[go: up one dir, main page]

Follow
Shabnam Kasra Kermanshahi
Shabnam Kasra Kermanshahi
Senior Lecturer, UNSW
Verified email at adfa.edu.au
Title
Cited by
Cited by
Year
Multi-client Cloud-based Symmetric Searchable Encryption
S Kasra Kermanshahi, J Liu, R Steinfeld, S Nepal, S Lai, R Loh, C Zuo
IEEE Transactions on Dependable and Secure Computing, 2019
712019
A survey on exotic signatures for post-quantum blockchain: Challenges and research directions
M Buser, R Dowsley, M Esgin, C Gritti, S Kasra Kermanshahi, V Kuchta, ...
ACM Computing Surveys 55 (12), 1-32, 2023
592023
Chameleon Hash Time-Lock Contract for Privacy Preserving Payment Channel Networks
B Yu, S Kasra Kermanshahi, A Sakzad, S Nepal
International Conference on Provable Security, 303-318, 2019
522019
Geometric range search on encrypted data with forward/backward security
SK Kermanshahi, SF Sun, JK Liu, R Steinfeld, S Nepal, WF Lau, MHA Au
IEEE Transactions on Dependable and Secure Computing 19 (1), 698-716, 2020
382020
Multi-user cloud-based secure keyword search
S Kasra Kermanshahi, JK Liu, R Steinfeld
Australasian conference on information security and privacy, 227-247, 2017
382017
Post-quantum verifiable random function from symmetric primitives in pos blockchain
M Buser, R Dowsley, MF Esgin, S Kasra Kermanshahi, V Kuchta, JK Liu, ...
European Symposium on Research in Computer Security, 25-45, 2022
352022
Generic Multi-keyword Ranked Search on Encrypted Cloud Data
S Kasra Kermanshahi, JK Liu, R Steinfeld, S Nepal
European Symposium on Research in Computer Security, 322-343, 2019
222019
Collaborative analysis of genomic data: vision and challenges
S Jafarbeiki, R Gaire, A Sakzad, SK Kermanshahi, R Steinfeld
2021 IEEE 7th International Conference on Collaboration and Internet …, 2021
122021
Privgendb: Efficient and privacy-preserving query executions over encrypted snp-phenotype database
S Jafarbeiki, A Sakzad, SK Kermanshahi, R Gaire, R Steinfeld, S Lai, ...
Informatics in Medicine Unlocked 31, 100988, 2022
112022
A survey on resilient microgrid system from cybersecurity perspective
Z Zhang, B Turnbull, SK Kermanshahi, H Pota, E Damiani, CY Yeun, J Hu
Applied Soft Computing, 113088, 2025
92025
A Verifiable and Efficient Symmetric Searchable Encryption Scheme for Dynamic Dataset With Forward and Backward Privacy
X Zhu, J Zhou, Y Dai, P Shen, SK Kermanshahi, J Hu
IEEE Transactions on Dependable and Secure Computing, 2024
92024
A non-interactive multi-user protocol for private authorised query processing on genomic data
S Jafarbeiki, A Sakzad, SK Kermanshahi, R Steinfeld, R Gaire, S Lai
International Conference on Information Security, 70-94, 2021
62021
A Taxonomy-Based Survey of EM-SCA and Implications for Multi-Robot Systems
YM Ibrahim, SK Kermanshahi, K Kasmarik, J Hu
IEEE Open Journal of the Computer Society, 2024
52024
Geo-DRS: Geometric dynamic range search on spatial data with backward and content privacy
SK Kermanshahi, R Dowsley, R Steinfeld, A Sakzad, JK Liu, S Nepal, X Yi
European Symposium on Research in Computer Security, 24-43, 2021
52021
An improved certificateless public key authentication scheme for mobile ad hoc networks over Elliptic Curves
S Kasra-Kermanshahi, M Salleh
Pattern Analysis, Intelligent Security and the Internet of Things, 327-334, 2015
52015
An enhanced certificateless cryptosystem for mobile ad hoc networks
S Kasra Kermanshahi, M Salleh
2014 International Symposium on Biometrics and Security Technologies (ISBAST …, 2014
52014
UNSW-MG24: A Heterogeneous Dataset for Cybersecurity Analysis in Realistic Microgrid Systems
Z Zhang, B Turnbull, SK Kermanshahi, H Pota, J Hu
IEEE Open Journal of the Computer Society, 2025
42025
Securely sharing outsourced IoT data: A secure access and privacy preserving keyword search scheme
NH Sultan, SK Kermanshahi, HY Tran, S Lai, V Varadharajan, S Nepal, ...
Ad Hoc Networks 158, 103478, 2024
42024
A novel authentication scheme for mobile environments in the context of elliptic curve cryptography
S Kasra-Kermanshahi, M Salleh
2015 International Conference on Computer, Communications, and Control …, 2015
42015
Generative fuzzer-driven vulnerability detection in the Internet of Things networks
MT Masud, N Koroniotis, M Keshk, B Turnbull, SK Kermanshahi, ...
Applied Soft Computing 174, 112973, 2025
32025
The system can't perform the operation now. Try again later.
Articles 1–20