Hossein Ghodosi
Orcid: 0000-0001-9222-2118
According to our database1,
Hossein Ghodosi
authored at least 42 papers
between 1996 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2023
Comput. Secur., November, 2023
Fair Distributed Oblivious Polynomial Evaluation via Bitcoin Deposits: Compute-as-a-Service.
Proceedings of the Secure IT Systems - 28th Nordic Conference, NordSec 2023, Oslo, Norway, 2023
Outsourcing Verifiable Distributed Oblivious Polynomial Evaluation from Threshold Cryptography.
Proceedings of the Information and Communications Security - 25th International Conference, 2023
2022
J. Comput. Sci. Technol., 2022
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2022
Proceedings of the Science of Cyber Security - 4th International Conference, 2022
2021
2018
Efficient Information Theoretic Multi-Party Computation from Oblivious Linear Evaluation.
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Advances in Information and Computer Security, 2018
Proceedings of the Information Security and Cryptology - ICISC 2018, 2018
2014
Security Analysis of Polynomial Interpolation-Based Distributed Oblivious Transfer Protocols.
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014
2013
J. Cryptol., 2013
IACR Cryptol. ePrint Arch., 2013
2012
Des. Codes Cryptogr., 2012
T-out-of-n Distributed Oblivious Transfer Protocols in Non-adaptive and Adaptive Settings.
Proceedings of the Information Security Practice and Experience, 2012
An Information-Theoretically Secure Threshold Distributed Oblivious Transfer Protocol.
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012
2011
Privacy and Anonymity in Untrusted Data Stores.
Proceedings of the Twenty-Second Australasian Database Conference, 2011
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011
2010
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010
2009
Proceedings of the Public Key Cryptography, 2009
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009
2008
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008
2007
Inf. Process. Lett., 2007
2006
Inf. Process. Lett., 2006
Privacy and Security Enhanced Offline Oblivious Transfer for Massive Data Distribution.
Proceedings of the Intelligence and Security Informatics, International Workshop, 2006
Proceedings of the Information Systems Security, Second International Conference, 2006
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006
2005
Design issues for electronic auctions.
Proceedings of the ICETE 2005, 2005
2004
A Modification to the 'Authentication of Concast Communication'.
Proceedings of the Cryptographic Algorithms and their Uses, 2004
2002
Proceedings of the Progress in Cryptology, 2002
2001
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001
2000
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000
1999
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999
1998
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998
1997
Proceedings of the Information and Communication Security, First International Conference, 1997
1996
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996