Reihaneh Safavi-Naini
Orcid: 0000-0002-1697-3590Affiliations:
- University of Calgary, Canada
- University of Wollongong, Australia (former)
According to our database1,
Reihaneh Safavi-Naini
authored at least 381 papers
between 1979 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on viaf.org
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
-
on uow.edu.au
-
on isni.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Dependable Secur. Comput., 2024
Theor. Comput. Sci., 2024
IACR Cryptol. ePrint Arch., 2024
CoRR, 2024
CoRR, 2024
sigBridge: A Cross-chain Bridge for Permissioned Blockchains and its application to decentralized access control.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024
Proceedings of the Applied Cryptography and Network Security, 2024
2023
IEEE Trans. Dependable Secur. Comput., 2023
Robust and Reusable Fuzzy Extractors and their Application to Authentication from Iris Data.
IACR Cryptol. ePrint Arch., 2023
IEEE Access, 2023
Proceedings of the IEEE International Symposium on Information Theory, 2023
Lower Bounds on the Share Size of Leakage Resilient Cheating Detectable Secret Sharing.
Proceedings of the Cryptology and Network Security - 22nd International Conference, 2023
2022
Proc. Priv. Enhancing Technol., 2022
A Capability-based Distributed Authorization System to Enforce Context-aware Permission Sequences.
Proceedings of the SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8, 2022
Proceedings of the Financial Cryptography and Data Security. FC 2022 International Workshops, 2022
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022
Proceedings of the 9th ACM Workshop on Moving Target Defense, 2022
2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the 18th International Conference on Security and Cryptography, 2021
More than a Fair Share: Network Data Remanence Attacks against Secret Sharing-based Schemes.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the IEEE Information Theory Workshop, 2021
Proceedings of the IEEE Information Theory Workshop, 2021
Proceedings of the IEEE International Symposium on Information Theory, 2021
Proceedings of the IEEE International Symposium on Information Theory, 2021
Proceedings of the IEEE Globecom 2021 Workshops, Madrid, Spain, December 7-11, 2021, 2021
Privacy-Preserving Resource Sharing Using Permissioned Blockchains - (The Case of Smart Neighbourhood).
Proceedings of the Financial Cryptography and Data Security. FC 2021 International Workshops, 2021
Proceedings of the CCSW@CCS '21: Proceedings of the 2021 on Cloud Computing Security Workshop, 2021
Proceedings of the Applied Cryptography and Network Security, 2021
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021
2020
J. Math. Cryptol., 2020
Protecting data privacy in publicly verifiable delegation of matrix and polynomial functions.
Des. Codes Cryptogr., 2020
Proceedings of the ICT Systems Security and Privacy Protection, 2020
A Capacity-achieving One-way Key Agreement with Improved Finite Blocklength Analysis.
Proceedings of the International Symposium on Information Theory and Its Applications, 2020
Proceedings of the International Symposium on Information Theory and Its Applications, 2020
Proceedings of the 1st Conference on Information-Theoretic Cryptography, 2020
Proceedings of the Financial Cryptography and Data Security, 2020
2019
IACR Cryptol. ePrint Arch., 2019
Comput. Secur., 2019
A Modular Semantically Secure Wiretap Code with Shared Key for Weakly Symmetric Channels.
Proceedings of the 2019 IEEE Information Theory Workshop, 2019
Proceedings of the 2019 IEEE Information Theory Workshop, 2019
Proceedings of the IEEE International Symposium on Information Theory, 2019
Proceedings of the IEEE International Symposium on Information Theory, 2019
Proceedings of the Foundations and Practice of Security - 12th International Symposium, 2019
Proceedings of the Financial Cryptography and Data Security, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, 2019
2018
Secur. Commun. Networks, 2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the 2018 Workshop on IoT Security and Privacy, 2018
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018
Proceedings of the Financial Cryptography and Data Security, 2018
Proceedings of the Fourth ACM International Workshop on Security and Privacy Analytics, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
2017
IACR Cryptol. ePrint Arch., 2017
CoRR, 2017
Proceedings of the ICT Systems Security and Privacy Protection, 2017
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017
Proceedings of the Secure IT Systems, 2017
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017
Proceedings of the Information Systems Security and Privacy, 2017
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017
Proceedings of the Financial Cryptography and Data Security, 2017
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017
Proceedings of the 2017 Workshop on Moving Target Defense, 2017
Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, 2017
2016
CoRR, 2016
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016
Proceedings of the Information Theoretic Security - 9th International Conference, 2016
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Privacy and Utility of Inference Control Mechanisms for Social Computing Applications.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
2015
Privacy preserving system for integrated broadcast-broadband services using attribute-based encryption.
