Mahshid Delavar

Orcid: 0000-0001-6354-330X

According to our database1, Mahshid Delavar authored at least 14 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Spoofing Against Spoofing: Toward Caller ID Verification in Heterogeneous Telecommunication Systems.
ACM Trans. Priv. Secur., 2024

2023
Spoofing Against Spoofing: Towards Caller ID Verification In Heterogeneous Telecommunication Systems.
CoRR, 2023

2022
An Efficient and Physically Secure Privacy-Preserving Authentication Scheme for Vehicular Ad-hoc NETworks (VANETs).
IEEE Access, 2022

2021
Quantum Physical Unclonable Functions: Possibilities and Impossibilities.
Quantum, 2021

A Unified Framework For Quantum Unforgeability.
CoRR, 2021

2020
A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud Storage.
IEEE Trans. Cloud Comput., 2020

Client-Server Identification Protocols with Quantum PUF.
CoRR, 2020

2019
Provably secure and efficient PUF-based broadcast authentication schemes for smart grid applications.
Int. J. Commun. Syst., 2019

2018
On the Security of O-PSI: A Delegated Private Set Intersection on Outsourced Datasets (Extended Version).
ISC Int. J. Inf. Secur., 2018

2017
PUF-based solutions for secure communications in Advanced Metering Infrastructure (AMI).
Int. J. Commun. Syst., 2017

On the Security of O-PSI a Delegated Private Set Intersection on Outsourced Datasets.
Proceedings of the 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2017

2016
An Attribute-Based Anonymous Broadcast Encryption Scheme with Adaptive Security in the Standard Model.
IACR Cryptol. ePrint Arch., 2016

On the security of YRL, an anonymous broadcast encryption scheme.
Proceedings of the 8th International Symposium on Telecommunications, 2016

2014
Security analysis of CLEFIA-128.
Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014


  Loading...