Siamak F. Shahandashti

Orcid: 0000-0002-5284-6847

Affiliations:
  • University of York, UK
  • Newcastle University, UK (former)
  • University of Wollongong, Australia (former)


According to our database1, Siamak F. Shahandashti authored at least 55 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
The Emperor is Now Clothed: A Secure Governance Framework for Web User Authentication through Password Managers.
CoRR, 2024

2023
A novel attack on McEliece's cryptosystem.
Int. J. Comput. Math. Comput. Syst. Theory, July, 2023

Semidirect Product Key Exchange: the State of Play.
IACR Cryptol. ePrint Arch., 2023

SPDH-Sign: towards Efficient, Post-quantum Group-based Signatures.
IACR Cryptol. ePrint Arch., 2023

The Comparison of Password Composition Policies Among US, German, and Thailand Samples.
Proceedings of the 20th IEEE International Joint Conference on Computer Science and Software Engineering, 2023

Online Security Attack Experience and Worries of Young Adults in the Kingdom of Saudi Arabia.
Proceedings of the Human Aspects of Information Security and Assurance, 2023

The Effect of Length on Key Fingerprint Verification Security and Usability.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
A Trust-Based Intrusion Detection System for RPL Networks: Detecting a Combination of Rank and Blackhole Attacks.
J. Cybersecur. Priv., March, 2022

On the efficiency of a general attack against the MOBS cryptosystem.
J. Math. Cryptol., 2022

A Subexponential Quantum Algorithm for the Semidirect Discrete Logarithm Problem.
IACR Cryptol. ePrint Arch., 2022

Online Security Attack Experience and Worries of Young Adults in the United Kingdom.
Proceedings of the Human Aspects of Information Security and Assurance, 2022

ML-based Detection of Rank and Blackhole Attacks in RPL Networks.
Proceedings of the 13th International Symposium on Communication Systems, 2022

2021
Cryptanalysis of Semidirect Product Key Exchange Using Matrices Over Non-Commutative Rings.
IACR Cryptol. ePrint Arch., 2021

Formal modelling and security analysis of bitcoin's payment protocol.
Comput. Secur., 2021

Accept All: The Landscape of Cookie Banners in Greece and the UK.
Proceedings of the ICT Systems Security and Privacy Protection, 2021

Performance and Usability of Visual and Verbal Verification of Word-Based Key Fingerprints.
Proceedings of the Human Aspects of Information Security and Assurance, 2021

2020
SEAL: Sealed-Bid Auction Without Auctioneers.
IEEE Trans. Inf. Forensics Secur., 2020

End-to-End Verifiable E-Voting Trial for Polling Station Voting.
IEEE Secur. Priv., 2020

End-to-End Verifiable E-Voting Trial for Polling Station Voting at Gateshead.
IACR Cryptol. ePrint Arch., 2020

Battery draining attacks against edge computing nodes in IoT networks.
CoRR, 2020

Position paper: A systematic framework for categorising IoT device fingerprinting mechanisms.
Proceedings of the AIChallengeIoT@SenSys 2020: Proceedings of the 2nd International Workshop on Challenges in Artificial Intelligence and Machine Learning for Internet of Things, 2020

Revisiting Security Vulnerabilities in Commercial Password Managers.
Proceedings of the ICT Systems Security and Privacy Protection, 2020

2019
DOMtegrity: ensuring web page integrity against malicious browser extensions.
Int. J. Inf. Sec., 2019

2018
Analyzing and Patching SPEKE in ISO/IEC.
IEEE Trans. Inf. Forensics Secur., 2018

Stealing PINs via mobile sensors: actual risk versus user perception.
Int. J. Inf. Sec., 2018

Verifiable Classroom Voting in Practice.
IEEE Secur. Priv., 2018

Analysing and Patching SPEKE in ISO/IEC.
CoRR, 2018

A New Look at the Refund Mechanism in the Bitcoin Payment Protocol.
Proceedings of the Financial Cryptography and Data Security, 2018

2017
Texture to the Rescue: Practical Paper Fingerprinting Based on Texture Patterns.
ACM Trans. Priv. Secur., 2017

A Smart Contract for Boardroom Voting with Maximum Voter Privacy.
IACR Cryptol. ePrint Arch., 2017

2016
TouchSignatures: Identification of user touch actions and PINs based on mobile sensor data via JavaScript.
J. Inf. Secur. Appl., 2016

DRE-ip: A Verifiable E-Voting Scheme without Tallying Authorities.
IACR Cryptol. ePrint Arch., 2016

Refund attacks on Bitcoin's Payment Protocol.
IACR Cryptol. ePrint Arch., 2016

Towards Bitcoin Payment Networks.
IACR Cryptol. ePrint Arch., 2016

Theoretical Attacks on E2E Voting Systems.
IACR Cryptol. ePrint Arch., 2016

Electoral Systems Used around the World.
CoRR, 2016

2015
Authenticated Key Exchange over Bitcoin.
IACR Cryptol. ePrint Arch., 2015

The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group.
IACR Cryptol. ePrint Arch., 2015

Reconciling user privacy and implicit authentication for mobile devices.
Comput. Secur., 2015

Tap-Tap and Pay (TTP): Preventing the Mafia Attack in NFC Payment.
Proceedings of the Security Standardisation Research - Second International Conference, 2015

TouchSignatures: Identification of User Touch Actions based on Mobile Sensors via JavaScript.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Privacy-Preserving Implicit Authentication.
IACR Cryptol. ePrint Arch., 2014

The SPEKE Protocol Revisited.
IACR Cryptol. ePrint Arch., 2014

Every Vote Counts: Ensuring Integrity in Large-Scale Electronic Voting.
Proceedings of the 2014 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, 2014

2012
New security notions and relations for public-key encryption.
J. Math. Cryptol., 2012

Attribute-based encryption without key cloning.
Int. J. Appl. Cryptogr., 2012

Private Fingerprint Matching.
IACR Cryptol. ePrint Arch., 2012

Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts.
IACR Cryptol. ePrint Arch., 2012

2009
Generic constructions for universal designated-verifier signatures and identitybased signatures from standard signatures.
IET Inf. Secur., 2009

Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems.
IACR Cryptol. ePrint Arch., 2009

2008
Attribute-Based Encryption with Key Cloning Protection.
IACR Cryptol. ePrint Arch., 2008

2007
Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures.
IACR Cryptol. ePrint Arch., 2007

Concurrently-secure credential ownership proofs.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

2005
A Verifiable Partial Key Escrow, Based on McCurley Encryption Scheme
Electron. Colloquium Comput. Complex., 2005

2004
A Provably Secure Short Transitive Signature Scheme from Bilinear Group Pairs.
Proceedings of the Security in Communication Networks, 4th International Conference, 2004


  Loading...