Publications by: Hossein Ghodosi

Also publishes as (Hossien Ghodosi, H. Ghodosi)

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0 [feed] RSS 2.0
Number of items: 58.

Hamidi, Amirreza, and Ghodosi, Hossein (2023) Efficient Distributed Keys Generation of Threshold Paillier Cryptosystem. In: Lecture Notes in Computer Science (13809) pp. 117-132. From: SecITC 2022: 15th International Conference on Innovative Security Solutions for Information Technology and Communications, 8-9 December 2022, Virtual.

Hamidi, Amirreza, and Ghodosi, Hossein (2023) Fair Distributed Oblivious Polynomial Evaluation via Bitcoin Deposits: Compute-as-a-Service. In: Lecture Notes in Computer Science (14324) pp. 73-86. From: NordSEC 2023: Nordic Conference on Secure IT Systems, 16-17 November 2023, Oslo, Norway.

Hamidi, Amirreza, and Ghodosi, Hossein (2023) Outsourcing Verifiable Distributed Oblivious Polynomial Evaluation from Threshold Cryptography. In: Lecture Notes in Computer Science (14252) pp. 235-246. From: ICICS 2023: 25th International Conference on Information and Communications Security, 18-20 November 2023, Tianjin, China.

Li, Jingjin, Chen, Chao, Rahimi Azghadi, Mostafa, Ghodosi, Hossein, Pan, Lei, and Zhang, Jun (2023) Security and privacy problems in voice assistant applications: A survey. Computers & Security, 134. 103448.

Hamidi, Amirreza, and Ghodosi, Hossein (2023) Unconditionally Fast Secure Multi-party Computation with Multi-depths Gates Using Pre-computed Information. In: Lecture Notes in Networks and Systems (448) pp. 329-340. From: ICICT 2022: 7th International Congress on Information and Communication Technology, 21-24 February 2022, London, UK.

Li, Xiaonan, Ghodosi, Hossein, Chen, Chao, Sankupellay, Mangalam, and Lee, Ickjai (2022) Improving Network-Based Anomaly Detection in Smart Home Environment. Sensors, 22 (15). 5626.

Cianciullo, Louis, and Ghodosi, Hossein (2022) Unconditionally Secure Oblivious Polynomial Evaluation: A Survey and New Results. Journal of computer science and technology, 37 (2). pp. 443-458.

Hamidi, Amirreza, and Ghodosi, Hossein (2022) Verifiable DOPE from Somewhat Homomorphic Encryption, and the Extension to DOT. In: Lecture Notes in Computer Science (13580) pp. 105-120. From: SciSec 2022: 4th International Conference on Science of Cyber Security, 10-12 August 2022, Matsue, Japan.

Prihandoko, Antonius Cahya, and Ghodosi, Hossein (2021) Blind Decryption for Preserving Privacy in the DRM System. In: Proceedings of the International Conference on Computer Science, Information Technology, and Electrical Engineering. pp. 213-217. From: ICOMITEE 2021: International Conference on Computer Science, Information Technology, and Electrical Engineering, 27-28 October 2021, Banyuwangi, Indonesia.

Cianciullo, Louis, and Ghodosi, Hossein (2021) Outsourced cheating detection for secret sharing. International Journal of Information Security, 20. pp. 871-878.

Hamidi, Amirreza, and Ghodosi, Hossein (2021) Secure Multi-Party Computation Using Pre-distributed Information from an Initializer. In: Communications in Computer and Information Science (1497) pp. 111-122. From: ICSP 2021: 2nd International Conference on Security and Privacy, 16-17 November 2021, Jamshedpur, India.

Cianciullo, Louis, and Ghodosi, Hossein (2019) Efficient information theoretic multi-party computation from oblivious linear evaluation. In: Lecture Notes in Computer Science (11469) pp. 78-90. From: Information Security Theory and Practice, 12th IFIP WG 11.2 International Conference, WISTP 2018, 10 - 11 December 2018, Brussels, Belgium.

Cianciullo, Louis, Ghodosi, Hossein, Thuremilla, Kovel, and Prihandoko, Antonius Cahya (2019) Flaws in strong t-consistency. In: Proceedings of the 2019 International Conference on Computer Science, Information Technology, and Electrical Engineering. 8921313. pp. 118-122. From: ICOMITEE 2019: 2019 International Conference on Computer Science, Information Technology, and Electrical Engineering, 16-17 October 2019, Jember, Indonesia.

