Reihaneh S Safavi-Naini Authors: Add personal information
 Affiliation history
Bibliometrics: publication history
SEARCH
ROLE
Author only
· Editor only
· Other only
· All roles

AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas

BOOKMARK & SHARE

 #resultstats2 { width:100%; padding: 10px; background-color:#ECE9D8; /*background:#9c9;*/ } #resultstats { width:100%; /*background-color:#ECE9D8;*/ font-size: 12px; /*background:#9c9;*/ } #resultstats a:link { text-decoration: none; } #resultstats div { padding-bottom: 5px; padding-top: 5px; } #resfound { background-color: #ece9d8; padding-left:5px } #searchtools { display:inline; float:right; padding-right: 10px; } #refinements { padding-top: 5px; } #refinements table { margin-left: 10px; } #refinements tr { vertical-align:top; } #refinements span { font-size: 12px; } .rectots { font-size:12px; } .problem { font-size:12px; color: red; } div.problem { height: 400px; } #results { /* float:right; */ /* width:80%; */ color: #000000; font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 12px; padding-top: 10px; /*background:#9c9;*/ } #aggs { float:left; width:20%; font-family: Verdana,Arial,Helvetica,sans-serif; font-size:12px; } #pagelogic { font-family: Verdana,Arial,Helvetica,sans-serif; font-size:12px; float:right; padding-bottom: 10px; } #pagerange { font-family: Verdana,Arial,Helvetica,sans-serif; font-size:12px; float:left; padding-bottom: 10px; } #resultmenu { font-family: Verdana,Arial,Helvetica,sans-serif; font-size:12px; float:right; padding-bottom: 10px; } #resultmenu label { margin-right: 0px; vertical-align:bottom; } #resultmenu input { margin-right: 0px; vertical-align:bottom; } #resultmenu select { margin-right: 0px; background-color: #aff; border: 0; border-radius: 0; font-size: 12px; } #resultmenu option { font-size: 12px; background-color: white; } .aggHead { font-weight: bold; padding-bottom: 0; padding-top: 10px; } #aggs ul{ list-style-type: none; margin-top: 0.25em; padding-left: 0; font-size: 1em; } #upcevents li{ padding-bottom: 1.25em; } #upcevents div{ margin-top: 25px; } a.showhide:link { text-decoration: none; } #results .numbering{ font-size: 12px; font-weight:bold; width:30px; float:left; text-align: right; padding-top: 2px; } #results .details{ font-size: 12px; width:92%; float:right; padding-bottom: 20px; } #results .title{ font-size: 14px; padding-bottom:5px; } #results .authors{ font-size: 12px; padding-bottom:5px; } #results .source{ font-size: 12px; padding-bottom:5px; } #results .publisher{ font-size: 12px; padding-bottom:5px; } #results .metrics{ font-size: 12px; padding-bottom:5px; } #results .metricsCol1{ float: left; display:inline; padding-bottom:5px; } #results .metricsCol2{ float: right; display: inline; width: 590px; padding-bottom:5px; } #results .ft{ font-size: 12px; padding-bottom:5px; } #results .abstract{ font-size: 12px; padding-bottom:5px; } #results .kw{ font-size: 12px; padding-bottom:5px; } #results .pubother{ font-size: 12px; padding-bottom:5px; } .izers { margin-top: 10px; margin-bottom:10px; } .highlights em{ background-color: #FFFF00; font-style: normal; } .publicationDate { background-color: #aff; } .citedCount { } .download6Weeks { } .download12Months { } .downloadAll { } 222 results found Export Results: bibtex | endnote | acmref | csv Result 1 – 20 of 222 Result page: 1 2 3 4 5 6 7 8 9 10 >> Sort by: relevance publication date citation count downloads (6 Weeks) downloads (12 months) downloads (overall) 1 November 2017 IoTS&P '17: Proceedings of the 2017 Workshop on Internet of Things Security and Privacy Publisher: ACM Bibliometrics: Citation Count: 0 Downloads (6 Weeks): 21,   Downloads (12 Months): 70,   Downloads (Overall): 70 Full text available: PDF Smart homes include hundreds of devices that generate messages, and communicate with each other and the world outside the home, to provide a highly functional, optimized and personalized environment for residents. A secure and reliable event logging system is an essential component of smart homes with a wide range of ... Keywords: iot security, data privacy, forward security, secure event log 2 October 2017 MTD '17: Proceedings of the 2017 Workshop on Moving Target Defense Publisher: ACM Bibliometrics: Citation Count: 0 Downloads (6 Weeks): 15,   Downloads (12 Months): 30,   Downloads (Overall): 30 Full text available: PDF Moving target defense (MTD) strategies have been widely studied for securing computer communication systems. We consider using MTD strategies as a cryptographic mechanism for providing secure communication when the adversary has access to a quantum computer and security is required over a long period of time. We assume Alice and ... Keywords: markov game for security, moving target defense, quantum-safe communication, mobile adversary 3 March 2017 CODASPY '17: Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy Publisher: ACM Bibliometrics: Citation Count: 0 Downloads (6 Weeks): 7,   Downloads (12 Months): 39,   Downloads (Overall): 39 Full text available: PDF Data compression is ubiquitous to any information and communication system. It often reduces resources required to store and transmit data. However, the efficiency of compression algorithms also makes them an obvious target for hackers