Follow
Reihaneh Safavi -Naini
Reihaneh Safavi -Naini
Verified email at ucalgary.ca
Title
Cited by
Cited by
Year
An efficient signature scheme from bilinear pairings and its applications
F Zhang, R Safavi-Naini, W Susilo
Public Key Cryptography–PKC 2004: 7th International Workshop on Theory andá…, 2004
7072004
Public key encryption with keyword search revisited
J Baek, R Safavi-Naini, W Susilo
Computational Science and Its Applications–ICCSA 2008: Internationalá…, 2008
6672008
Digital rights management for content distribution
Q Liu, R Safavi-Naini, NP Sheppard
Conferences in Research and Practice in Information Technology Series 34, 49-58, 2003
6522003
Privacy preserving EHR system using attribute-based infrastructure
S Narayan, M GagnÚ, R Safavi-Naini
Proceedings of the 2010 ACM workshop on Cloud computing security workshop, 47-52, 2010
3662010
Certificateless public key encryption without pairing
J Baek, R Safavi-Naini, W Susilo
Information Security: 8th International Conference, ISC 2005, Singaporeá…, 2005
2942005
Threshold attribute-based signatures and their application to anonymous credential systems
SF Shahandashti, R Safavi-Naini
Progress in Cryptology–AFRICACRYPT 2009: Second International Conference oná…, 2009
2732009
Cancelable key-based fingerprint templates
R Ang, R Safavi-Naini, L McAven
Information Security and Privacy: 10th Australasian Conference, ACISP 2005á…, 2005
2412005
Efficient multi-receiver identity-based encryption and its application to broadcast encryption
J Baek, R Safavi-Naini, W Susilo
Public Key Cryptography-PKC 2005: 8th International Workshop on Theory andá…, 2005
2392005
Cryptographic hash functions: A survey
S Bakhtiari, R Safavi-Naini, J Pieprzyk
Technical Report 95-09, Department of Computer Science, University of Wollongong, 1995
2121995
Digital License Sharing System and Method
Q Liu, R Safavi-Naini, N Sheppard
US Patent App. 10/599,517, 2007
2022007
Efficient verifiably encrypted signature and partially blind signature from bilinear pairings
F Zhang, R Safavi-Naini, W Susilo
Progress in Cryptology-INDOCRYPT 2003: 4th International Conference oná…, 2003
1952003
New proxy signature, proxy blind signature and proxy ring signature schemes from bilinear pairing
F Zhang, R Safavi-Naini, CY Lin
Cryptology ePrint Archive, 2003
1522003
A survey of identity-based cryptography
J Baek, J Newmarch, R Safavi-Naini, W Susilo
Proc. of Australian Unix Users Group Annual Conference, 95-102, 2004
1502004
On the integration of public key data encryption and public key encryption with keyword search
J Baek, R Safavi-Naini, W Susilo
Information Security: 9th International Conference, ISC 2006, Samos Islandá…, 2006
1422006
Linear authentication codes: bounds and constructions
H Wang, C Xing, R Safavi-Naini
IEEE Transactions on Information Theory 49 (4), 866-872, 2003
1222003
Threshold attribute-based signcryption
M GagnÚ, S Narayan, R Safavi-Naini
Security and Cryptography for Networks: 7th International Conference, SCNá…, 2010
1122010
Web filtering using text classification
R Du, R Safavi-Naini, W Susilo
The 11th IEEE International Conference on Networks, 2003. ICON2003., 325-330, 2003
1042003
Sequential traitor tracing
R Safavi-Naini, Y Wang
IEEE Transactions on Information Theory 49 (5), 1319-1326, 2003
1042003
Collusion Secure q-ary Fingerprinting for Perceptual Content
R Safavi-Naini, Y Wang
Security and Privacy in Digital Rights Management: ACM CCS-8 Workshop DRMá…, 2002
962002
Multireceiver authentication codes: models, bounds, constructions, and extensions
R Safavi-Naini, H Wang
Information and Computation 151 (1-2), 148-172, 1999
941999
The system can't perform the operation now. Try again later.
Articles 1–20