Reihaneh Safavi -Naini
Reihaneh Safavi -Naini
Verified email at ucalgary.ca
Title
Cited by
Cited by
Year
Digital rights management for content distribution
Q Liu, R Safavi-Naini, NP Sheppard
Proceedings of the Australasian information security workshop conference on …, 2003
6052003
An efficient signature scheme from bilinear pairings and its applications
F Zhang, R Safavi-Naini, W Susilo
International Workshop on Public Key Cryptography, 277-290, 2004
5872004
Public key encryption with keyword search revisited
J Baek, R Safavi-Naini, W Susilo
International conference on Computational Science and Its Applications, 1249 …, 2008
5162008
Privacy preserving EHR system using attribute-based infrastructure
S Narayan, M Gagné, R Safavi-Naini
Proceedings of the 2010 ACM workshop on Cloud computing security workshop, 47-52, 2010
3052010
Certificateless public key encryption without pairing
J Baek, R Safavi-Naini, W Susilo
International conference on information security, 134-148, 2005
2682005
Threshold attribute-based signatures and their application to anonymous credential systems
SF Shahandashti, R Safavi-Naini
International Conference on Cryptology in Africa, 198-216, 2009
2252009
Cancelable key-based fingerprint templates
R Ang, R Safavi-Naini, L McAven
Australasian conference on information security and privacy, 242-252, 2005
2172005
Efficient multi-receiver identity-based encryption and its application to broadcast encryption
J Baek, R Safavi-Naini, W Susilo
International workshop on public key cryptography, 380-397, 2005
2052005
Digital License Sharing System and Method
Q Liu, R Safavi-Naini, N Sheppard
US Patent App. 10/599,517, 2007
1922007
Cryptographic hash functions: A survey
S Bakhtiari, R Safavi-Naini, J Pieprzyk
Technical Report 95-09, Department of Computer Science, University of Wollongong, 1995
1921995
Efficient verifiably encrypted signature and partially blind signature from bilinear pairings
F Zhang, R Safavi-Naini, W Susilo
International Conference on Cryptology in India, 191-204, 2003
1762003
New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairing.
F Zhang, R Safavi-Naini, CY Lin
IACR Cryptol. ePrint Arch. 2003, 104, 2003
1402003
A survey of identity-based cryptography
J Baek, J Newmarch, R Safavi-Naini, W Susilo
Proc. of Australian Unix Users Group Annual Conference, 95-102, 2004
1302004
On the integration of public key data encryption and public key encryption with keyword search
J Baek, R Safavi-Naini, W Susilo
International Conference on Information Security, 217-232, 2006
1212006
Linear authentication codes: bounds and constructions
H Wang, C Xing, R Safavi-Naini
IEEE Transactions on Information Theory 49 (4), 866-872, 2003
1082003
Sequential traitor tracing
R Safavi-Naini, Y Wang
IEEE Transactions on Information Theory 49 (5), 1319-1326, 2003
952003
Web filtering using text classification
R Du, R Safavi-Naini, W Susilo
The 11th IEEE International Conference on Networks, 2003. ICON2003., 325-330, 2003
942003
Collusion secure q-ary fingerprinting for perceptual content
R Safavi-Naini, Y Wang
ACM Workshop on Digital Rights Management, 57-75, 2001
912001
On multiple watermarking
NP Sheppard, R Safavi-Naini, P Ogunbona
Proceedings of the 2001 workshop on Multimedia and security: new challenges, 3-6, 2001
892001
Threshold attribute-based signcryption
M Gagné, S Narayan, R Safavi-Naini
International Conference on Security and Cryptography for Networks, 154-171, 2010
882010
The system can't perform the operation now. Try again later.
Articles 1–20