to mount denial-of-service attacks. In this work, we consider decompression quines, a specific class of compressed ... Keywords: anti-viruses, compression, quines, denial-of-service 4 October 2016 CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security Publisher: ACM Bibliometrics: Citation Count: 0 Downloads (6 Weeks): 6,   Downloads (12 Months): 120,   Downloads (Overall): 202 Full text available: PDF We propose a privacy enhanced location verification system that uses in-region location verification to verify if a location claim is from within an area specified by a policy. The novelty of our work is the use of distance bounding protocols to construct a pseudo-rectangle (P-rectangle) that optimizes coverage of the ... Keywords: in-region location verification, location verification, distance bounding, privacy-enhanced location verification 5 October 2016 CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security Publisher: ACM Bibliometrics: Citation Count: 0 Downloads (6 Weeks): 13,   Downloads (12 Months): 241,   Downloads (Overall): 348 Full text available: PDF Active behavioural-based authentication systems are challenge-response based implicit authentication systems that authenticate users using the behavioural features of the users when responding to challenges that are sent from the server. They provide a flexible (no extra hardware) and secure second factor for authentication systems, with applications including protection against identity ... Keywords: challenge-response, behavioural authentication, user authentication, mobile authentication 6 August 2016 Security and Communication Networks: Volume 9 Issue 12, August 2016 Publisher: John Wiley & Sons, Inc. Bibliometrics: Citation Count: 0 We consider a scenario where a sequence of messages must be protected and the security requirement is that, the most recent message has high level of security while past messages could be secured at a lower level. We assume the adversary is an eavesdropping adversary and has unlimited computational power. ... Keywords: entropic security, information theoretic secure encryption, provable security 7 May 2016 ASIA CCS '16: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security Publisher: ACM Bibliometrics: Citation Count: 2 Downloads (6 Weeks): 2,   Downloads (12 Months): 55,   Downloads (Overall): 135 Full text available: PDF Modern social computing platforms (e.g., Facebook) are extensible. Third-party developers deploy extensions (e.g., Facebook applications) that augment the functionalities of the underlying platforms. Previous work demonstrated that permission-based protection mechanisms, adopted to control access to users' personal information, fail to control inference - the inference of private information from public ... Keywords: inference attack, privacy, sanitizing transformation, utility, view-based protection, composition, verification, facebook applications, social computing 8 January 2016 Journal of Automated Reasoning: Volume 56 Issue 1, January 2016 Publisher: Springer-Verlag New York, Inc. Bibliometrics: Citation Count: 0 We present a Hoare logic for proving semantic security and determining exact security bounds of a block cipher mode of operation. We propose a simple yet expressive programming language to specify encryption modes, semantic functions for each command (statement) in the language, an assertion language that allows to state predicates ... Keywords: Block cipher, Hoare logic, Automated verification, Provable cryptography, Symmetric encryption 9 December 2015 Designs, Codes and Cryptography: Volume 77 Issue 2-3, December 2015 Publisher: Kluwer Academic Publishers Bibliometrics: Citation Count: 1 Verifiable delegation of computation has attracted considerable attention in recent years and had resulted in a number of delegation models. In the verifiable computation model of Gennaro et al., a client wants to delegate the computation of a function to a cloud server. The client generates an encoding of the ... Keywords: 11T71, Batch verification, Delegation of computation, Storage overhead 10 October 2015 CCSW '15: Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop Publisher: ACM Bibliometrics: Citation Count: 0 Downloads (6 Weeks): 2,   Downloads (12 Months): 25,   Downloads (Overall): 105 Full text available: PDF We consider performance of Linux Random Number Generator(RNG) in virtualized environments and ask, (i) if the emulated hardware can provide sufficient entropy sources for the RNG and, (ii) if the RNG output of the host and the guest are isolated. These are important questions because insufficient entropy results in {\em ... Keywords: linux, randomness, virtualization 11 October 2015 SPACE 2015: Proceedings of the 5th International Conference on Security, Privacy, and Applied Cryptography Engineering - Volume 9354 Publisher: Springer-Verlag New York, Inc. Bibliometrics: Citation Count: 0 A t,n, ï�ź secret sharing scheme with cheating detection property SSCD is a t-out-of-n threshold secret sharing scheme that has the following additional property; the probability that any t malicious players can successfully cheat without being caught an honest player by opening forged shares and causing the honest player to ... 