Cianciullo, Louis, and Ghodosi, Hossein (2019) Unconditionally secure distributed oblivious polynomial evaluation. In: Lecture Notes in Computer Science (11396) pp. 132-142. From: Information Security and Cryptology – ICISC 2018, 28-30 November 2018, Seoul, South Korea.

Cianciullo, Louis, and Ghodosi, Hossein (2018) Improvements to almost optimum secret sharing with cheating detection. In: Lecture Notes in Computer Science (11049) pp. 193-205. From: IWSEC: 13th International Workshop on Security, 3-5 September 2018, Sendai, Japan.

Prihandoko, Antonius Cahya, Ghodosi, Hossein, and Litow, Bruce (2017) White-box implementation to advantage DRM. International Journal on Advanced Science, Engineering and Information Technology, 7 (2). pp. 460-467.

Prihandoko, Antonius Cahya, and Ghodosi, Hossein (2017) Oblivious content distribution system to advantage Digital Rights Management. In: Proceedings of the 4th International Conference on Computer Applications and Information Processing and Technology. pp. 266-270. From: CAIPT 2017: 4th International Conference on Computer Applications and Information Processing and Technology, 8-10 August 2017, Kuta Bali, Indonesia.

Prihandoko, Antonius Cahya, Ghodosi, Hossein, and Litow, Bruce (2016) Scenarios for securing content delivery in the DRM environment. INFORMAL: Informatics Journal, 1 (1). pp. 32-38.

Corniaux, Christian L.F., and Ghodosi, Hossein (2015) Security analysis of polynomial interpolation-based Distributed Oblivious Transfer protocols. In: Lecture Notes in Computer Science (8949) pp. 363-380. From: ICISC 2014: 17th International Conference on Information Security and Cryptology, 3-5 December 2014, Seoul, South Korea.

Cahya Prihandoko, Antonius, Ghodosi, Hossein, and Litow, Bruce (2014) Blind image watermarking based on chaotic maps. IT in Industry, 2 (2). pp. 44-50.

Corniaux, Christian L.F., and Ghodosi, Hossein (2014) An entropy-based demonstration of the security of Shamir's secret sharing scheme. In: Proceedings of the International Conference on Information Science, Electronics and Electrical Engineering (1) pp. 46-48. From: ISEEE 2014: International Conference on Information Science, Electronics and Electrical Engineering, 26-28 April 2014, Sapporo, Japan.

Ghodosi, Hossein (2013) Analysis of an unconditionally secure distributed oblivious transfer. Journal of Cryptology, 26 (1). pp. 75-79.

Cahya Prihandoko, Antonius, Ghodosi, Hossein, and Litow, Bruce (2013) Deterring traitor using double encryption scheme. In: Proceedings of the IEEE International Conference on Communication, Networks and Satellite. pp. 100-104. From: COMNETSAT 2013: IEEE International Conference on Communication, Networks and Satellite, 3-4 December 2013, Yogyakarta, Indonesia.

Cahya Prihandoko, Antonius, Ghodosi, Hossein, and Litow, Bruce (2013) Secure and private content distribution in the DRM environment. In: Proceedings of the Information System International Conference. pp. 659-664. From: ISICO 2013: Information System International Conference, 2-4 December 2013, Bali, Indonesia.

Corniaux, Christian L.F., and Ghodosi, Hossein (2013) An information-theoretically secure threshold distributed oblivious transfer protocol. In: Lecture Notes in Computer Science (7839) pp. 184-201. From: 15th International Conference on Information Security and Cryptology, 28-30 November 2012, Seoul, Korea.

Ghodosi, Hossein, and Lee, Ickjai (2012) Unconditional security and privacy preserving oblivious transfer. In: Proceedings of the 7th International Conference on Computing and Convergence Technology (ICCCT2012) (7) pp. 1042-1047. From: 2012 7th International Conference on Computing and Convergence Technology, 3-5 December 2012, Seoul, Korea.

Cahya Prihandoko, Antonius, Litow, Bruce, and Ghodosi, Hossein (2012) DRM's rights protection capability: a review. In: Proceedings of the First International Conference on Computational Science and Information Management (ICoCSIM) (1) ICoCSIM20. pp. 12-17. From: 2012 International Conference on Computational Science and Information Management (ICoCSIM), 3-5 December 2012, North Sumatera, Indonesia.

