Hossein Ghodosi
Hossein Ghodosi
Senior Lecturer, College of Business, Law and Governance, James Cook University
在 jcu.edu.au 的电子邮件经过验证
标题
引用次数
引用次数
年份
Secret sharing in multilevel and compartmented groups
H Ghodosi, J Pieprzyk, R Safavi-Naini
Australasian Conference on Information Security and Privacy, 367-378, 1998
911998
Dynamic threshold cryptosystems
H Ghodosi, J Pieprzyk, R Safavi-Naini
Proceedings of PRAGOCRYPT 96, 370-379, 1996
471996
An anonymous and secure continuous double auction scheme
J Trevathan, H Ghodosi, W Read
Proceedings of the 39th Annual Hawaii International Conference on System …, 2006
322006
A self-certified group-oriented cryptosystem without a combiner
S Saeednia, H Ghodosi
Australasian Conference on Information Security and Privacy, 192-201, 1999
271999
Design issues for electronic auctions.
J Trevathan, W Read, H Ghodosi
ICETE, 340-347, 2005
262005
Perfect secret sharing schemes from Room squares
GR Chaudhry, H Ghodosi, J Seberry
251998
How to prevent cheating in Pinch's scheme
H Ghodosi, J Pieprzyk, GR Chaudhry, J Seberry
Electronics Letters 33 (17), 1453-1454, 1997
241997
A proactive approach to preventing phishing attacks using Pshark
R Shah, J Trevathan, W Read, H Ghodosi
2009 Sixth International Conference on Information Technology: New …, 2009
202009
Repudiation of cheating and non-repudiation of Zhang’s proxy signature schemes
H Ghodosi, J Pieprzyk
Australasian Conference on Information Security and Privacy, 129-134, 1999
201999
Remarks on the multiple assignment secret sharing scheme
H Ghodosi, J Pieprzyk, R Safavi-Naini
International Conference on Information and Communications Security, 72-80, 1997
201997
Comments on Harn–Lin’s cheating detection scheme
H Ghodosi
Designs, Codes and Cryptography 60 (1), 63-66, 2011
172011
Modification to self-certified group-oriented cryptosystem without combiner
H Ghodosi, S Saeednia
Electronics Letters 37 (2), 86-87, 2001
162001
On construction of cumulative secret sharing schemes
H Ghodosi, J Pieprzyk, R Safavi-Naini, H Wang
Australasian Conference on Information Security and Privacy, 379-390, 1998
151998
Multi-party computation with conversion of secret sharing
H Ghodosi, J Pieprzyk, R Steinfeld
Designs, Codes and Cryptography 62 (3), 259-272, 2012
122012
Multi-party computation with conversion of secret sharing
H Ghodosi, J Pieprzyk, R Steinfeld
Designs, Codes and Cryptography 62 (3), 259-272, 2012
122012
DRM's rights protection capability: a review
AC Prihandoko, B Litow, H Ghodosi
The First International Conference on Computational Science and Information …, 2012
122012
Cryptosystems for hierarchical groups
H Ghodosi, J Pieprzyk, C Charnes, R Safavi-Naini
Australasian Conference on Information Security and Privacy, 275-286, 1996
121996
Information Security and Privacy, Proceedings of 12th Australasian Conference, ACISP 2007
J Pieprzyk, H Ghodosi, E Dawson
Springer 4586, 1-11, 2007
112007
Information Security and Privacy, Proceedings of 12th Australasian Conference, ACISP 2007
J Pieprzyk, H Ghodosi, E Dawson
Springer 4586, 1-11, 2007
112007
Cheating prevention in secret sharing
H Ghodosi, J Pieprzyk
Australasian Conference on Information Security and Privacy, 328-341, 2000
102000
系统目前无法执行此操作,请稍后再试。
文章 1–20