[go: up one dir, main page]

Follow
Siamak F. Shahandashti
Siamak F. Shahandashti
Verified email at york.ac.uk - Homepage
Title
Cited by
Cited by
Year
A smart contract for boardroom voting with maximum voter privacy
P McCorry, SF Shahandashti, F Hao
International conference on financial cryptography and data security, 357-375, 2017
7382017
Threshold attribute-based signatures and their application to anonymous credential systems
SF Shahandashti, R Safavi-Naini
International conference on cryptology in Africa, 198-216, 2009
2992009
Towards bitcoin payment networks
P McCorry, M Möser, SF Shahandasti, F Hao
Australasian conference on information security and privacy, 57-76, 2016
1212016
Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts
DH Phan, D Pointcheval, SF Shahandashti, M Strefler
International journal of information security 12 (4), 251-265, 2013
1112013
Stealing PINs via mobile sensors: actual risk versus user perception
M Mehrnezhad, E Toreini, SF Shahandashti, F Hao
International Journal of Information Security 17 (3), 291-313, 2018
952018
Attribute-based encryption without key cloning
MJ Hinek, S Jiang, R Safavi-Naini, SF Shahandashti
International Journal of Applied Cryptography 2 (3), 250-270, 2012
932012
Every Vote Counts: Ensuring Integrity in {Large-Scale} Electronic Voting
F Hao, MN Kreeger, B Randell, D Clarke, SF Shahandashti, PHJ Lee
2014 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections …, 2014
782014
Accept all: The landscape of cookie banners in Greece and the UK
G Kampanos, SF Shahandashti
IFIP International Conference on ICT Systems Security and Privacy Protection …, 2021
732021
Touchsignatures: identification of user touch actions and PINs based on mobile sensor data via javascript
M Mehrnezhad, E Toreini, SF Shahandashti, F Hao
Journal of Information Security and Applications 26, 23-38, 2016
692016
DRE-ip: a verifiable e-voting scheme without tallying authorities
SF Shahandashti, F Hao
European Symposium on Research in Computer Security, 223-240, 2016
672016
SEAL: Sealed-bid auction without auctioneers
S Bag, F Hao, SF Shahandashti, IG Ray
IEEE Transactions on Information Forensics and Security 15, 2042-2052, 2019
662019
Refund attacks on Bitcoin’s payment protocol
P McCorry, SF Shahandashti, F Hao
International Conference on Financial Cryptography and Data Security, 581-599, 2016
582016
The SPEKE protocol revisited
F Hao, SF Shahandashti
International Conference on Research in Security Standardisation, 26-38, 2014
472014
A trust-based intrusion detection system for RPL networks: Detecting a combination of rank and blackhole attacks
PP Ioulianou, VG Vassilakis, SF Shahandashti
Journal of Cybersecurity and Privacy 2 (1), 124-153, 2022
462022
Battery draining attacks against edge computing nodes in IoT networks
R Smith, D Palin, PP Ioulianou, VG Vassilakis, SF Shahandashti
Cyber-Physical Systems 6 (2), 96-116, 2020
462020
Reconciling user privacy and implicit authentication for mobile devices
SF Shahandashti, R Safavi-Naini, NA Safa
Computers & Security 53, 215-233, 2015
462015
Texture to the rescue: Practical paper fingerprinting based on texture patterns
E Toreini, SF Shahandashti, F Hao
ACM Transactions on Privacy and Security (TOPS) 20 (3), 1-29, 2017
412017
Privacy-preserving implicit authentication
NA Safa, R Safavi-Naini, SF Shahandashti
IFIP International Information Security Conference, 471-484, 2014
412014
Private fingerprint matching
SF Shahandashti, R Safavi-Naini, P Ogunbona
Australasian Conference on Information Security and Privacy, 426-433, 2012
412012
On secure e-voting over blockchain
P McCorry, M Mehrnezhad, E Toreini, SF Shahandashti, F Hao
Digital Threats: Research and Practice (DTRAP) 2 (4), 1-13, 2021
362021
The system can't perform the operation now. Try again later.
Articles 1–20