Reihaneh Safavi -Naini
University of Calgary
H-index: 46
North America-Canada
Top articles of Reihaneh Safavi -Naini
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Refereed Delegation of Computation Using Smart Contracts | IEEE Transactions on Dependable and Secure Computing | Sepideh Avizheh Mahmudun Nabi Reihaneh Safavi-Naini | 2024/3/4 |
Fair Private Set Intersection Using Smart Contracts | Sepideh Avizheh Reihaneh Safavi-Naini | 2024/2/29 | |
sigBridge: A Cross-chain Bridge for Permissioned Blockchains and its application to decentralized access control | Mahmudun Nabi Sepideh Avizheh Preston Haffey Reihaneh Safavi-Naini Marc Kneppers | 2024 | |
CCA-Secure Hybrid Encryption in Correlated Randomness Model and KEM Combiners | arXiv preprint arXiv:2401.00983 | Somnath Panja Setareh Sharifian Shaoquan Jiang Reihaneh Safavi-Naini | 2024/1/2 |
Password Protected Universal Thresholdizer | Cryptology ePrint Archive | Sabyasachi Dutta Partha Sarathi Roy Reihaneh Safavi-Naini Willy Susilo | 2024 |
TurboBlom: A light and resilient key predistribution scheme with application to Internet of Things | Plos one | Majid Khabbazian Reihaneh Safavi-Naini Ahmad Shabani-Baghani | 2024/3/20 |
Flexible polar encoding for information reconciliation in QKD | arXiv preprint arXiv:2312.03100 | Snehasis Addy Sabyasachi Dutta Somnath Panja Kunal Dey Reihaneh Safavi-Naini | 2023/11/30 |
Lower Bounds on the Share Size of Leakage Resilient Cheating Detectable Secret Sharing | Sabyasachi Dutta Shaoquan Jiang Reihaneh Safavi-Naini | 2023/10/30 | |
A one-way secret key agreement with security against active adversaries | Somnath Panja Shaoquan Jiang Reihaneh Safavi-Naini | 2023/6/25 | |
Composable Anonymous Proof-of-Location with User-controlled Offline Access | IEEE Access | Mamunur Akand Reihaneh Safavi-Naini Sepideh Avizheh | 2023/5/24 |
Robust and Reusable Fuzzy Extractors and their Application to Authentication from Iris Data | Cryptology ePrint Archive | Somnath Panja Nikita Tripathi Shaoquan Jiang Reihaneh Safavi-Naini | 2023 |
Fides: A system for verifiable computation using smart contracts | Mahmudun Nabi Sepideh Avizheh Reihaneh Safavi-Naini | 2022/5/6 | |
On Randomization in MTD Systems | Majid Ghaderi Samuel Jero Cristina Nita-Rotaru Reihaneh Safavi-Naini | 2022/11/11 | |
Privacy-preserving FairSwap: Fairness and privacy interplay | Proceedings on Privacy Enhancing Technologies | Sepideh Avizheh Preston Haffey Reihaneh Safavi-Naini | 2022 |
A Capability-based Distributed Authorization System to Enforce Context-aware Permission Sequences | arXiv e-prints | Adrian Shuai Li Reihaneh Safavi-Naini Philip WL Fong | 2022/11 |
Securing Communication Against Leaky Switches | Leila Rashidi Sogand Sadrhaghighi Majid Ghaderi Cristina Nita-Rotaru Reihaneh Safavi-Naini | 2022/10/3 | |
Traceable policy-based signatures and instantiation from lattices | Information Sciences | Yanhong Xu Reihaneh Safavi-Naini Khoa Nguyen Huaxiong Wang | 2022/8/1 |
A Lower Bound on the Share Size of Leakage-Resilient Secret-Sharing Schemes | Sabyasachi Dutta Shaoquan Jiang Reihaneh Safavi-Naini | 2022/6/13 | |
Scalable behavioral authentication | IEEE Access | Md Morshedul Islam Reihaneh Safavi-Naini Marc Kneppers | 2021/3/15 |
Second-order asymptotics for one-way secret key agreement | Alireza Poostindouz Reihaneh Safavi-Naini | 2021/7/12 |