IEEE Trans. Consumer Electron., 2015
J. Inf. Process., 2015
Comput. Secur., 2015
Proceedings of the Information Security Theory and Practice, 2015
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2015
Proceedings of the Security and Privacy in Communication Networks, 2015
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015
Proceedings of the Information Theoretic Security - 8th International Conference, 2015
Proceedings of the Financial Cryptography and Data Security, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop, 2015
Proceedings of the 53rd Annual Allerton Conference on Communication, 2015
2014
ACM Trans. Inf. Syst. Secur., 2014
IACR Cryptol. ePrint Arch., 2014
Des. Codes Cryptogr., 2014
Proceedings of the 2014 IEEE Information Theory Workshop, 2014
Incentivize cooperative sensing in distributed cognitive radio networks with reputation-based pricing.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
Proceedings of the Information and Communications Security - 16th International Conference, 2014
Proceedings of the Information and Communications Security - 16th International Conference, 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
Proceedings of the Second International Workshop on Security in Cloud Computing, 2014
Proceedings of the ASIAPKC'14, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the Applied Cryptography and Network Security, 2014
Proceedings of the Applied Cryptography and Network Security, 2014
2013
Unconditionally-secure ideal robust secret sharing schemes for threshold and multilevel access structure.
J. Math. Cryptol., 2013
Message transmission and key establishment: General equality for weak and strong capacities.
J. Inf. Secur. Appl., 2013
IACR Cryptol. ePrint Arch., 2013
Privately Outsourcing Polynomial Evaluations and Matrix Multiplications using Multilinear Maps.
CoRR, 2013
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013
On the Share Efficiency of Robust Secret Sharing and Secret Sharing with Cheating Detection.
Proceedings of the Progress in Cryptology - INDOCRYPT 2013, 2013
ReDiSen: Reputation-based secure cooperative sensing in distributed cognitive radio networks.
Proceedings of IEEE International Conference on Communications, 2013
Proceedings of the Decision and Game Theory for Security - 4th International Conference, 2013
Proceedings of the Financial Cryptography and Data Security, 2013
Proceedings of the IEEE Conference on Communications and Network Security, 2013
Proceedings of the 2013 International Workshop on Security in Cloud Computing, 2013
Private Outsourcing of Polynomial Evaluation and Matrix Multiplication Using Multilinear Maps.
Proceedings of the Cryptology and Network Security - 12th International Conference, 2013
2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Pairing-Based Cryptography - Pairing 2012, 2012
Proceedings of the Information Theoretic Security - 6th International Conference, 2012
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012
Message Transmission and Key Establishment: Conditions for Equality of Weak and Strong Capacities.
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012
Proceedings of the Data and Applications Security and Privacy XXVI, 2012
An information theoretic privacy and utility measure for data sanitization mechanisms.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012
Proceedings of the 2012 ACM Workshop on Cloud computing security, 2012
Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, 2012
Bounds and Constructions for 1-Round (0, δ)-Secure Message Transmission against Generalized Adversary.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012
2011
IEEE Trans. Inf. Theory, 2011
Unconditionally Secure Conference Key Distribution: Security Notions, Bounds and Constructions.
Int. J. Found. Comput. Sci., 2011
IACR Cryptol. ePrint Arch., 2011
On "the Power of Verification Queries" in Unconditionally Secure Message Authentication.
Discret. Math. Algorithms Appl., 2011
Discret. Math. Algorithms Appl., 2011
Discret. Math. Algorithms Appl., 2011
Proceedings of the Information Security Applications - 12th International Workshop, 2011
Proceedings of the Foundations and Practice of Security, 2011
Proceedings of the Foundations and Practice of Security, 2011
Proceedings of the Financial Cryptography and Data Security, 2011
Proceedings of the Computer Security - ESORICS 2011, 2011
A rights management approach to protection of privacy in a cloud of electronic health records.
