Publications by: Hossein Ghodosi

Also publishes as (H. Ghodosi, Hossien Ghodosi)

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Number of items: 42.

Prihandoko, Antonius Cahya, Ghodosi, Hossein, and Litow, Bruce (2016) Scenarios for securing content delivery in the DRM environment. INFORMAL: Informatics Journal, 1 (1). pp. 32-38.

Corniaux, Christian L.F., and Ghodosi, Hossein (2015) Security analysis of polynomial interpolation-based Distributed Oblivious Transfer protocols. In: Lecture Notes in Computer Science (8949), pp. 363-380. From: ICISC 2014: 17th International Conference on Information Security and Cryptology, 3-5 December 2014, Seoul, South Korea.

Cahya Prihandoko, Antonius, Ghodosi, Hossein, and Litow, Bruce (2014) Blind image watermarking based on chaotic maps. IT in Industry, 2 (2). pp. 44-50.

Corniaux, Christian L.F., and Ghodosi, Hossein (2014) An entropy-based demonstration of the security of Shamir's secret sharing scheme. In: Proceedings of the International Conference on Information Science, Electronics and Electrical Engineering (1), pp. 46-48. From: ISEEE 2014: International Conference on Information Science, Electronics and Electrical Engineering, 26-28 April 2014, Sapporo, Japan.

Ghodosi, Hossein (2013) Analysis of an unconditionally secure distributed oblivious transfer. Journal of Cryptology, 26 (1). pp. 75-79.

Cahya Prihandoko, Antonius, Ghodosi, Hossein, and Litow, Bruce (2013) Deterring traitor using double encryption scheme. In: Proceedings of the IEEE International Conference on Communication, Networks and Satellite, pp. 100-104. From: COMNETSAT 2013: IEEE International Conference on Communication, Networks and Satellite, 3-4 December 2013, Yogyakarta, Indonesia.

Cahya Prihandoko, Antonius, Ghodosi, Hossein, and Litow, Bruce (2013) Secure and private content distribution in the DRM environment. In: Proceedings of the Information System International Conference, pp. 659-664. From: ISICO 2013: Information System International Conference, 2-4 December 2013, Bali, Indonesia.

Corniaux, Christian L.F., and Ghodosi, Hossein (2013) An information-theoretically secure threshold distributed oblivious transfer protocol. In: Lecture Notes in Computer Science (7839), pp. 184-201. From: 15th International Conference on Information Security and Cryptology, 28-30 November 2012, Seoul, Korea.

Ghodosi, Hossein, and Lee, Ickjai (2012) Unconditional security and privacy preserving oblivious transfer. In: Proceedings of the 7th International Conference on Computing and Convergence Technology (ICCCT2012) (7), pp. 1042-1047. From: 2012 7th International Conference on Computing and Convergence Technology, 3-5 December 2012, Seoul, Korea.

Cahya Prihandoko, Antonius, Litow, Bruce, and Ghodosi, Hossein (2012) DRM's rights protection capability: a review. In: Proceedings of the First International Conference on Computational Science and Information Management (ICoCSIM) (1), pp. 12-17. From: 2012 International Conference on Computational Science and Information Management (ICoCSIM), 3-5 December 2012, North Sumatera, Indonesia.

Ghodosi, Hossein, Pieprzyk, Josef, and Steinfeld, Ron (2012) Multi-party computation with conversion of secret sharing. Design, Codes and Cryptography, 62 (3). pp. 259-272.

Corniaux, Christian L.F., and Ghodosi, Hossein (2012) T-out-of-n distributed oblivious transfer protocols in non-adaptive and adaptive settings. In: Information Security Practice and Experience Conference (ISPEC) 2012 (7232), pp. 123-143. From: 8th International Conference on Information Security Practice and Experience , 9-12 April, Hangzhou, China.

Corniaux, Christian L.F., and Ghodosi, Hossein (2011) A verifiable distributed oblivious transfer protocol. Lecture Notes in Computer Science, 6812. pp. 444-450.

