Search

Your search keyword '"Safavi-Naini, A."' showing total 105 results

Search Constraints

Start Over You searched for: Author "Safavi-Naini, A." Remove constraint Author: "Safavi-Naini, A." Topic theoretical computer science Remove constraint Topic: theoretical computer science
105 results on '"Safavi-Naini, A."'

Search Results

1. Scalable Behavioral Authentication

2. Privacy-preserving verifiable delegation of polynomial and matrix functions

3. Second-Order Asymptotics for One-way Secret Key Agreement

4. Protecting data privacy in publicly verifiable delegation of matrix and polynomial functions

5. An Intermediate Secret-Guessing Attack on Hash-Based Signatures

6. Traceable Policy-Based Signatures and Instantiation from Lattices

7. Secure Key Agreement over Partially Corrupted Channels

8. Path Hopping: An MTD Strategy for Long-Term Quantum-Safe Communication

9. Directional Distance-Bounding Identification

10. Hash-then-Encode: A Modular Semantically Secure Wiretap Code

11. Codes for Detection of Limited View Algebraic Tampering

12. Practical secure decision tree learning in a teletreatment application

13. An Efficient Post-Quantum One-Time Signature Scheme

14. FUZZY UNIVERSAL HASHING AND APPROXIMATE AUTHENTICATION

15. BREAKING AND REPAIRING AN APPROXIMATE MESSAGE AUTHENTICATION SCHEME

16. Generic constructions for universal designated-verifier signatures and identity-based signatures from standard signatures

17. Information Theoretic Bounds on Authentication Systems in Query Model

18. Erasure adversarial wiretap channels

19. Human Assisted Randomness Generation Using Video Games

20. Limited View Adversary Codes: Bounds, Constructions and Applications

21. Verifiable shuffles: a formal model and a Paillier-based three-round construction with provable security

22. Recursive constructions of secure codes and hash families using difference function families

23. Distributing the Encryption and Decryption of a Block Cipher

24. 2-secure codes from 2-SFP codes

25. A secure and flexible authentication system for digital images

26. Sequential traitor tracing

27. Bounds And Constructions For Threshold Shared Generation Of Authenticators

28. Generalized homomorphic MACs with efficient verification

29. Detection of Algebraic Manipulation in the Presence of Leakage

30. New results on frame-proof codes and traceability schemes

31. Codes for limited view adversarial channels

32. Proofs of Retrievability via Fountain Code

33. Short Pairing-Efficient Threshold-Attribute-Based Signature

34. Private Outsourcing of Polynomial Evaluation and Matrix Multiplication Using Multilinear Maps

35. A True Random Generator Using Human Gameplay

36. Authentication codes in plaintext and chosen-content attacks

37. Guessing Secrecy

38. Bounds and Constructions for 1-Round (0,δ)-Secure Message Transmission against Generalized Adversary

39. Secret Key Establishment over Noisy Channels

40. Private Fingerprint Matching

41. Optimal One Round Almost Perfectly Secure Message Transmission (Short Paper)

42. Efficient 1-Round Almost-Perfect Secure Message Transmission Protocols with Flexible Connectivity

43. Automated Verification of Block Cipher Modes of Operation, an Improved Method

44. Towards defining semantic foundations for purpose-based privacy policies

45. Secret Keys from Channel Noise

46. AUTOMATED CRYPTANALYSIS OF SUBSTITUTION CIPHERS

47. Security with noisy data (Extended abstract of invited talk)

48. On Applicability of Random Graphs for Modeling Random Key Predistribution for Wireless Sensor Networks

49. Automated Security Proof for Symmetric Encryption Modes

50. Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems

Catalog

Books, media, physical & digital resources