Siamak F. Shahandashti
Siamak F. Shahandashti
Verified email at - Homepage
Cited by
Cited by
A smart contract for boardroom voting with maximum voter privacy
P McCorry, SF Shahandashti, F Hao
Financial Cryptography and Data Security: 21st International Conference, FC …, 2017
Threshold attribute-based signatures and their application to anonymous credential systems
SF Shahandashti, R Safavi-Naini
Progress in Cryptology–AFRICACRYPT 2009: Second International Conference on …, 2009
Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts
DH Phan, D Pointcheval, SF Shahandashti, M Strefler
International journal of information security 12, 251-265, 2013
Towards bitcoin payment networks
P McCorry, M Möser, SF Shahandasti, F Hao
Information Security and Privacy: 21st Australasian Conference, ACISP 2016 …, 2016
Attribute-based encryption without key cloning
MJ Hinek, S Jiang, R Safavi-Naini, SF Shahandashti
International Journal of Applied Cryptography 2 (3), 250-270, 2012
Stealing PINs via mobile sensors: actual risk versus user perception
M Mehrnezhad, E Toreini, SF Shahandashti, F Hao
International Journal of Information Security 17 (3), 291-313, 2018
Every Vote Counts: Ensuring Integrity in {Large-Scale} Electronic Voting
F Hao, MN Kreeger, B Randell, D Clarke, SF Shahandashti, PHJ Lee
2014 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections …, 2014
Touchsignatures: identification of user touch actions and PINs based on mobile sensor data via javascript
M Mehrnezhad, E Toreini, SF Shahandashti, F Hao
Journal of Information Security and Applications 26, 23-38, 2016
Refund attacks on Bitcoin’s payment protocol
P McCorry, SF Shahandashti, F Hao
International Conference on Financial Cryptography and Data Security, 581-599, 2016
DRE-ip: a verifiable e-voting scheme without tallying authorities
SF Shahandashti, F Hao
Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016
Accept all: The landscape of cookie banners in Greece and the UK
G Kampanos, SF Shahandashti
IFIP International Conference on ICT Systems Security and Privacy Protection …, 2021
SEAL: Sealed-bid auction without auctioneers
S Bag, F Hao, SF Shahandashti, IG Ray
IEEE Transactions on Information Forensics and Security 15, 2042-2052, 2019
The SPEKE protocol revisited
F Hao, SF Shahandashti
International Conference on Research in Security Standardisation, 26-38, 2014
Privacy-preserving implicit authentication
NA Safa, R Safavi-Naini, SF Shahandashti
ICT Systems Security and Privacy Protection: 29th IFIP TC 11 International …, 2014
Private fingerprint matching
SF Shahandashti, R Safavi-Naini, P Ogunbona
Australasian Conference on Information Security and Privacy, 426-433, 2012
Tap-tap and pay (TTP): Preventing the mafia attack in NFC payment
M Mehrnezhad, F Hao, SF Shahandashti
Security Standardisation Research: Second International Conference, SSR 2015 …, 2015
Reconciling user privacy and implicit authentication for mobile devices
SF Shahandashti, R Safavi-Naini, NA Safa
Computers & Security 53, 215-233, 2015
Texture to the rescue: Practical paper fingerprinting based on texture patterns
E Toreini, SF Shahandashti, F Hao
ACM Transactions on Privacy and Security (TOPS) 20 (3), 1-29, 2017
A provably secure short transitive signature scheme from bilinear group pairs
SF Shahandashti, M Salmasizadeh, J Mohajeri
International Conference on Security in Communication Networks, 60-76, 2004
Battery draining attacks against edge computing nodes in IoT networks
R Smith, D Palin, PP Ioulianou, VG Vassilakis, SF Shahandashti
Cyber-Physical Systems 6 (2), 96-116, 2020
The system can't perform the operation now. Try again later.
Articles 1–20