Hossein Ghodosi
Hossein Ghodosi
Senior Lecturer, College of Business, Law and Governance, James Cook University
Verified email at jcu.edu.au
TitleCited byYear
Secret sharing in multilevel and compartmented groups
H Ghodosi, J Pieprzyk, R Safavi-Naini
Australasian Conference on Information Security and Privacy, 367-378, 1998
761998
Dynamic threshold cryptosystems
H Ghodosi, J Pieprzyk, R Safavi-Naini
Proceedings of PRAGOCRYPT 96, 370-379, 1996
451996
An anonymous and secure continuous double auction scheme
J Trevathan, H Ghodosi, W Read
Proceedings of the 39th Annual Hawaii International Conference on System …, 2006
262006
A self-certified group-oriented cryptosystem without a combiner
S Saeednia, H Ghodosi
Australasian Conference on Information Security and Privacy, 192-201, 1999
261999
Perfect secret sharing schemes from Room squares
GR Chaudhry, H Ghodosi, J Seberry
241998
Design issues for electronic auctions.
J Trevathan, W Read, H Ghodosi
ICETE, 340-347, 2005
232005
Repudiation of cheating and non-repudiation of Zhang’s proxy signature schemes
H Ghodosi, J Pieprzyk
Australasian Conference on Information Security and Privacy, 129-134, 1999
181999
Remarks on the multiple assignment secret sharing scheme
H Ghodosi, J Pieprzyk, R Safavi-Naini
International Conference on Information and Communications Security, 72-80, 1997
171997
Comments on Harn–Lin’s cheating detection scheme
H Ghodosi
Designs, Codes and Cryptography 60 (1), 63-66, 2011
162011
Modification to self-certified group-oriented cryptosystem without combiner
H Ghodosi, S Saeednia
Electronics Letters 37 (2), 86-87, 2001
162001
A proactive approach to preventing phishing attacks using Pshark
R Shah, J Trevathan, W Read, H Ghodosi
2009 Sixth International Conference on Information Technology: New …, 2009
142009
On construction of cumulative secret sharing schemes
H Ghodosi, J Pieprzyk, R Safavi-Naini, H Wang
Australasian Conference on Information Security and Privacy, 379-390, 1998
141998
Information Security and Privacy, Proceedings of 12th Australasian Conference, ACISP 2007
J Pieprzyk, H Ghodosi, E Dawson
Springer 4586, 1-11, 2007
112007
Information Security and Privacy, Proceedings of 12th Australasian Conference, ACISP 2007
J Pieprzyk, H Ghodosi, E Dawson
Springer 4586, 1-11, 2007
112007
Cryptosystems for hierarchical groups
H Ghodosi, J Pieprzyk, C Charnes, R Safavi-Naini
Australasian Conference on Information Security and Privacy, 275-286, 1996
111996
DRM's rights protection capability: a review
AC Prihandoko, B Litow, H Ghodosi
The First International Conference on Computational Science and Information …, 2012
102012
Cheating prevention in secret sharing
H Ghodosi, J Pieprzyk
Australasian Conference on Information Security and Privacy, 328-341, 2000
102000
Efficient batch authentication for hierarchical wireless sensor networks
J Trevathan, H Ghodosi, T Myers
2011 Seventh International Conference on Intelligent Sensors, Sensor …, 2011
82011
Overview of traitor tracing schemes
J Trevathan, H Ghodosi, B Litow
Communications of CCISA, Selected Topics of Cryptography and Information …, 2003
82003
Authentication of concast communication
M Al-Ibrahim, H Ghodosi, J Pieprzyk
International Conference on Cryptology in India, 185-198, 2002
82002
The system can't perform the operation now. Try again later.
Articles 1–20