[go: up one dir, main page]

Follow
Esfandiar Mohammadi
Title
Cited by
Cited by
Year
AnoA: A Framework For Analyzing Anonymous Communication Protocols
M Backes, A Kate, P Manoharan, S Meiser, E Mohammadi
26th IEEE Computer Security Foundations Symposium (CSF), 163-178, 2013
1482013
Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency—Choose Two
D Das, S Meiser, E Mohammadi, A Kate
IEEE Symposium on Security and Privacy (SP), 2018
1362018
Privacy Loss Classes: The Central Limit Theorem in Differential Privacy
DM Sommer, S Meiser, E Mohammadi
Proceedings on Privacy Enhancing Technologies 2019 (2), 245-269, 2019
1092019
Responsible and regulatory conform machine learning for medicine: a survey of challenges and solutions
E Petersen, Y Potdevin, E Mohammadi, S Zidowitz, S Breyer, D Nowotka, ...
IEEE Access 10, 58375-58418, 2022
852022
Provably secure and practical onion routing
M Backes, I Goldberg, A Kate, E Mohammadi
2012 IEEE 25th Computer Security Foundations Symposium, 369-385, 2012
832012
(Nothing else) MATor (s): Monitoring the Anonymity of Tor's Path Selection
M Backes, A Kate, S Meiser, E Mohammadi
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
672014
Tight on Budget? Tight Bounds for r-Fold Approximate Differential Privacy
M Meiser, E Mohammadi
25th ACM Conference on Computer and Communications Security (CCS 2018), 2018
642018
Computationally sound abstraction and verification of secure multi-party computations
M Backes, M Maffei, E Mohammadi
Conference on Foundations of Software Technology and Theoretical Computer …, 2010
412010
Ace: an efficient key-exchange protocol for onion routing
M Backes, A Kate, E Mohammadi
ACM Workshop on Privacy in the Electronic Society (WPES), 55-64, 2012
362012
TUC: Time-sensitive and Modular Analysis of Anonymous Communication
M Backes, P Manoharan, E Mohammadi
IEEE Computer Security Foundations Symposium (CSF), 2014
322014
Comprehensive anonymity trilemma: User coordination is not enough
D Das, S Meiser, E Mohammadi, A Kate
Proceedings on Privacy Enhancing Technologies, 2020
242020
Computational soundness results for ProVerif: bridging the gap from trace properties to uniformity
M Backes, E Mohammadi, T Ruffing
International Conference on Principles of Security and Trust, 42-62, 2014
20*2014
Challenges for AI in healthcare systems
M Bertl, Y Lamo, M Leucker, T Margaria, E Mohammadi, SK Mukhiya, ...
International Conference on Bridging the Gap between AI and Reality, 165-186, 2023
192023
Symbolic Malleable Zero-Knowledge Proofs
M Backes, F Bendun, M Maffei, E Mohammadi, K Pecina
Computer Security Foundations Symposium (CSF), 2015 IEEE 28th, 412-426, 2015
18*2015
Differential privacy with partial knowledge
D Desfontaines, E Mohammadi, E Krahmer, D Basin
arXiv preprint arXiv:1905.00650, 2019
172019
Privacy-Preserving Accountable Computation
M Backes, D Fiore, E Mohammadi
18th European Symposium on Research in Computer Security (ESORICS), 38--56, 2013
172013
Divide and funnel: a scaling technique for mix-networks
D Das, S Meiser, E Mohammadi, A Kate
2024 IEEE 37th Computer Security Foundations Symposium (CSF), 49-64, 2024
132024
MixFlow: Assessing Mixnets Anonymity with Contrastive Architectures and Semantic Network Information
R Attarian, E Mohammadi, T Wang, EH Beni
Cryptology ePrint Archive, 2023
92023
Learning Numeric Optimal Differentially Private Truncated Additive Mechanisms
DM Sommer, L Abfalterer, S Zingg, E Mohammadi
arXiv preprint arXiv:2107.12957, 2021
52021
Computational Soundness for Dalvik Bytecode
M Backes, R Künnemann, E Mohammadi
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
52016
The system can't perform the operation now. Try again later.
Articles 1–20