Items where Subject is "08 INFORMATION AND COMPUTING SCIENCES > 0804 Data Format > 080401 Coding and Information Theory"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0 [feed] RSS 2.0
Group by: Creators | Item Type
Number of items at this level: 13.

Article

Ghodosi, Hossein (2013) Analysis of an unconditionally secure distributed oblivious transfer. Journal of Cryptology, 26 (1). pp. 75-79.

Ghodosi, Hossein, Pieprzyk, Josef, and Steinfeld, Ron (2012) Multi-party computation with conversion of secret sharing. Design, Codes and Cryptography, 62 (3). pp. 259-272.

Ghodosi, Hossein (2011) Comments on Harn-Lin's cheating detection scheme. Designs, Codes and Cryptography, 60 (1). pp. 63-66.

Ma, Xiaogang, Wu, Chonglong, Carranza, Emmanuel John M., Schetselaar, Ernst M., van der Meer, Freek D., Liu, Gang, Wang, Xinqing, and Zhang, Xialin (2010) Development of a controlled vocabulary for semantic interoperability of mineral exploration geodata for mining projects. Computers & Geosciences, 36 (12). pp. 1512-1522.

Saeednia, Shahrokh, and Ghodosi, Hossein (1999) A self-certified group-oriented cryptosystem without a combiner. Lecture Notes in Computer Science, 1587. pp. 192-201.

Ghodosi, Hossein, Piperzyk, Josef, Safavi-Naini, Rei, and Wang, Huaxiong (1998) On construction of cumulative secret sharing schemes. Lecture Notes in Computer Science, 1438. pp. 379-390.

Conference Item

Corniaux, Christian L.F., and Ghodosi, Hossein (2015) Security analysis of polynomial interpolation-based Distributed Oblivious Transfer protocols. In: Lecture Notes in Computer Science (8949) pp. 363-380. From: ICISC 2014: 17th International Conference on Information Security and Cryptology, 3-5 December 2014, Seoul, South Korea.

Corniaux, Christian L.F., and Ghodosi, Hossein (2014) An entropy-based demonstration of the security of Shamir's secret sharing scheme. In: Proceedings of the International Conference on Information Science, Electronics and Electrical Engineering (1) pp. 46-48. From: ISEEE 2014: International Conference on Information Science, Electronics and Electrical Engineering, 26-28 April 2014, Sapporo, Japan.

Corniaux, Christian L.F., and Ghodosi, Hossein (2013) An information-theoretically secure threshold distributed oblivious transfer protocol. In: Lecture Notes in Computer Science (7839) pp. 184-201. From: 15th International Conference on Information Security and Cryptology, 28-30 November 2012, Seoul, Korea.

Corniaux, Christian L.F., and Ghodosi, Hossein (2012) T-out-of-n distributed oblivious transfer protocols in non-adaptive and adaptive settings. In: Information Security Practice and Experience Conference (ISPEC) 2012 (7232) pp. 123-143. From: 8th International Conference on Information Security Practice and Experience, 9-12 April, Hangzhou, China.

Corniaux, Christian L. F., and Ghodosi, Hossein (2011) A Verifiable Distributed Oblivious Transfer Protocol. In: Lecture Notes in Computer Science (6812) pp. 444-450. From: 16th Australasian Conference on Information Security and Privacy, ACISP 2011, 11-13 July 2011, Melbourne, Australia.

Ghodosi, Hossein, and Pieprzyk, Josef (1999) Repudiation of Cheating and Non-repudiation of Zhang's Proxy Signature Schemes. In: Lecture Notes in Computer Science (1587) pp. 129-134. From: 4th Australasian Conference on Information Security and Privacy, ACISP’99, 7-9 April 1999, Wollongong, Australia.

Thesis

Corniaux, Christian L.F. (2016) Exploratory designs of unconditionally secure distributed oblivious transfer protocols. PhD thesis, James Cook University.

This list was generated on Thu Nov 21 22:44:20 2024 AEST.