Author image not provided
 Reihaneh S Safavi-Naini

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article4.64
Citation Count1,039
Publication count224
Publication years1990-2017
Available for download46
Average downloads per article509.74
Downloads (cumulative)23,448
Downloads (12 Months)1,372
Downloads (6 Weeks)126
SEARCH
ROLE
Arrow RightAuthor only
· Editor only
· Other only
· All roles


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


222 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 222
Result page: 1 2 3 4 5 6 7 8 9 10 >>

Sort by:

1 published by ACM
November 2017 IoTS&P '17: Proceedings of the 2017 Workshop on Internet of Things Security and Privacy
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 21,   Downloads (12 Months): 70,   Downloads (Overall): 70

Full text available: PDFPDF
Smart homes include hundreds of devices that generate messages, and communicate with each other and the world outside the home, to provide a highly functional, optimized and personalized environment for residents. A secure and reliable event logging system is an essential component of smart homes with a wide range of ...
Keywords: iot security, data privacy, forward security, secure event log

2 published by ACM
October 2017 MTD '17: Proceedings of the 2017 Workshop on Moving Target Defense
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 15,   Downloads (12 Months): 30,   Downloads (Overall): 30

Full text available: PDFPDF
Moving target defense (MTD) strategies have been widely studied for securing computer communication systems. We consider using MTD strategies as a cryptographic mechanism for providing secure communication when the adversary has access to a quantum computer and security is required over a long period of time. We assume Alice and ...
Keywords: markov game for security, moving target defense, quantum-safe communication, mobile adversary

3 published by ACM
March 2017 CODASPY '17: Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 7,   Downloads (12 Months): 39,   Downloads (Overall): 39

Full text available: PDFPDF
Data compression is ubiquitous to any information and communication system. It often reduces resources required to store and transmit data. However, the efficiency of compression algorithms also makes them an obvious target for hackers to mount denial-of-service attacks. In this work, we consider decompression quines, a specific class of compressed ...
Keywords: anti-viruses, compression, quines, denial-of-service

4 published by ACM
October 2016 CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 6,   Downloads (12 Months): 120,   Downloads (Overall): 202

Full text available: PDFPDF
We propose a privacy enhanced location verification system that uses in-region location verification to verify if a location claim is from within an area specified by a policy. The novelty of our work is the use of distance bounding protocols to construct a pseudo-rectangle (P-rectangle) that optimizes coverage of the ...
Keywords: in-region location verification, location verification, distance bounding, privacy-enhanced location verification

5 published by ACM
October 2016 CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 13,   Downloads (12 Months): 241,   Downloads (Overall): 348

Full text available: PDFPDF
Active behavioural-based authentication systems are challenge-response based implicit authentication systems that authenticate users using the behavioural features of the users when responding to challenges that are sent from the server. They provide a flexible (no extra hardware) and secure second factor for authentication systems, with applications including protection against identity ...
Keywords: challenge-response, behavioural authentication, user authentication, mobile authentication

6
August 2016 Security and Communication Networks: Volume 9 Issue 12, August 2016
Publisher: John Wiley & Sons, Inc.
Bibliometrics:
Citation Count: 0

We consider a scenario where a sequence of messages must be protected and the security requirement is that, the most recent message has high level of security while past messages could be secured at a lower level. We assume the adversary is an eavesdropping adversary and has unlimited computational power. ...
Keywords: entropic security, information theoretic secure encryption, provable security

7 published by ACM
May 2016 ASIA CCS '16: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 2,   Downloads (12 Months): 55,   Downloads (Overall): 135

Full text available: PDFPDF
Modern social computing platforms (e.g., Facebook) are extensible. Third-party developers deploy extensions (e.g., Facebook applications) that augment the functionalities of the underlying platforms. Previous work demonstrated that permission-based protection mechanisms, adopted to control access to users' personal information, fail to control inference - the inference of private information from public ...
Keywords: inference attack, privacy, sanitizing transformation, utility, view-based protection, composition, verification, facebook applications, social computing

8
January 2016 Journal of Automated Reasoning: Volume 56 Issue 1, January 2016
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 0

We present a Hoare logic for proving semantic security and determining exact security bounds of a block cipher mode of operation. We propose a simple yet expressive programming language to specify encryption modes, semantic functions for each command (statement) in the language, an assertion language that allows to state predicates ...
Keywords: Block cipher, Hoare logic, Automated verification, Provable cryptography, Symmetric encryption

9
December 2015 Designs, Codes and Cryptography: Volume 77 Issue 2-3, December 2015
Publisher: Kluwer Academic Publishers
Bibliometrics:
Citation Count: 1

Verifiable delegation of computation has attracted considerable attention in recent years and had resulted in a number of delegation models. In the verifiable computation model of Gennaro et al., a client wants to delegate the computation of a function to a cloud server. The client generates an encoding of the ...
Keywords: 11T71, Batch verification, Delegation of computation, Storage overhead

10 published by ACM
October 2015 CCSW '15: Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 2,   Downloads (12 Months): 25,   Downloads (Overall): 105