Proceedings of the 11th ACM Workshop on Digital Rights Management, 2011
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
2010
Proceedings of the Handbook of Financial Cryptography and Security., 2010
Proceedings of the 11th IEEE International Symposium on a World of Wireless, 2010
Proceedings of the 1st USENIX Workshop on Health Security and Privacy, 2010
On Applicability of Random Graphs for Modeling Random Key Predistribution for Wireless Sensor Networks.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2010
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010
Proceedings of the Fourth International Conference on Network and System Security, 2010
Proceedings of the International Symposium on Information Theory and its Applications, 2010
Proceedings of the International Symposium on Information Theory and its Applications, 2010
A practice-oriented framework for measuring privacy and utility in data sanitization systems.
Proceedings of the 2010 EDBT/ICDT Workshops, Lausanne, Switzerland, March 22-26, 2010, 2010
Proceedings of the 10th ACM Workshop on Digital Rights Management, 2010
Proceedings of the 5th ACM Symposium on Information, 2010
Proceedings of the 2nd ACM Cloud Computing Security Workshop, 2010
Simple and Communication Complexity Efficient Almost Secure and Perfectly Secure Message Transmission Schemes.
Proceedings of the Progress in Cryptology, 2010
2009
Trans. Data Hiding Multim. Secur., 2009
Generic constructions for universal designated-verifier signatures and identitybased signatures from standard signatures.
IET Inf. Secur., 2009
Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems.
IACR Cryptol. ePrint Arch., 2009
Proceedings of the 2009 ACM Workshop on Privacy in the Electronic Society, 2009
Proceedings of the 4th International Conference on Performance Evaluation Methodologies and Tools, 2009
Proceedings of the POLICY 2009, 2009
Proceedings of the Information Security Practice and Experience, 2009
An Attack on the Privacy of Sanitized Data that Fuses the Outputs of Multiple Data Miners.
Proceedings of the ICDM Workshops 2009, 2009
New Privacy Results on Synchronized RFID Authentication Protocols against Tag Tracing.
Proceedings of the Computer Security, 2009
Proceedings of the 9th ACM Workshop on Digital Rights Management, 2009
Proceedings of the Coding and Cryptology, Second International Workshop, 2009
Proceedings of the Advances in Computer Science, 2009
Proceedings of the Ad Hoc Networks, First International Conference, 2009
2008
IEEE Trans. Inf. Theory, 2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Sixth Annual Conference on Privacy, Security and Trust, 2008
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008
Unconditionally secure conference key distribution: Security definitions and their relations.
Proceedings of the 46th Annual Allerton Conference on Communication, 2008
2007
Classification of the Deletion Correcting Capabilities of Reed-Solomon Codes of Dimension 2 Over Prime Fields.
IEEE Trans. Inf. Theory, 2007
Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures.
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the First International Workshop on Run Time Enforcement for Mobile and Distributed Systems, 2007
Construction of deletion correcting codes using generalized Reed-Solomon codes and their subcodes.
Des. Codes Cryptogr., 2007
Proceedings of the Privacy Enhancing Technologies, 7th International Symposium, 2007
Proceedings of the Information Networking. Towards Ubiquitous Networking and Services, 2007
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007
Proceedings of the Information Theoretic Security - Second International Conference, 2007
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2007
Proceedings of the 1st ACM Symposium on Computer Human Interaction for Management of Information Technology, 2007
Combinatorial characterizations of authentication codes in verification oracle model.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007
Design Principles for Low Latency Anonymous Network Systems Secure against Timing Attacks.
Proceedings of the ACSW Frontiers 2007. Proceedings of the Fifth Australasian Symposium on Grid Computing and e-Research (AusGrid 2007), the Fifth Australasian Information Security Workshop (Privacy Enhancing Technologies) (AISW 2007), and the Australasian Workshop on Health Knowledge Management and Discovery (HKMD 2007). Proceedings, Ballarat, Victoria, Australia, January 30, 2007
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007
2006
Recursive constructions of secure codes and hash families using <i>difference function families</i>.
