Behzad Abdolmaleki
Orcid: 0009-0008-8335-2787
According to our database1,
Behzad Abdolmaleki
authored at least 31 papers
between 2014 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Attribute-Based Threshold Issuance Anonymous Counting Tokens and Its Application to Sybil-Resistant Self-Sovereign Identity.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Proceedings of the 37th IEEE Computer Security Foundations Symposium, 2024
Strong Privacy-Preserving Universally Composable AKA Protocol with Seamless Handover Support for Mobile Virtual Network Operator.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
2022
IACR Cryptol. ePrint Arch., 2022
2021
Updatable Trapdoor SPHFs: Modular Construction of Updatable Zero-Knowledge Arguments and More.
IACR Cryptol. ePrint Arch., 2021
Proceedings of the Cryptology and Network Security - 20th International Conference, 2021
2020
Unbounded Simulation-Sound Subversion Resistant Quasi-Adaptive NIZK Proofs and Applications to Modular zk-SNARKs.
IACR Cryptol. ePrint Arch., 2020
Lift-and-Shift: Obtaining Simulation Extractable Subversion and Updatable SNARKs Generically.
IACR Cryptol. ePrint Arch., 2020
2019
Wirel. Networks, 2019
A Framework for UC-Secure Commitments from Publicly Computable Smooth Projective Hashing.
IACR Cryptol. ePrint Arch., 2019
2018
2017
Game-Based Privacy Analysis of RFID Security Schemes for Confident Authentication in IoT.
Wirel. Pers. Commun., 2017
2016
Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags.
IACR Cryptol. ePrint Arch., 2016
Game-Based Privacy Analysis of RFID Security Schemes for Confident Au-thentication in IoT.
IACR Cryptol. ePrint Arch., 2016
Proceedings of the 8th International Symposium on Telecommunications, 2016
2015
Wirel. Pers. Commun., 2015
ISC Int. J. Inf. Secur., 2015
IACR Cryptol. ePrint Arch., 2015
2014
Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014