Ghodosi, Hossein, Pieprzyk, Josef, and Steinfeld, Ron (2012) Multi-party computation with conversion of secret sharing. Design, Codes and Cryptography, 62 (3). pp. 259-272.

Corniaux, Christian L.F., and Ghodosi, Hossein (2012) T-out-of-n distributed oblivious transfer protocols in non-adaptive and adaptive settings. In: Information Security Practice and Experience Conference (ISPEC) 2012 (7232) pp. 123-143. From: 8th International Conference on Information Security Practice and Experience, 9-12 April, Hangzhou, China.

Ghodosi, Hossein (2011) Comments on Harn-Lin's cheating detection scheme. Designs, Codes and Cryptography, 60 (1). pp. 63-66.

Trevathan, Jarrod, Read, Wayne, Ghodosi, Hossein, and Atkinson, Ian (2011) Privacy and anonymity in untrusted data stores. In: Conferences in Research and Practice in Information Technology (115) pp. 75-84. From: ADC 2011 22nd Australasian Database Conference, January 17 - 20 2011, Perth, WA, Australia.

Trevathan, Jarrod, Ghodosi, Hossein, and Myers, Trina (2011) Efficient batch authentication for hierarchical wireless sensor networks. In: Proceedings of the 2011 Seventh International Conference on Intelligent Sensors, Sensor Networks and Information Processing. pp. 217-222. From: ISSNIP 2011: Seventh International Conference on Intelligent Sensors, Sensor Networks and Information Processing, 6-9 December 2011, Adelaide, Australia.

Corniaux, Christian L.F., and Ghodosi, Hossein (2011) Scalar product-based distributed oblivious transfer. Lecture Notes in Computer Science, 6829. pp. 338-354.

Ghodosi, Hossein, and Pieprzyk, Josef (2009) Multi-Party computation with omnipresent adversary. In: Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09 (5443) pp. 180-195. From: 12th International Conference on Practice and Theory in Public Key Cryptography, 18 - 20 March 2009, Irvine, CA, USA.

Shah, Ripan, Trevathan, Jarrod, Read, Wayne, and Ghodosi, Hossein (2009) A proactive approach to preventing phishing attacks using a Pshark. In: Proceedings of the Sixth International Conference on Information Technology. pp. 915-921. From: Sixth International Conference on Information Technology, 27-29 April 2009, Nevada, USA.

Orumiehchi, Mohammad Ali, Mohebbipoor, S. Fahimeh, and Ghodosi, Hossein (2008) Cryptanalysis of MV 3 Stream Cipher. In: Franklin, Matthew K., Hui, Lucas Chi Kwong, and Wong, Duncan S., (eds.) Cryptology and Network Security. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 240-251.

Pieprzyk, Josef, Ghodosi, Hossein, and Dawson, Ed (2007) Information Security and Privacy, Proceedings of 12th Australasian Conference, ACISP 2007,. In: Proceedings of 12th Australasian Conference, ACISP 2007 (4586) pp. 1-11. From: 12th Australasian Conference, ACISP 2007, 2 - 4 July, 2007, Townsville, QLD, Australia.

Ghodosi, Hossein (2007) On insecurity of Naor–Pinkas’ distributed oblivious transfer. Information Processing Letters, 104 (5). pp. 179-182.

Ghodosi, Hossein (2007) A general model for oblivious transfer. In: Proceedings of the Sixth International Workshop for Applied PKC. pp. 79-87. From: Sixth International Workshop for Applied PKC (IWAP2007), 3-4 DEC 2007, Perth, WA, Australia.

Ghodosi, Hossein, and Zaare-Nahandi, Rahim (2007) A non-interactive multiparty computation protocol. In: Proceedings of the Sixth International Workshop for Applied PKC. pp. 88-95. From: Sixth International Workshop for Applied PKC (IWAP2007), 3-4 DEC 2007, Perth, WA, Australia.

Ghodosi, Hossein, and Zaare-Nahandi, Rahim (2006) Comments on the `m out of n oblivious transfer'. Information Processing Letters, 97 (4). pp. 153-155.

Lee, Ickjai, and Ghodosi, Hossein (2006) Privacy and security enhanced offline oblivious transfer for massive data distribution. In: Proceedings of the Intelligence and Security Informatics: International Workshop, WISI 2006 (3917) pp. 159-160. From: WISI 2006 International Workshop, 9 April 2006, Singapore.