12 October 2015 SPACE 2015: Proceedings of the 5th International Conference on Security, Privacy, and Applied Cryptography Engineering - Volume 9354 Publisher: Springer-Verlag New York, Inc. Bibliometrics: Citation Count: 0 An accumulator is a succinct aggregate of a set of values where it is possible to issue short membership proofs for each accumulated value. A party in possession of such a membership proof can then demonstrate that the value is included in the set. In this paper, we present the ... 13 September 2015 Computers and Security: Volume 53 Issue C, September 2015 Publisher: Elsevier Advanced Technology Publications Bibliometrics: Citation Count: 1 In an implicit authentication system, a user profile is used as an additional factor to strengthen the authentication of mobile users. The profile consists of features that are constructed using the history of user actions on her mobile device over time. The profile is stored on the server and is ... Keywords: 94A60, Homomorphic encryption, Implicit authentication, User privacy, Behavioural features, Provable security, 68P25, 94A62 14 August 2015 Proceedings of the 9th IFIP WG 11.2 International Conference on Information Security Theory and Practice - Volume 9311 Publisher: Springer-Verlag New York, Inc. Bibliometrics: Citation Count: 0 Anonymous authoring includes writing reviews, comments and blogs, using pseudonyms with the general assumption that using these pseudonyms will protect the real identity of authors and allows them to freely express their views. It has been shown, however, that writing style may be used to trace authors across multiple Websites. ... Keywords: Privacy, Obfuscation, Stylometry, Anonymity 15 August 2015 Revised Selected Papers of the 22nd International Conference on Selected Areas in Cryptography - SAC 2015 - Volume 9566 Publisher: Springer-Verlag New York, Inc. Bibliometrics: Citation Count: 0 One-time signature OTS schemes are important cryptographic primitives that can be constructed using one-way functions, and provide post-quantum security. They have found diverse applications including forward security and broadcast authentication. OTS schemes are time-efficient, but their space complexity is high: the sizes of signatures and keys are linear in the ... Keywords: Post-quantum cryptography, Digital signatures, Broadcast authentication 16 December 2014 ICICS 2014: Revised Selected Papers of the 16th International Conference on Information and Communications Security - Volume 8958 Publisher: Springer-Verlag New York, Inc. Bibliometrics: Citation Count: 1 In distance-bounding protocols a prover wants to prove that it is located within a distance bound $$\mathbb {D}$$D from a verifier. Distance-bounding $$\mathtt {DB}$$DB protocols have numerous applications including authentication and proximity checking. The privacy problem in $$\mathtt {DB}$$DBï�źprotocols was limited to privacy against MiM adversaries. Gambs et al. [11] ... 17 December 2014 ICICS 2014: Revised Selected Papers of the 16th International Conference on Information and Communications Security - Volume 8958 Publisher: Springer-Verlag New York, Inc. Bibliometrics: Citation Count: 0 We propose a new approach to Captcha which estimates human cognitive ability, in particular visual search ability, to differentiate humans from computers. We refer to this Captcha as Movtcha Matching Objects by Visual Search To Tell Computers and Humans Apart. The design of Movtcha takes into account the analysis of ... 18 December 2014 ICICS 2014: Revised Selected Papers of the 16th International Conference on Information and Communications Security - Volume 8958 Publisher: Springer-Verlag New York, Inc. Bibliometrics: Citation Count: 1 Distance upper-bounding DUB allows a verifier to know whether a proving party is located within a certain distance bound. DUB protocols have many applications in secure authentication and location based services. We consider the dual problem of distance lower bounding DLB, where the prover proves it is outside a distance ... 19 November 2014 CCS '14: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security Publisher: ACM Bibliometrics: Citation Count: 0 Downloads (6 Weeks): 0,   Downloads (12 Months): 17,   Downloads (Overall): 231 Full text available: PDF The 6th ACM Cloud Computing Security Workshop (CCSW 2014) is held in conjunction with the 21st ACM Conference on Computer and Communications Security (CCS 2014), on November 7 at The Scottsdale Plaza Resort, Scottsdale, Arizona, USA. Cloud computing is a new paradigm for computing as a utility and refers to ... Keywords: computer security, cloud computing, computer privacy 20 November 2014 Designs, Codes and Cryptography: Volume 73 Issue 2, November 2014 Publisher: Kluwer Academic Publishers Bibliometrics: Citation Count: 0 A verifiable secret sharing is a secret sharing scheme with an untrusted dealer that allows participants to verify validity of their own shares. A publicly verifiable secret sharing (PVSS) scheme is a verifiable secret sharing scheme that allows a third party to verify correctness of the distributed shares. We propose ... Keywords: Secret sharing, Decisional composite residuosity assumption, Non-interactive PVSS, 94A60, Paillier's encryption scheme