182]
61P. A. Pleasants [6]
62Sunil Prabhakar [92]
63Mohammad Reza Reyhanitabar [170]
64Shahrokh Saeednia [35] [42] [48] [80]
65Farzad Salim [159] [163] [173]
66Robert Scealy [98]
67Jennifer Seberry (Jennifer Seberry Wallis) [3] [62] [63] [96] [104]
68Siamak Fayyaz Shahandashti [167] [174] [188]
69Nicholas Paul Sheppard [76] [98] [103] [109] [112] [124] [135] [142] [143] [159] [163] [172] [173]
70Hongsong Shi [183]
71Michal Sramka [175]
72Sid Stamm [172]
73Chris Steketee [155]
74Jan Martin Surminen [142] [173]
75Willy Susilo [54] [61] [63] [65] [67] [71] [73] [80] [81] [87] [100] [107] [117] [123] [125] [128] [129] [131] [132] [145] [146] [149] [150] [155] [160] [164] [168] [169] [176] [178] [185] [187] [189]
76Gelareh Taban [162]
77Vu Dong Tô [84] [102] [105] [119]
78L. Tombak [7] [8] [9] [12] [13] [15] [21] [22]
79Dongvu Tonien [137] [146] [148] [152] [158] [165] [184]
80Ah Chung Tsoi [185]
81Mohammed Ashraful Tuhin [183]
82Udaya Kiran Tupakula [189]
83Takeyuki Uehara [56] [86] [106] [111] [112] [140]
84Vijay Varadharajan [189]
85Harikrishna Vasanta [142]
86Huaxiong Wang [44] [45] [46] [50] [51] [52] [55] [57] [60] [67] [70] [71] [72] [73] [75] [77] [78] [81] [82] [83] [88] [89] [90] [93] [95] [122] [130] [139] [141]
87Shuhong Wang [166] [170]
88Yejing Wang [49] [58] [59] [66] [68] [69] [74] [79] [84] [91] [94] [96]
89Yongge Wang [130]
90Andrew L. Wendelborn [135]
91Glen E. Wheeler [109]
92Rungrat Wiangsripanawan [164] [168]
93Peter R. Wild [89] [122] [165] [171]
94Duncan S. Wong [139]
95Chaoping Xing [77] [95]
96Sweah Liang Yong [185]
97Lan Yu [149]
98Moti Yung (Mordechai M. Yung) [108] [110] [118] [136] [154] [156]
99Fangguo Zhang [100] [102] [107] [123]
100Yuliang Zheng [11]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)