J. Comb. Theory A, 2006
Verifiable shuffles: a formal model and a Paillier-based three-round construction with provable security.
Int. J. Inf. Sec., 2006
Int. J. Found. Comput. Sci., 2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Information Security Applications, 7th International Workshop, 2006
Proceedings of the Privacy Enhancing Technologies, 6th International Workshop, 2006
Proceedings of the Advances in Multimedia Information Processing, 2006
Proceedings of the Information Security, 9th International Conference, 2006
On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search.
Proceedings of the Information Security, 9th International Conference, 2006
Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, 2006
Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability.
Proceedings of the Automata, Languages and Programming, 33rd International Colloquium, 2006
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006
Proceedings of the Cryptology and Network Security, 5th International Conference, 2006
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006
2005
A Provably Secure and Efficient Verifiable Shuffle based on a Variant of the Paillier Cryptosystem.
J. Univers. Comput. Sci., 2005
Recursive Constructions of Secure Codes and Hash Families Using Difference Function Families.
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
Des. Codes Cryptogr., 2005
Appl. Math. Comput., 2005
A License Transfer System for Supporting Content Portability in Digital Rights Management.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005
Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption.
Proceedings of the Public Key Cryptography, 2005
Proceedings of the 7th workshop on Multimedia & Security, 2005
Proceedings of the Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, 2005
Proceedings of the Information Security, 8th International Conference, 2005
Proceedings of the Information Security Practice and Experience, 2005
Proceedings of the IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005
Proceedings of the Computing and Combinatorics, 11th Annual International Conference, 2005
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005
Universal Designated Verifier Signature Proof (or How to Efficiently Prove Knowledge of a Signature).
Proceedings of the Advances in Cryptology, 2005
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005
2004
SIAM J. Discret. Math., 2004
Efficient and Provably Secure Trapdoor-free Group Signature Schemes from Bilinear Pairings.
IACR Cryptol. ePrint Arch., 2004
EURASIP J. Adv. Signal Process., 2004
Proceedings of the Public Key Cryptography, 2004
General Group Authentication Codes and Their Relation to "Unconditionally-Secure Signatures".
Proceedings of the Public Key Cryptography, 2004
Proceedings of the Digital Watermarking, Third InternationalWorkshop, 2004
Symmetric Authentication Codes with Secrecy and Unconditionally Secure Authenticated Encryption.
Proceedings of the Progress in Cryptology, 2004
Proceedings of the 2004 IEEE International Conference on Multimedia and Expo, 2004
Proceedings of the 2004 ACM Workshop on Digital Rights Management 2004, Washington, 2004
Proceedings of the 2004 ACM Workshop on Digital Rights Management 2004, Washington, 2004
An Efficient Verifiable Shuffle with Perfect Zero-knowledge Proof System.
Proceedings of the Cryptographic Algorithms and their Uses, 2004
Verifiable Shuffles: A Formal Model and a Paillier-Based Efficient Construction with Provable Security.
Proceedings of the Applied Cryptography and Network Security, 2004
Proceedings of the Applied Cryptography and Network Security, 2004
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004
2003
New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairing.
IACR Cryptol. ePrint Arch., 2003
Proceedings of the Privacy Enhancing Technologies, Third International Workshop, 2003
Proceedings of the Digital Watermarking, Second International Workshop, 2003
Proceedings of the Digital Watermarking, Second International Workshop, 2003
Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings.
