Homomorphic secret sharing from paillier encryption N Fazio, R Gennaro, T Jafarikhah, WE Skeith
Provable Security: 11th International Conference, ProvSec 2017, Xi'an, China …, 2017
54 2017 Traditional countermeasures to unwanted email H Siadati, S Jafarikhah, M Jakobsson
Understanding social engineering based scams, 51-62, 2016
19 2016 The Riesz Representation Operator on the Dual of C [0; 1] is Computable. T Jafarikhah, K Weihrauch
J. Univers. Comput. Sci. 19 (6), 750-770, 2013
6 2013 Computable Jordan decomposition of linear continuous functionals on C [0; 1] T Jafarikhah, K Weihrauch
Log. Methods Comput. Sci 10 (3), 13, 2014
5 2014 Publicly evaluatable perceptual hashing R Gennaro, D Hadaller, T Jafarikhah, Z Liu, WE Skeith, A Timashova
Applied Cryptography and Network Security: 18th International Conference …, 2020
2 2020 Computable Jordan Decomposition of Linear Continuous Functionals on K Weihrauch, T Jafarikhah
Logical Methods in Computer Science 10, 2014
2 2014 DevPhish: Exploring Social Engineering in Software Supply Chain Attacks on Developers H Siadati, S Jafarikhah, E Sahin, TB Hernandez, EL Tripp, D Khryashchev
arXiv preprint arXiv:2402.18401, 2024
2024 Exploring the Threat of Software Supply Chain Attacks on Containerized Applications M Mounesan, S Siadati, Hossein, Jafarikhah
6th International Conference on Security of Information and Networks, 2023
2023 Efficient Protocols for Multi-Party Computation T Jafarikhah
City University of New York, 2021
2021 Efficient Virtual Machine Provisioning Techniques in Cloud Computing: A Systematic Review K Kaushik, G Sharma, G Chhabra, A Vishnoi, P Narooka, C Pavel, ...
Computable Riesz Representation on The Dual of C [0; 1]) Revisited T Jafarikhah, K Weihrauch