Mohsen Minaei

Orcid: 0009-0001-3899-697X

According to our database1, Mohsen Minaei authored at least 25 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Plug-and-Play Long-Range Defense System for Proof-of-Stake Blockchains.
IACR Cryptol. ePrint Arch., 2024

Exploring the Interplay Between Interaction Experience and Security Perception of Payment Authentication in Virtual Reality.
Proceedings of the IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops, 2024

Programmable Payment Channels.
Proceedings of the Applied Cryptography and Network Security, 2024

2023
Off-Chain Programmability at Scale.
IACR Cryptol. ePrint Arch., 2023

Scalable Off-Chain Auctions.
IACR Cryptol. ePrint Arch., 2023

Unlinkability and Interoperability in Account-Based Universal Payment Channels.
IACR Cryptol. ePrint Arch., 2023

SoK: Web3 Recovery Mechanisms.
IACR Cryptol. ePrint Arch., 2023

"I Want the Payment Process to be Cool": Understanding How Interaction Factors into Security and Privacy Perception of Authentication in Virtual Reality.
CoRR, 2023

2022
Uncovering Impact of Mental Models towards Adoption of Multi-device Crypto-Wallets.
IACR Cryptol. ePrint Arch., 2022

Empirical Understanding of Deletion Privacy: Experiences, Expectations, and Measures.
Proceedings of the 31st USENIX Security Symposium, 2022

Towards Overcoming the Undercutting Problem.
Proceedings of the Financial Cryptography and Data Security, 2022

2021
Universal Payment Channels: An Interoperability Platform for Digital Currencies.
CoRR, 2021

Deceptive Deletions for Protecting Withdrawn Posts on Social Media Platforms.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

All your Credentials are Belong to Us: On Insecure WPA2-Enterprise Configurations.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
MoneyMorph: Censorship Resistant Rendezvous using Permissionless Cryptocurrencies.
Proc. Priv. Enhancing Technol., 2020

A Tale of Two Trees: One Writes, and Other Reads.
Proc. Priv. Enhancing Technol., 2020

Towards a Two-Tier Hierarchical Infrastructure: An Offline Payment System for Central Bank Digital Currencies.
CoRR, 2020

"My Friend Wanted to Talk About It and I Didn't": Understanding Perceptions of Deletion Privacy in Social Platforms.
CoRR, 2020

Undercutting Bitcoin Is Not Profitable.
CoRR, 2020

Deceptive Deletions for Protecting Withdrawn Posts on Social Platforms.
CoRR, 2020

2019
Lethe: Conceal Content Deletion from Persistent Observers.
Proc. Priv. Enhancing Technol., 2019

A Tale of Two Trees: One Writes, and Other Reads. Optimized Oblivious Accesses to Large-Scale Blockchains.
CoRR, 2019

2018
R3C3: Cryptographically secure Censorship Resistant Rendezvous using Cryptocurrencies.
IACR Cryptol. ePrint Arch., 2018

2017
Forgetting the Forgotten with Letheia, Concealing Content Deletion from Persistent Observers.
CoRR, 2017

2013
Expert key selection impact on the MANETs' performance using probabilistic key management algorithm.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013


  Loading...