Full text available: PDFPDF
We consider performance of Linux Random Number Generator(RNG) in virtualized environments and ask, (i) if the emulated hardware can provide sufficient entropy sources for the RNG and, (ii) if the RNG output of the host and the guest are isolated. These are important questions because insufficient entropy results in {\em ...
Keywords: linux, randomness, virtualization

11
October 2015 SPACE 2015: Proceedings of the 5th International Conference on Security, Privacy, and Applied Cryptography Engineering - Volume 9354
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 0

A t,n, ï�ź secret sharing scheme with cheating detection property SSCD is a t-out-of-n threshold secret sharing scheme that has the following additional property; the probability that any t malicious players can successfully cheat without being caught an honest player by opening forged shares and causing the honest player to ...

12
October 2015 SPACE 2015: Proceedings of the 5th International Conference on Security, Privacy, and Applied Cryptography Engineering - Volume 9354
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 0

An accumulator is a succinct aggregate of a set of values where it is possible to issue short membership proofs for each accumulated value. A party in possession of such a membership proof can then demonstrate that the value is included in the set. In this paper, we present the ...

13
September 2015 Computers and Security: Volume 53 Issue C, September 2015
Publisher: Elsevier Advanced Technology Publications
Bibliometrics:
Citation Count: 1

In an implicit authentication system, a user profile is used as an additional factor to strengthen the authentication of mobile users. The profile consists of features that are constructed using the history of user actions on her mobile device over time. The profile is stored on the server and is ...
Keywords: 94A60, Homomorphic encryption, Implicit authentication, User privacy, Behavioural features, Provable security, 68P25, 94A62

14
August 2015 Proceedings of the 9th IFIP WG 11.2 International Conference on Information Security Theory and Practice - Volume 9311
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 0

Anonymous authoring includes writing reviews, comments and blogs, using pseudonyms with the general assumption that using these pseudonyms will protect the real identity of authors and allows them to freely express their views. It has been shown, however, that writing style may be used to trace authors across multiple Websites. ...
Keywords: Privacy, Obfuscation, Stylometry, Anonymity

15
August 2015 Revised Selected Papers of the 22nd International Conference on Selected Areas in Cryptography - SAC 2015 - Volume 9566
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 0

One-time signature OTS schemes are important cryptographic primitives that can be constructed using one-way functions, and provide post-quantum security. They have found diverse applications including forward security and broadcast authentication. OTS schemes are time-efficient, but their space complexity is high: the sizes of signatures and keys are linear in the ...
Keywords: Post-quantum cryptography, Digital signatures, Broadcast authentication

16
December 2014 ICICS 2014: Revised Selected Papers of the 16th International Conference on Information and Communications Security - Volume 8958
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 1

In distance-bounding protocols a prover wants to prove that it is located within a distance bound $$\mathbb {D}$$D from a verifier. Distance-bounding $$\mathtt {DB}$$DB protocols have numerous applications including authentication and proximity checking. The privacy problem in $$\mathtt {DB}$$DBï�źprotocols was limited to privacy against MiM adversaries. Gambs et al. [11] ...

17
December 2014 ICICS 2014: Revised Selected Papers of the 16th International Conference on Information and Communications Security - Volume 8958
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 0

We propose a new approach to Captcha which estimates human cognitive ability, in particular visual search ability, to differentiate humans from computers. We refer to this Captcha as Movtcha Matching Objects by Visual Search To Tell Computers and Humans Apart. The design of Movtcha takes into account the analysis of ...

18
December 2014 ICICS 2014: Revised Selected Papers of the 16th International Conference on Information and Communications Security - Volume 8958
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 1

Distance upper-bounding DUB allows a verifier to know whether a proving party is located within a certain distance bound. DUB protocols have many applications in secure authentication and location based services. We consider the dual problem of distance lower bounding DLB, where the prover proves it is outside a distance ...

19 published by ACM
November 2014 CCS '14: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 0,   Downloads (12 Months): 17,   Downloads (Overall): 231

Full text available: PDFPDF
The 6th ACM Cloud Computing Security Workshop (CCSW 2014) is held in conjunction with the 21st ACM Conference on Computer and Communications Security (CCS 2014), on November 7 at The Scottsdale Plaza Resort, Scottsdale, Arizona, USA. Cloud computing is a new paradigm for computing as a utility and refers to ...
Keywords: computer security, cloud computing, computer privacy

20
November 2014 Designs, Codes and Cryptography: Volume 73 Issue 2, November 2014
Publisher: Kluwer Academic Publishers
Bibliometrics:
Citation Count: 0

A verifiable secret sharing is a secret sharing scheme with an untrusted dealer that allows participants to verify validity of their own shares. A publicly verifiable secret sharing (PVSS) scheme is a verifiable secret sharing scheme that allows a third party to verify correctness of the distributed shares. We propose ...
Keywords: Secret sharing, Decisional composite residuosity assumption, Non-interactive PVSS, 94A60, Paillier's encryption scheme



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us