Folgen
Hossein Ghodosi
Hossein Ghodosi
Senior Lecturer, College of Business, Law and Governance, James Cook University
Bestätigte E-Mail-Adresse bei jcu.edu.au
Titel
Zitiert von
Zitiert von
Jahr
Secret sharing in multilevel and compartmented groups
H Ghodosi, J Pieprzyk, R Safavi-Naini
Information Security and Privacy: Third Australasian Conference, ACISP’98 …, 1998
1061998
Dynamic threshold cryptosystems
H Ghodosi, J Pieprzyk, R Safavi-Naini
Proceedings of PRAGOCRYPT 96, 370-379, 1996
451996
An anonymous and secure continuous double auction scheme
J Trevathan, H Ghodosi, W Read
Proceedings of the 39th Annual Hawaii International Conference on System …, 2006
312006
Design issues for electronic auctions.
J Trevathan, W Read, H Ghodosi
ICETE, 340-347, 2005
292005
A self-certified group-oriented cryptosystem without a combiner
S Saeednia, H Ghodosi
Information Security and Privacy: 4th Australasian Conference, ACISP’99 …, 1999
261999
Perfect secret sharing schemes from Room squares
GR Chaudhry, H Ghodosi, J Seberry
261998
Comments on Harn–Lin’s cheating detection scheme
H Ghodosi
Designs, Codes and Cryptography 60, 63-66, 2011
242011
How to prevent cheating in Pinch's scheme
G Hossein, J Pieprzyk, G Chaundhry, J Seberry
231997
Repudiation of cheating and non-repudiation of Zhang’s proxy signature schemes
H Ghodosi, J Pieprzyk
Information Security and Privacy: 4th Australasian Conference, ACISP’99 …, 1999
211999
A proactive approach to preventing phishing attacks using Pshark
R Shah, J Trevathan, W Read, H Ghodosi
2009 Sixth International Conference on Information Technology: New …, 2009
202009
Remarks on the multiple assignment secret sharing scheme
H Ghodosi, J Pieprzyk, R Safavi-Naini
Information and Communications Security: First International Conference …, 1997
201997
Multi-party computation with conversion of secret sharing
H Ghodosi, J Pieprzyk, R Steinfeld
Designs, Codes and Cryptography 62, 259-272, 2012
172012
Multi-party computation with conversion of secret sharing
H Ghodosi, J Pieprzyk, R Steinfeld
Designs, Codes and Cryptography 62, 259-272, 2012
172012
Information Security and Privacy, Proceedings of 12th Australasian Conference, ACISP 2007
J Pieprzyk, H Ghodosi, E Dawson
Springer 4586, 1-11, 2007
17*2007
An entropy-based demonstration of the security of Shamir's secret sharing scheme
CLF Corniaux, H Ghodosi
2014 International Conference on Information Science, Electronics and …, 2014
162014
Modification to self-certified group-oriented cryptosystem without combiner
H Ghodosi, S Saeednia
Electronics Letters 37, 86-87, 2001
162001
Information Security and Privacy, Proceedings of 12th Australasian Conference, ACISP 2007
J Pieprzyk, H Ghodosi, E Dawson
Springer 4586, 1-11, 2007
152007
On construction of cumulative secret sharing schemes
H Ghodosi, J Pieprzyk, R Safavi-Naini, H Wang
Information Security and Privacy: Third Australasian Conference, ACISP’98 …, 1998
141998
DRM's rights protection capability: a review
AC Prihandoko, B Litow, H Ghodosi
The First International Conference on Computational Science and Information …, 2012
122012
Cryptosystems for hierarchical groups
H Ghodosi, J Pieprzyk, C Charnes, R Safavi-Naini
Information Security and Privacy: First Australasian Conference, ACISP'96 …, 1996
121996
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20