Secret sharing in multilevel and compartmented groups H Ghodosi, J Pieprzyk, R Safavi-Naini Information Security and Privacy: Third Australasian Conference, ACISP’98 …, 1998 | 109 | 1998 |
Dynamic threshold cryptosystems H Ghodosi, J Pieprzyk, R Safavi-Naini Proceedings of PRAGOCRYPT 96, 370-379, 1996 | 46 | 1996 |
An anonymous and secure continuous double auction scheme J Trevathan, H Ghodosi, W Read Proceedings of the 39th Annual Hawaii International Conference on System …, 2006 | 31 | 2006 |
Design issues for electronic auctions. J Trevathan, W Read, H Ghodosi ICETE, 340-347, 2005 | 28 | 2005 |
Perfect secret sharing schemes from Room squares GR Chaudhry, H Ghodosi, J Seberry | 28 | 1998 |
A self-certified group-oriented cryptosystem without a combiner S Saeednia, H Ghodosi Information Security and Privacy: 4th Australasian Conference, ACISP’99 …, 1999 | 26 | 1999 |
Comments on Harn–Lin’s cheating detection scheme H Ghodosi Designs, Codes and Cryptography 60, 63-66, 2011 | 24 | 2011 |
How to prevent cheating in Pinch's scheme G Hossein, J Pieprzyk, G Chaundhry, J Seberry | 23 | 1997 |
Repudiation of cheating and non-repudiation of Zhang’s proxy signature schemes H Ghodosi, J Pieprzyk Information Security and Privacy: 4th Australasian Conference, ACISP’99 …, 1999 | 21 | 1999 |
A proactive approach to preventing phishing attacks using Pshark R Shah, J Trevathan, W Read, H Ghodosi 2009 Sixth International Conference on Information Technology: New …, 2009 | 20 | 2009 |
Remarks on the multiple assignment secret sharing scheme H Ghodosi, J Pieprzyk, R Safavi-Naini Information and Communications Security: First International Conference …, 1997 | 20 | 1997 |
Multi-party computation with conversion of secret sharing H Ghodosi, J Pieprzyk, R Steinfeld Designs, Codes and Cryptography 62, 259-272, 2012 | 19 | 2012 |
Information Security and Privacy, Proceedings of 12th Australasian Conference, ACISP 2007 J Pieprzyk, H Ghodosi, E Dawson Springer 4586, 1-11, 2007 | 17* | 2007 |
An entropy-based demonstration of the security of Shamir's secret sharing scheme CLF Corniaux, H Ghodosi 2014 International Conference on Information Science, Electronics and …, 2014 | 16 | 2014 |
Modification to self-certified group-oriented cryptosystem without combiner H Ghodosi, S Saeednia Electronics Letters 37, 86-87, 2001 | 16 | 2001 |
On construction of cumulative secret sharing schemes H Ghodosi, J Pieprzyk, R Safavi-Naini, H Wang Information Security and Privacy: Third Australasian Conference, ACISP’98 …, 1998 | 14 | 1998 |
DRM's rights protection capability: a review AC Prihandoko, B Litow, H Ghodosi The First International Conference on Computational Science and Information …, 2012 | 12 | 2012 |
Cryptosystems for hierarchical groups H Ghodosi, J Pieprzyk, C Charnes, R Safavi-Naini Information Security and Privacy: First Australasian Conference, ACISP'96 …, 1996 | 12 | 1996 |
Security and privacy problems in voice assistant applications: A survey J Li, C Chen, MR Azghadi, H Ghodosi, L Pan, J Zhang Computers & Security 134, 103448, 2023 | 11 | 2023 |
Cheating prevention in secret sharing H Ghodosi, J Pieprzyk Australasian Conference on Information Security and Privacy, 328-341, 2000 | 11 | 2000 |