Proceedings of the Progress in Cryptology, 2003
Proceedings of the 11th IEEE International Conference on Networks, 2003
Proceedings of the 11th IEEE International Conference on Networks, 2003
Proceedings of the 23rd International Conference on Distributed Computing Systems Workshops (ICDCS 2003 Workshops), 2003
Proceedings of the 2003 ACM workshop on Digital rights management 2003, Washington, 2003
Proceedings of the ACSW Frontiers 2003, 2003 ACSW Workshops, 2003
2002
Int. J. Comput. Math., 2002
Proceedings of the Security in Communication Networks, Third International Conference, 2002
Proceedings of the Advances in Multimedia Information Processing, 2002
Proceedings of the Advances in Multimedia Information Processing, 2002
Proceedings of the Progress in Cryptology, 2002
Proceedings of the Proceedings 10th IEEE International Conference on Networks: Towards Network Superiority, 2002
Proceedings of the Information Security and Cryptology, 2002
Proceedings of the Information Security and Cryptology, 2002
Proceedings of the 14th International Conference on Digital Signal Processing, 2002
Proceedings of the Financial Cryptography, 6th International Conference, 2002
Proceedings of the Database and Expert Systems Applications, 13th International Conference, 2002
Proceedings of the Security and Privacy in Digital Rights Management, 2002
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002
2001
IEEE Trans. Inf. Theory, 2001
J. Inf. Sci. Eng., 2001
Proceedings of the 4th workshop on Multimedia & Security: New Challenges, 2001
Proceedings of the Proceedings 9th IEEE International Conference on Networks, 2001
Proceedings of the Information Security and Cryptology, 2001
Proceedings of the Security and Privacy in Digital Rights Management, 2001
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001
2000
Proceedings of the Information Security, Third International Workshop, 2000
Proceedings of the Information Security, Third International Workshop, 2000
Proceedings of the Progress in Cryptology, 2000
Proceedings of the Progress in Cryptology, 2000
Proceedings of the Computing and Combinatorics, 6th Annual International Conference, 2000
Proceedings of the CCS 2000, 2000
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000
1999
Inf. Comput., 1999
Bounds and Techniques for Efficient Redistribution of Secret Shares to New Access Structures.
Comput. J., 1999
Changing Thresholds in the Absence of Secure Channels.
Aust. Comput. J., 1999
Proceedings of the Information Security, Second International Workshop, 1999
Proceedings of the 1999 International Conference on Parallel Processing Workshops, 1999
Proceedings of the IEEE International Conference on Networks 1999, 1999
Proceedings of the Information Security and Cryptology, 1999
Attack on Liu/Farrell/Boyd Arithmetic Coding Encryption Scheme.
Proceedings of the Secure Information Networks: Communications and Multimedia Security, 1999
Proceedings of the Advances in Cryptology, 1999
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999
Proceedings of the Algorithms and Theory of Computation Handbook., 1999
Proceedings of the Algorithms and Theory of Computation Handbook., 1999
1998
Proceedings of the Public Key Cryptography, 1998
Proceedings of the Fast Software Encryption, 5th International Workshop, 1998
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998
Proceedings of the Advances in Cryptology, 1998
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998
1997
Using Cryptographic Hash Functions for Discretionary Access Control in Object-Oriented Databases.
J. Univers. Comput. Sci., 1997
J. Univers. Comput. Sci., 1997
Data Knowl. Eng., 1997
Proceedings of the Information Security, First International Workshop, 1997
Proceedings of the Information and Communication Security, First International Conference, 1997
Proceedings of the Information and Communication Security, First International Conference, 1997
Proceedings of the Information and Communication Security, First International Conference, 1997
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997
1996
Des. Codes Cryptogr., 1996
Near-perfect protection and key strategies in authentication codes under spoofing attack of order r.
Ars Comb., 1996
Computer Intrusion Detection and Incomplete Information.
Proceedings of the Industrial and Engineering Applications of Artificial Intelligence and Expert Systems, 1996
Proceedings of the Computing and Combinatorics, Second Annual International Conference, 1996
Proceedings of the 12th Annual Computer Security Applications Conference (ACSAC 1996), 1996
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996
1995
A Cryptographic Mechanism for Object-Instance-Based Authorization in Object-Oriented Database Systems.
Proceedings of the OOER'95: Object-Oriented and Entity-Relationship Modelling, 1995
Proceedings of the Deductive and Object-Oriented Databases, 1995
A Cryptographic Solution to Discretionary Access Control in Structurally Object-Oriented Databases.
Proceedings of the Sixth Australasian Database Conference, 1995
1994
Proceedings of the Advances in Cryptology, 1994
Proceedings of the CCS '94, 1994
Proceedings of the CCS '94, 1994
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994
1993
1992
Proceedings of the 5th IEEE Computer Security Foundations Workshop, 1992
Proceedings of the Advances in Cryptology, 1992
Proceedings of the Advances in Cryptology, 1992
1991
IEEE Trans. Inf. Theory, 1991
1990
Proceedings of the Advances in Cryptology, 1990
1979