Hossein Ghodosi
Hossein Ghodosi
Senior Lecturer, College of Business, Law and Governance, James Cook University
Verified email at jcu.edu.au
Title
Cited by
Cited by
Year
Secret sharing in multilevel and compartmented groups
H Ghodosi, J Pieprzyk, R Safavi-Naini
Australasian Conference on Information Security and Privacy, 367-378, 1998
911998
Dynamic threshold cryptosystems
H Ghodosi, J Pieprzyk, R Safavi-Naini
Proceedings of PRAGOCRYPT 96, 370-379, 1996
451996
An anonymous and secure continuous double auction scheme
J Trevathan, H Ghodosi, W Read
Proceedings of the 39th Annual Hawaii International Conference on System …, 2006
322006
Design issues for electronic auctions.
J Trevathan, W Read, H Ghodosi
ICETE, 340-347, 2005
262005
A self-certified group-oriented cryptosystem without a combiner
S Saeednia, H Ghodosi
Australasian Conference on Information Security and Privacy, 192-201, 1999
251999
Perfect secret sharing schemes from Room squares
GR Chaudhry, H Ghodosi, J Seberry
251998
How to prevent cheating in Pinch's scheme
H Ghodosi, J Pieprzyk, GR Chaudhry, J Seberry
Electronics Letters 33 (17), 1453-1454, 1997
241997
A proactive approach to preventing phishing attacks using Pshark
R Shah, J Trevathan, W Read, H Ghodosi
2009 Sixth International Conference on Information Technology: New …, 2009
202009
Repudiation of cheating and non-repudiation of Zhang’s proxy signature schemes
H Ghodosi, J Pieprzyk
Australasian Conference on Information Security and Privacy, 129-134, 1999
201999
Remarks on the multiple assignment secret sharing scheme
H Ghodosi, J Pieprzyk, R Safavi-Naini
International Conference on Information and Communications Security, 72-80, 1997
201997
Comments on Harn–Lin’s cheating detection scheme
H Ghodosi
Designs, Codes and Cryptography 60 (1), 63-66, 2011
172011
Modification to self-certified group-oriented cryptosystem without combiner
H Ghodosi, S Saeednia
Electronics Letters 37 (2), 86-87, 2001
162001
On construction of cumulative secret sharing schemes
H Ghodosi, J Pieprzyk, R Safavi-Naini, H Wang
Australasian Conference on Information Security and Privacy, 379-390, 1998
151998
Multi-party computation with conversion of secret sharing
H Ghodosi, J Pieprzyk, R Steinfeld
Designs, Codes and Cryptography 62 (3), 259-272, 2012
122012
Multi-party computation with conversion of secret sharing
H Ghodosi, J Pieprzyk, R Steinfeld
Designs, Codes and Cryptography 62 (3), 259-272, 2012
122012
DRM's rights protection capability: a review
AC Prihandoko, B Litow, H Ghodosi
The First International Conference on Computational Science and Information …, 2012
122012
Cryptosystems for hierarchical groups
H Ghodosi, J Pieprzyk, C Charnes, R Safavi-Naini
Australasian Conference on Information Security and Privacy, 275-286, 1996
121996
Information Security and Privacy, Proceedings of 12th Australasian Conference, ACISP 2007
J Pieprzyk, H Ghodosi, E Dawson
Springer 4586, 1-11, 2007
112007
Information Security and Privacy, Proceedings of 12th Australasian Conference, ACISP 2007
J Pieprzyk, H Ghodosi, E Dawson
Springer 4586, 1-11, 2007
112007
Cheating prevention in secret sharing
H Ghodosi, J Pieprzyk
Australasian Conference on Information Security and Privacy, 328-341, 2000
102000
The system can't perform the operation now. Try again later.
Articles 1–20