Trevathan, Jarrod, Ghodosi, Hossien, and Read, Wayne (2006) An anonymous and secure continuous double auction scheme. In: Proceedings of the 39th Annual Hawaii International Conference on System Sciences. From: 39th Annual Hawaii International Conference on System Sciences, 4-7 January 2006, Kauai, Hawaii.

Ghodosi, Hossein (2006) An efficient public key cryptosystem secure against chosen ciphertext attack. In: Proceedings of the Second International Conference on Information Systems Security (4332) pp. 303-314. From: ICISS 2006 Second International Conference on Information Systems Security, 19-21 December 2006, Kolkata, India.

Ghodosi, Hossein, and Pieprzyk, Josef (2006) An ideal and robust threshold RSA. In: Proceedings of Progress in Cryptology - VIETCRYPT 2006 (4341) pp. 312-321. From: VIETCRYPT 2006 First International Conference on Cryptology in Vietnam, 25-28 September 2006, Hanoi, Vietnam.

Trevathan, Jarrod, Read, Wayne, and Ghodosi, Hossein (2005) Design issues for electronic auctions. In: Proceedings of the Second International Conference on e-Business and Telecommunication Networks (I) pp. 340-347. From: Second International Conference on e-Business and Telecommunication Networks, 3-7 October 2005, Reading, UK.

Ghodosi, Hossein, and Pieprzyk, Josef (2004) A modification to the authentication of Concast Communication. In: Proceedings of the Conference Cryptographic Algorithms and their Uses. From: Cryptopgraphic Algorithms and their Uses: CAU2004, 5-6 July 2004, Surfers Paradise, QLD, Australia.

Trevathan, Jarrod, Ghodosi, Hossein, and Litow, Bruce (2003) Overview of traitor tracing schemes. Communications of the CCISA, Selected Topics of Cryptography and Information Security, 9 (4). pp. 51-63.

Al-Ibrahim, Mohamed, Ghodosi, Hossein, and Pieprzyk, Josef (2002) Authentication of concast communication. In: Procress in Cryptology: INDOCRYPT 2002. pp. 185-198. From: 3rd International Conference on Cryptology, 16-18 December, 2002, Hyderabad, India.

Ghodosi, Hossein, and Pieprzyk, Josef (2001) Democratic systems. Lecture notes in computer science, 2119. pp. 392-402.

Ghodosi, Hossein, and Saeednia, Shahrokh (2001) Modification to self-certified group-oriented cryptosystem without combiner. Electronics Letters, 37 (2). pp. 86-87.

Ghodosi, Hossein, and Pieprzyk, Josef (2000) Cheating prevention in secret sharing. Lecture notes in computer science, 1841. pp. 328-341.

Ghodosi, H., and Pieprzyk, J. (2000) Cheating Prevention in Secret Sharing. In: Lecture Notes in Computer Science (1841) pp. 328-341. From: 5th Australasian Conference ACISP 2000, 10 - 12 July 2000, Brisbane, Qld.

Ghodosi, Hossein, and Pieprzyk, Josef (1999) Repudiation of Cheating and Non-repudiation of Zhang's Proxy Signature Schemes. In: Lecture Notes in Computer Science (1587) pp. 129-134. From: 4th Australasian Conference on Information Security and Privacy, ACISP’99, 7-9 April 1999, Wollongong, Australia.

Saeednia, Shahrokh, and Ghodosi, Hossein (1999) A self-certified group-oriented cryptosystem without a combiner. Lecture Notes in Computer Science, 1587. pp. 192-201.

Ghodosi, Hossein, Piperzyk, Josef, Safavi-Naini, Rei, and Wang, Huaxiong (1998) On construction of cumulative secret sharing schemes. Lecture Notes in Computer Science, 1438. pp. 379-390.

Ghodosi, Hossein, Pieprzyk, Josef, and Safavi-Naini, Rei (1998) Secret sharing in multilevel and compartmented groups. Lecture notes in computer science, 1438. pp. 367-378.

Ghodosi, Hossein, Pieprzyk, Josef, and Safavi-Naini, Rei (1997) Remarks on the multiple assignment secret sharing scheme. Lecture notes in computer science, 1334. pp. 72-80.

This list was generated on Wed Dec 25 04:44:19 2024 AEST.