Follow
Siamak F. Shahandashti
Siamak F. Shahandashti
Verified email at york.ac.uk - Homepage
Title
Cited by
Cited by
Year
A smart contract for boardroom voting with maximum voter privacy
P McCorry, SF Shahandashti, F Hao
International conference on financial cryptography and data security, 357-375, 2017
4282017
Threshold attribute-based signatures and their application to anonymous credential systems
SF Shahandashti, R Safavi-Naini
International conference on cryptology in Africa, 198-216, 2009
2602009
Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts
DH Phan, D Pointcheval, SF Shahandashti, M Strefler
International journal of information security 12 (4), 251-265, 2013
992013
Towards bitcoin payment networks
P McCorry, M Möser, SF Shahandasti, F Hao
Australasian Conference on Information Security and Privacy, 57-76, 2016
882016
Attribute-based encryption with key cloning protection
MJ Hinek, S Jiang, R Safavi-Naini, SF Shahandashti
Cryptology ePrint Archive, 2008
732008
Stealing PINs via mobile sensors: actual risk versus user perception
M Mehrnezhad, E Toreini, SF Shahandashti, F Hao
International Journal of Information Security 17 (3), 291-313, 2018
662018
Every Vote Counts: Ensuring Integrity in {Large-Scale} Electronic Voting
F Hao, MN Kreeger, B Randell, D Clarke, SF Shahandashti, PHJ Lee
2014 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections …, 2014
572014
Touchsignatures: identification of user touch actions and PINs based on mobile sensor data via javascript
M Mehrnezhad, E Toreini, SF Shahandashti, F Hao
Journal of Information Security and Applications 26, 23-38, 2016
472016
Refund attacks on Bitcoin’s payment protocol
P McCorry, SF Shahandashti, F Hao
International Conference on Financial Cryptography and Data Security, 581-599, 2016
452016
DRE-ip: a verifiable e-voting scheme without tallying authorities
SF Shahandashti, F Hao
European Symposium on Research in Computer Security, 223-240, 2016
392016
Tap-Tap and Pay (TTP): Preventing the mafia attack in NFC payment
M Mehrnezhad, F Hao, SF Shahandashti
International Conference on Research in Security Standardisation, 21-39, 2015
362015
Private fingerprint matching
SF Shahandashti, R Safavi-Naini, P Ogunbona
Australasian Conference on Information Security and Privacy, 426-433, 2012
322012
A provably secure short transitive signature scheme from bilinear group pairs
SF Shahandashti, M Salmasizadeh, J Mohajeri
International Conference on Security in Communication Networks, 60-76, 2004
322004
Privacy-preserving implicit authentication
NA Safa, R Safavi-Naini, SF Shahandashti
IFIP International Information Security Conference, 471-484, 2014
312014
Authenticated key exchange over bitcoin
P McCorry, SF Shahandashti, D Clarke, F Hao
International Conference on Research in Security Standardisation, 3-20, 2015
292015
The SPEKE protocol revisited
F Hao, SF Shahandashti
International Conference on Research in Security Standardisation, 26-38, 2014
292014
Construction of universal designated-verifier signatures and identity-based signatures from standard signatures
SF Shahandashti, R Safavi-Naini
International Workshop on Public Key Cryptography, 121-140, 2008
292008
Reconciling user privacy and implicit authentication for mobile devices
SF Shahandashti, R Safavi-Naini, NA Safa
Computers & Security 53, 215-233, 2015
272015
Texture to the rescue: Practical paper fingerprinting based on texture patterns
E Toreini, SF Shahandashti, F Hao
ACM Transactions on Privacy and Security (TOPS) 20 (3), 1-29, 2017
222017
Battery draining attacks against edge computing nodes in IoT networks
R Smith, D Palin, PP Ioulianou, VG Vassilakis, SF Shahandashti
Cyber-Physical Systems 6 (2), 96-116, 2020
152020
The system can't perform the operation now. Try again later.
Articles 1–20