Ghodosi, Hossein (2011) Comments on Harn-Lin's cheating detection scheme. Designs, Codes and Cryptography , 60 (1). pp. 63-66.

Trevathan, Jarrod, Read, Wayne, Ghodosi, Hossein, and Atkinson, Ian (2011) Privacy and anonymity in untrusted data stores. In: Conferences in Research and Practice in Information Technology (115), pp. 75-84. From: ADC 2011 22nd Australasian Database Conference, January 17 - 20 2011, Perth, WA, Australia.

Trevathan, Jarrod, Ghodosi, Hossein, and Myers, Trina (2011) Efficient batch authentication for hierarchical wireless sensor networks. In: Proceedings of the 2011 Seventh International Conference on Intelligent Sensors, Sensor Networks and Information Processing, pp. 217-222. From: ISSNIP 2011: Seventh International Conference on Intelligent Sensors, Sensor Networks and Information Processing, 6-9 December 2011, Adelaide, Australia.

Corniaux, Christian L.F., and Ghodosi, Hossein (2011) Scalar product-based distributed oblivious transfer. Lecture Notes in Computer Science, 6829. pp. 338-354.

Ghodosi, Hossein, and Pieprzyk, Josef (2009) Multi-Party computation with omnipresent adversary. In: Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09 (5443), pp. 180-195. From: 12th International Conference on Practice and Theory in Public Key Cryptography, 18 - 20 March 2009, Irvine, CA, USA.

Shah, Ripan, Trevathan, Jarrod, Read, Wayne, and Ghodosi, Hossein (2009) A proactive approach to preventing phishing attacks using a Pshark. In: Proceedings of the Sixth International Conference on Information Technology , pp. 915-921. From: Sixth International Conference on Information Technology , 27-29 April 2009, Nevada, USA.

Orumiehchi, Mohammad Ali, Mohebbipoor, S. Fahimeh, and Ghodosi, Hossein (2008) Cryptanalysis of MV 3 Stream Cipher. In: Franklin, Matthew K., Hui, Lucas Chi Kwong, and Wong, Duncan S., (eds.) Cryptology and Network Security. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 240-251.

Pieprzyk, Josef, Ghodosi, Hossein, and Dawson, Ed (2007) Information Security and Privacy, Proceedings of 12th Australasian Conference, ACISP 2007,. In: Proceedings of 12th Australasian Conference, ACISP 2007 (4586), pp. 1-11. From: 12th Australasian Conference, ACISP 2007, 2 - 4 July, 2007, Townsville, QLD, Australia.

Ghodosi, Hossein (2007) On insecurity of Naor–Pinkas’ distributed oblivious transfer. Information Processing Letters, 104 (5). pp. 179-182.

Ghodosi, Hossein (2007) A general model for oblivious transfer. In: Proceedings of the Sixth International Workshop for Applied PKC, pp. 79-87. From: Sixth International Workshop for Applied PKC (IWAP2007), 3-4 DEC 2007, Perth, WA, Australia.

Ghodosi, Hossein, and Zaare-Nahandi, Rahim (2007) A non-interactive multiparty computation protocol. In: Proceedings of the Sixth International Workshop for Applied PKC, pp. 88-95. From: Sixth International Workshop for Applied PKC (IWAP2007), 3-4 DEC 2007, Perth, WA, Australia.

Ghodosi, Hossein, and Zaare-Nahandi, Rahim (2006) Comments on the `m out of n oblivious transfer'. Information Processing Letters, 97 (4). pp. 153-155.

Lee, Ickjai, and Ghodosi, Hossein (2006) Privacy and security enhanced offline oblivious transfer for massive data distribution. In: Proceedings of the Intelligence and Security Informatics: International Workshop, WISI 2006 (3917), pp. 159-160. From: WISI 2006 International Workshop, 9 April 2006, Singapore.

Trevathan, Jarrod, Ghodosi, Hossien, and Read, Wayne (2006) An anonymous and secure continuous double auction scheme. In: Proceedings of the 39th Annual Hawaii International Conference on System Sciences. From: 39th Annual Hawaii International Conference on System Sciences, 4-7 January 2006, Kauai, Hawaii.

