Samaneh Mashhadi

Orcid: 0000-0001-9191-1376

According to our database1, Samaneh Mashhadi authored at least 30 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Verifiable Changeable Threshold Secret Image Sharing Scheme Based on LWE Problem.
Wirel. Pers. Commun., July, 2024

Changeable essential threshold secret image sharing scheme with verifiability using bloom filter.
Multim. Tools Appl., June, 2024

Two meaningful secret image sharing schemes based on integer wavelet transform and LWE.
Comput. Appl. Math., April, 2024

A secure secret image sharing with steganography and authentication by Hamming code (15,11) for compressed images.
Multim. Tools Appl., March, 2024

LWE-based verifiable essential secret image sharing scheme ( ( t , s , k , n ) $( {t,s,k,n} )$ - VESIS).
IET Image Process., March, 2024

OPTP: A new steganography scheme with high capacity and security.
Multim. Tools Appl., February, 2024

High performance image steganography integrating IWT and Hamming code within secret sharing.
IET Image Process., 2024

A verifiable essential secret image sharing scheme based on HLRs (VESIS-(<i>t</i>, <i>s</i>, <i>k</i>, <i>n</i>)).
CAAI Trans. Intell. Technol., 2024

2023
A (t,n)- Secret image sharing with steganography based on Rook polynomial and LWE problem.
Multim. Tools Appl., October, 2023

Game-based security proofs for verifiable secret sharing schemes in the standard model.
Inf. Secur. J. A Glob. Perspect., May, 2023

Non-interactive verifiable LWE-based multi secret sharing scheme.
Multim. Tools Appl., 2023

2022
A non-interactive (t, n)-publicly verifiable multi-secret sharing scheme.
Des. Codes Cryptogr., 2022

2021
Three (t, n)-secret image sharing schemes based on homogeneous linear recursion.
Inf. Sci., 2021

2020
Toward a formal proof for multi-secret sharing in the random oracle model.
Inf. Secur. J. A Glob. Perspect., 2020

2019
A Proactive Multi Stage Secret Sharing Scheme for Any Given Access Structure.
Wirel. Pers. Commun., 2019

General secret sharing based on quantum Fourier transform.
Quantum Inf. Process., 2019

2017
Secure publicly verifiable and proactive secret sharing schemes with general access structure.
Inf. Sci., 2017

New multi-stage secret sharing in the standard model.
Inf. Process. Lett., 2017

Provably secure verifiable multi-stage secret sharing scheme based on monotone span program.
IET Inf. Secur., 2017

2016
How to Fairly Share Multiple Secrets Stage by Stage.
Wirel. Pers. Commun., 2016

Share secrets stage by stage with homogeneous linear feedback shift register in the standard model.
Secur. Commun. Networks, 2016

Analysis of Warrant Attacks on Some Threshold Proxy Signature Schemes.
J. Inf. Process. Syst., 2016

2015
Computationally secure multiple secret sharing: models, schemes, and formal security analysis.
ISC Int. J. Inf. Secur., 2015

Two verifiable multi secret sharing schemes based on nonhomogeneous linear recursion and LFSR public-key cryptosystem.
Inf. Sci., 2015

2013
A Novel Non-repudiable Threshold Proxy Signature Scheme with Known Signers.
Int. J. Netw. Secur., 2013

2012
Analysis of frame attack on Hsu et al.'s non-repudiable threshold multi-proxy multi-signature scheme with shared verification.
Sci. Iran., 2012

A Novel Secure Self Proxy Signature Scheme.
Int. J. Netw. Secur., 2012

2008
New efficient and practical verifiable multi-secret sharing schemes.
Inf. Sci., 2008

An efficient threshold verifiable multi-secret sharing.
Comput. Stand. Interfaces, 2008

Verifiable secret sharing schemes based on non-homogeneous linear recursions and elliptic curves.
Comput. Commun., 2008


  Loading...