2,810 results on '"Safavi-Naini, A."'
Search Results
152. A Modular Semantically Secure Wiretap Code with Shared Key for Weakly Symmetric Channels.
153. Verifiable Computation using Smart Contracts.
154. K2SN-MSS: An Efficient Post-Quantum Signature.
155. The Frequency of Human Papillomavirus Positivity in Iranian Patients with Head and Neck Squamous Cell Carcinoma
156. Correlation Of TCF4, GSK, TERT And TERC Expressions With Proliferation Potential Of Early And Late Culture Of Human Peripheral Blood Mesenchymal Stem Cells
157. Protecting data privacy in publicly verifiable delegation of matrix and polynomial functions.
158. Privacy-preserving verifiable delegation of polynomial and matrix functions.
159. Robust and Reusable Fuzzy Extractors and their Application to Authentication from Iris Data.
160. TurboBlom: A light and resilient key predistribution scheme with application to Internet of Things
161. COVID-19 vaccines breakthrough infection and adverse reactions in medical students: a nationwide survey in Iran
162. Anaphylactic Reaction Following Receipt of COVID-19 Vaccines: Report of Two Cases
163. Drivers’ behavior confronting fixed and point-to-point speed enforcement camera: agent-based simulation and translation to crash relative risk change
164. Atorvastatin Effect on COVID-19 Outcomes: A Propensity Score Matched Study on Hospitalized Patients
165. Equilibrium phases of two-dimensional bosons in quasi-periodic lattices
166. Quantum Phases of Soft-Core Dipolar Bosons in Optical Lattices
167. Quantum phases of hard-core dipolar bosons in coupled 1D optical lattices
168. Adversarial Wiretap Channel with Public Discussion
169. Efficient Codes for Adversarial Wiretap Channels
170. Multipath Private Communication: An Information Theoretic Approach
171. More than a Fair Share: Network Data Remanence Attacks against Secret Sharing-based Schemes.
172. Privacy-preserving verifiable delegation of polynomial and matrix functions
173. Demographic, Epidemiologic, and Clinical Characteristics of Human Monkeypox Disease Pre- and Post-2022 Outbreaks: A Systematic Review and Meta-Analysis
174. Protecting data privacy in publicly verifiable delegation of matrix and polynomial functions
175. A Model for Adversarial Wiretap Channel
176. Private Outsourcing of Polynomial Evaluation and Matrix Multiplication using Multilinear Maps
177. Efficient Codes for Limited View Adversarial Channels
178. Secure Distance Bounding Verification using Physical-Channel Properties
179. Non-universal bound states of two identical heavy fermions and one light particle
180. New Attacks and Secure Design for Anonymous Distance-Bounding.
181. In-Region Authentication.
182. HCAP: A History-Based Capability System for IoT Devices.
183. A New Look at the Refund Mechanism in the Bitcoin Payment Protocol.
184. On De-anonymization of Single Tweet Messages.
185. Secure Key Agreement over Partially Corrupted Channels.
186. Towards a Resilient Smart Home.
187. Directional Distance-Bounding Identification
188. Hash-then-Encode: A Modular Semantically Secure Wiretap Code
189. New Attacks and Secure Design for Anonymous Distance-Bounding
190. In-Region Authentication
191. Outsourcing scheme of ABE encryption secure against malicious adversary
192. An Intermediate Secret-Guessing Attack on Hash-Based Signatures
193. Password Protected Secret Sharing from Lattices
194. Group Encryption: Full Dynamicity, Message Filtering and Code-Based Instantiation
195. Leakage Resilient Cheating Detectable Secret Sharing Schemes
196. Influence of monolayer contamination on electric-field-noise heating in ion traps
197. Quantum Phases of Dipolar Bosons in Bilayer Geometry
198. First order phase transitions in optical lattices with tunable three-body onsite interaction
199. Outsourcing scheme of ABE encryption secure against malicious adversary.
200. A microscopic model of electronic field noise heating in ion traps
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.