Secret sharing in multilevel and compartmented groups H Ghodosi, J Pieprzyk, R Safavi-Naini Australasian Conference on Information Security and Privacy, 367-378, 1998 | 84 | 1998 |
Dynamic threshold cryptosystems H Ghodosi, J Pieprzyk, R Safavi-Naini Proceedings of PRAGOCRYPT 96, 370-379, 1996 | 46 | 1996 |
An anonymous and secure continuous double auction scheme J Trevathan, H Ghodosi, W Read Proceedings of the 39th Annual Hawaii International Conference on System …, 2006 | 32 | 2006 |
Design issues for electronic auctions. J Trevathan, W Read, H Ghodosi ICETE, 340-347, 2005 | 25 | 2005 |
A self-certified group-oriented cryptosystem without a combiner S Saeednia, H Ghodosi Australasian Conference on Information Security and Privacy, 192-201, 1999 | 25 | 1999 |
Perfect secret sharing schemes from Room squares GR Chaudhry, H Ghodosi, J Seberry | 25 | 1998 |
Repudiation of cheating and non-repudiation of Zhang’s proxy signature schemes H Ghodosi, J Pieprzyk Australasian Conference on Information Security and Privacy, 129-134, 1999 | 20 | 1999 |
Remarks on the multiple assignment secret sharing scheme H Ghodosi, J Pieprzyk, R Safavi-Naini International Conference on Information and Communications Security, 72-80, 1997 | 20 | 1997 |
A proactive approach to preventing phishing attacks using Pshark R Shah, J Trevathan, W Read, H Ghodosi 2009 Sixth International Conference on Information Technology: New …, 2009 | 19 | 2009 |
Comments on Harn–Lin’s cheating detection scheme H Ghodosi Designs, Codes and Cryptography 60 (1), 63-66, 2011 | 16 | 2011 |
Modification to self-certified group-oriented cryptosystem without combiner H Ghodosi, S Saeednia Electronics Letters 37 (2), 86-87, 2001 | 16 | 2001 |
On construction of cumulative secret sharing schemes H Ghodosi, J Pieprzyk, R Safavi-Naini, H Wang Australasian Conference on Information Security and Privacy, 379-390, 1998 | 14 | 1998 |
DRM's rights protection capability: a review AC Prihandoko, B Litow, H Ghodosi The First International Conference on Computational Science and Information …, 2012 | 12 | 2012 |
Information Security and Privacy, Proceedings of 12th Australasian Conference, ACISP 2007 J Pieprzyk, H Ghodosi, E Dawson Springer 4586, 1-11, 2007 | 12 | 2007 |
Information Security and Privacy, Proceedings of 12th Australasian Conference, ACISP 2007 J Pieprzyk, H Ghodosi, E Dawson Springer 4586, 1-11, 2007 | 12 | 2007 |
Multi-party computation with conversion of secret sharing H Ghodosi, J Pieprzyk, R Steinfeld Designs, Codes and Cryptography 62 (3), 259-272, 2012 | 11 | 2012 |
Multi-party computation with conversion of secret sharing H Ghodosi, J Pieprzyk, R Steinfeld Designs, Codes and Cryptography 62 (3), 259-272, 2012 | 11 | 2012 |
Cheating prevention in secret sharing H Ghodosi, J Pieprzyk Australasian Conference on Information Security and Privacy, 328-341, 2000 | 10 | 2000 |
Cryptosystems for hierarchical groups H Ghodosi, J Pieprzyk, C Charnes, R Safavi-Naini Australasian Conference on Information Security and Privacy, 275-286, 1996 | 10 | 1996 |
On insecurity of Naor–Pinkas' distributed oblivious transfer H Ghodosi Information Processing Letters 104 (5), 179-182, 2007 | 9 | 2007 |