Items where Subject is "08 INFORMATION AND COMPUTING SCIENCES > 0804 Data Format > 080401 Coding and Information Theory"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0 [feed] RSS 2.0
Group by: Creators | Item Type
Jump to: C | G | M | P | S
Number of items at this level: 17.

C

Cianciullo, Louis, and Ghodosi, Hossein (2019) Efficient information theoretic multi-party computation from oblivious linear evaluation. In: Lecture Notes in Computer Science (11469) pp. 78-90. From: Information Security Theory and Practice, 12th IFIP WG 11.2 International Conference, WISTP 2018, 10 - 11 December 2018, Brussels, Belgium.

Cianciullo, Louis, and Ghodosi, Hossein (2019) Unconditionally secure distributed oblivious polynomial evaluation. In: Lecture Notes in Computer Science (11396) pp. 132-142. From: Information Security and Cryptology – ICISC 2018, 28-30 November 2018, Seoul, South Korea.

Cianciullo, Louis, and Ghodosi, Hossein (2018) Improvements to almost optimum secret sharing with cheating detection. In: Lecture Notes in Computer Science (11049) pp. 193-205. From: IWSEC: 13th International Workshop on Security, 3-5 September 2018, Sendai, Japan.

Corniaux, Christian L.F. (2016) Exploratory designs of unconditionally secure distributed oblivious transfer protocols. PhD thesis, James Cook University.

Corniaux, Christian L.F., and Ghodosi, Hossein (2015) Security analysis of polynomial interpolation-based Distributed Oblivious Transfer protocols. In: Lecture Notes in Computer Science (8949) pp. 363-380. From: ICISC 2014: 17th International Conference on Information Security and Cryptology, 3-5 December 2014, Seoul, South Korea.

Corniaux, Christian L.F., and Ghodosi, Hossein (2014) An entropy-based demonstration of the security of Shamir's secret sharing scheme. In: Proceedings of the International Conference on Information Science, Electronics and Electrical Engineering (1) pp. 46-48. From: ISEEE 2014: International Conference on Information Science, Electronics and Electrical Engineering, 26-28 April 2014, Sapporo, Japan.

Corniaux, Christian L.F., and Ghodosi, Hossein (2013) An information-theoretically secure threshold distributed oblivious transfer protocol. In: Lecture Notes in Computer Science (7839) pp. 184-201. From: 15th International Conference on Information Security and Cryptology, 28-30 November 2012, Seoul, Korea.

Corniaux, Christian L.F., and Ghodosi, Hossein (2012) T-out-of-n distributed oblivious transfer protocols in non-adaptive and adaptive settings. In: Information Security Practice and Experience Conference (ISPEC) 2012 (7232) pp. 123-143. From: 8th International Conference on Information Security Practice and Experience, 9-12 April, Hangzhou, China.

Corniaux, Christian L. F., and Ghodosi, Hossein (2011) A Verifiable Distributed Oblivious Transfer Protocol. In: Lecture Notes in Computer Science (6812) pp. 444-450. From: 16th Australasian Conference on Information Security and Privacy, ACISP 2011, 11-13 July 2011, Melbourne, Australia.

G

Ghodosi, Hossein (2013) Analysis of an unconditionally secure distributed oblivious transfer. Journal of Cryptology, 26 (1). pp. 75-79.

Ghodosi, Hossein, Pieprzyk, Josef, and Steinfeld, Ron (2012) Multi-party computation with conversion of secret sharing. Design, Codes and Cryptography, 62 (3). pp. 259-272.

Ghodosi, Hossein (2011) Comments on Harn-Lin's cheating detection scheme. Designs, Codes and Cryptography, 60 (1). pp. 63-66.

Ghodosi, Hossein, and Pieprzyk, Josef (1999) Repudiation of Cheating and Non-repudiation of Zhang's Proxy Signature Schemes. In: Lecture Notes in Computer Science (1587) pp. 129-134. From: 4th Australasian Conference on Information Security and Privacy, ACISP’99, 7-9 April 1999, Wollongong, Australia.

Ghodosi, Hossein, Piperzyk, Josef, Safavi-Naini, Rei, and Wang, Huaxiong (1998) On construction of cumulative secret sharing schemes. Lecture Notes in Computer Science, 1438. pp. 379-390.

M

Ma, Xiaogang, Wu, Chonglong, Carranza, Emmanuel John M., Schetselaar, Ernst M., van der Meer, Freek D., Liu, Gang, Wang, Xinqing, and Zhang, Xialin (2010) Development of a controlled vocabulary for semantic interoperability of mineral exploration geodata for mining projects. Computers & Geosciences, 36 (12). pp. 1512-1522.

P

Prihandoko, Antonius Cahya, and Ghodosi, Hossein (2017) Oblivious content distribution system to advantage Digital Rights Management. In: Proceedings of the 4th International Conference on Computer Applications and Information Processing and Technology. pp. 266-270. From: CAIPT 2017: 4th International Conference on Computer Applications and Information Processing and Technology, 8-10 August 2017, Kuta Bali, Indonesia.

S

Saeednia, Shahrokh, and Ghodosi, Hossein (1999) A self-certified group-oriented cryptosystem without a combiner. Lecture Notes in Computer Science, 1587. pp. 192-201.

This list was generated on Sun Mar 29 22:45:26 2020 AEST.