Samaneh Mashhadi
Orcid: 0000-0001-9191-1376
According to our database1,
Samaneh Mashhadi
authored at least 30 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Wirel. Pers. Commun., July, 2024
Changeable essential threshold secret image sharing scheme with verifiability using bloom filter.
Multim. Tools Appl., June, 2024
Two meaningful secret image sharing schemes based on integer wavelet transform and LWE.
Comput. Appl. Math., April, 2024
A secure secret image sharing with steganography and authentication by Hamming code (15,11) for compressed images.
Multim. Tools Appl., March, 2024
LWE-based verifiable essential secret image sharing scheme ( ( t , s , k , n ) $( {t,s,k,n} )$ - VESIS).
IET Image Process., March, 2024
Multim. Tools Appl., February, 2024
High performance image steganography integrating IWT and Hamming code within secret sharing.
IET Image Process., 2024
A verifiable essential secret image sharing scheme based on HLRs (VESIS-(<i>t</i>, <i>s</i>, <i>k</i>, <i>n</i>)).
CAAI Trans. Intell. Technol., 2024
2023
A (t,n)- Secret image sharing with steganography based on Rook polynomial and LWE problem.
Multim. Tools Appl., October, 2023
Game-based security proofs for verifiable secret sharing schemes in the standard model.
Inf. Secur. J. A Glob. Perspect., May, 2023
Multim. Tools Appl., 2023
2022
Des. Codes Cryptogr., 2022
2021
Inf. Sci., 2021
2020
Inf. Secur. J. A Glob. Perspect., 2020
2019
Wirel. Pers. Commun., 2019
Quantum Inf. Process., 2019
2017
Secure publicly verifiable and proactive secret sharing schemes with general access structure.
Inf. Sci., 2017
Provably secure verifiable multi-stage secret sharing scheme based on monotone span program.
IET Inf. Secur., 2017
2016
Share secrets stage by stage with homogeneous linear feedback shift register in the standard model.
Secur. Commun. Networks, 2016
J. Inf. Process. Syst., 2016
2015
Computationally secure multiple secret sharing: models, schemes, and formal security analysis.
ISC Int. J. Inf. Secur., 2015
Two verifiable multi secret sharing schemes based on nonhomogeneous linear recursion and LFSR public-key cryptosystem.
Inf. Sci., 2015
2013
Int. J. Netw. Secur., 2013
2012
Analysis of frame attack on Hsu et al.'s non-repudiable threshold multi-proxy multi-signature scheme with shared verification.
Sci. Iran., 2012
2008
Comput. Stand. Interfaces, 2008
Verifiable secret sharing schemes based on non-homogeneous linear recursions and elliptic curves.
Comput. Commun., 2008