| Multi-client Cloud-based Symmetric Searchable Encryption S Kasra Kermanshahi, J Liu, R Steinfeld, S Nepal, S Lai, R Loh, C Zuo IEEE Transactions on Dependable and Secure Computing, 2019 | 71 | 2019 |
| A survey on exotic signatures for post-quantum blockchain: Challenges and research directions M Buser, R Dowsley, M Esgin, C Gritti, S Kasra Kermanshahi, V Kuchta, ... ACM Computing Surveys 55 (12), 1-32, 2023 | 59 | 2023 |
| Chameleon Hash Time-Lock Contract for Privacy Preserving Payment Channel Networks B Yu, S Kasra Kermanshahi, A Sakzad, S Nepal International Conference on Provable Security, 303-318, 2019 | 52 | 2019 |
| Geometric range search on encrypted data with forward/backward security SK Kermanshahi, SF Sun, JK Liu, R Steinfeld, S Nepal, WF Lau, MHA Au IEEE Transactions on Dependable and Secure Computing 19 (1), 698-716, 2020 | 38 | 2020 |
| Multi-user cloud-based secure keyword search S Kasra Kermanshahi, JK Liu, R Steinfeld Australasian conference on information security and privacy, 227-247, 2017 | 38 | 2017 |
| Post-quantum verifiable random function from symmetric primitives in pos blockchain M Buser, R Dowsley, MF Esgin, S Kasra Kermanshahi, V Kuchta, JK Liu, ... European Symposium on Research in Computer Security, 25-45, 2022 | 35 | 2022 |
| Generic Multi-keyword Ranked Search on Encrypted Cloud Data S Kasra Kermanshahi, JK Liu, R Steinfeld, S Nepal European Symposium on Research in Computer Security, 322-343, 2019 | 22 | 2019 |
| Collaborative analysis of genomic data: vision and challenges S Jafarbeiki, R Gaire, A Sakzad, SK Kermanshahi, R Steinfeld 2021 IEEE 7th International Conference on Collaboration and Internet …, 2021 | 12 | 2021 |
| Privgendb: Efficient and privacy-preserving query executions over encrypted snp-phenotype database S Jafarbeiki, A Sakzad, SK Kermanshahi, R Gaire, R Steinfeld, S Lai, ... Informatics in Medicine Unlocked 31, 100988, 2022 | 11 | 2022 |
| A survey on resilient microgrid system from cybersecurity perspective Z Zhang, B Turnbull, SK Kermanshahi, H Pota, E Damiani, CY Yeun, J Hu Applied Soft Computing, 113088, 2025 | 9 | 2025 |
| A Verifiable and Efficient Symmetric Searchable Encryption Scheme for Dynamic Dataset With Forward and Backward Privacy X Zhu, J Zhou, Y Dai, P Shen, SK Kermanshahi, J Hu IEEE Transactions on Dependable and Secure Computing, 2024 | 9 | 2024 |
| A non-interactive multi-user protocol for private authorised query processing on genomic data S Jafarbeiki, A Sakzad, SK Kermanshahi, R Steinfeld, R Gaire, S Lai International Conference on Information Security, 70-94, 2021 | 6 | 2021 |
| A Taxonomy-Based Survey of EM-SCA and Implications for Multi-Robot Systems YM Ibrahim, SK Kermanshahi, K Kasmarik, J Hu IEEE Open Journal of the Computer Society, 2024 | 5 | 2024 |
| Geo-DRS: Geometric dynamic range search on spatial data with backward and content privacy SK Kermanshahi, R Dowsley, R Steinfeld, A Sakzad, JK Liu, S Nepal, X Yi European Symposium on Research in Computer Security, 24-43, 2021 | 5 | 2021 |
| An improved certificateless public key authentication scheme for mobile ad hoc networks over Elliptic Curves S Kasra-Kermanshahi, M Salleh Pattern Analysis, Intelligent Security and the Internet of Things, 327-334, 2015 | 5 | 2015 |
| An enhanced certificateless cryptosystem for mobile ad hoc networks S Kasra Kermanshahi, M Salleh 2014 International Symposium on Biometrics and Security Technologies (ISBAST …, 2014 | 5 | 2014 |
| UNSW-MG24: A Heterogeneous Dataset for Cybersecurity Analysis in Realistic Microgrid Systems Z Zhang, B Turnbull, SK Kermanshahi, H Pota, J Hu IEEE Open Journal of the Computer Society, 2025 | 4 | 2025 |
| Securely sharing outsourced IoT data: A secure access and privacy preserving keyword search scheme NH Sultan, SK Kermanshahi, HY Tran, S Lai, V Varadharajan, S Nepal, ... Ad Hoc Networks 158, 103478, 2024 | 4 | 2024 |
| A novel authentication scheme for mobile environments in the context of elliptic curve cryptography S Kasra-Kermanshahi, M Salleh 2015 International Conference on Computer, Communications, and Control …, 2015 | 4 | 2015 |
| Generative fuzzer-driven vulnerability detection in the Internet of Things networks MT Masud, N Koroniotis, M Keshk, B Turnbull, SK Kermanshahi, ... Applied Soft Computing 174, 112973, 2025 | 3 | 2025 |