Ghodosi, Hossein (2006) An efficient public key cryptosystem secure against chosen ciphertext attack. In: Proceedings of the Second International Conference on Information Systems Security (4332), pp. 303-314. From: ICISS 2006 Second International Conference on Information Systems Security, 19-21 December 2006, Kolkata, India.

Ghodosi, Hossein, and Pieprzyk, Josef (2006) An ideal and robust threshold RSA. In: Proceedings of Progress in Cryptology - VIETCRYPT 2006 (4341), pp. 312-321. From: VIETCRYPT 2006 First International Conference on Cryptology in Vietnam, 25-28 September 2006, Hanoi, Vietnam.

Trevathan, Jarrod, Read, Wayne, and Ghodosi, Hossein (2005) Design issues for electronic auctions. In: Proceedings of the Second International Conference on e-Business and Telecommunication Networks (I), pp. 340-347. From: Second International Conference on e-Business and Telecommunication Networks, 3-7 October 2005, Reading, UK.

Ghodosi, Hossein, and Pieprzyk, Josef (2004) A modification to the authentication of Concast Communication. In: Proceedings of the Conference Cryptographic Algorithms and their Uses. From: Cryptopgraphic Algorithms and their Uses: CAU2004, 5-6 July 2004, Surfers Paradise, QLD, Australia.

Trevathan, Jarrod, Ghodosi, Hossein, and Litow, Bruce (2003) Overview of traitor tracing schemes. Communications of the CCISA, Selected Topics of Cryptography and Information Security, 9 (4). pp. 51-63.

Al-Ibrahim, Mohamed, Ghodosi, Hossein, and Pieprzyk, Josef (2002) Authentication of concast communication. In: Procress in Cryptology: INDOCRYPT 2002, pp. 185-198. From: 3rd International Conference on Cryptology, 16-18 December, 2002, Hyderabad, India.

Ghodosi, Hossein, and Pieprzyk, Josef (2001) Democratic systems. Lecture notes in computer science, 2119. pp. 392-402.

Ghodosi, Hossein, and Saeednia, Shahrokh (2001) Modification to self-certified group-oriented cryptosystem without combiner. Electronics Letters, 37 (2). pp. 86-87.

Ghodosi, Hossein, and Pieprzyk, Josef (2000) Cheating prevention in secret sharing. Lecture notes in computer science, 1841. pp. 328-341.

Ghodosi, H., and Pieprzyk, J. (2000) Cheating Prevention in Secret Sharing. In: Lecture Notes in Computer Science (1841), pp. 328-341. From: 5th Australasian Conference ACISP 2000, 10 - 12 July 2000, Brisbane, Qld.

Ghodosi, Hossein, and Pieprzyk, Josef (1999) Repudiation of Cheating and Non-repudiation of Zhang's Proxy Signature Schemes. In: Lecture Notes in Computer Science (1587), pp. 129-134. From: 4th Australasian Conference on Information Security and Privacy, ACISP’99, 7-9 April 1999, Wollongong, Australia.

Saeednia, Shahrokh, and Ghodosi, Hossein (1999) A self-certified group-oriented cryptosystem without a combiner. Lecture Notes in Computer Science, 1587. pp. 192-201.

Ghodosi, Hossein, Piperzyk, Josef, Safavi-Naini, Rei, and Wang, Huaxiong (1998) On construction of cumulative secret sharing schemes. Lecture Notes in Computer Science, 1438. pp. 379-390.

Ghodosi, Hossein, Pieprzyk, Josef, and Safavi-Naini, Rei (1998) Secret sharing in multilevel and compartmented groups. Lecture notes in computer science, 1438. pp. 367-378.

Ghodosi, Hossein, Pieprzyk, Josef, and Safavi-Naini, Rei (1997) Remarks on the multiple assignment secret sharing scheme. Lecture notes in computer science, 1334. pp. 72-80.

This list was generated on Sun Oct 22 21:34:25 2017 AEST.