D-Index & Metrics Best Publications
Reihaneh Safavi-Naini

Reihaneh Safavi-Naini

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 33 Citations 7,445 307 World Ranking 8407 National Ranking 360

Overview

What is he best known for?

The fields of study he is best known for:

  • Cryptography
  • Operating system
  • Computer network

Reihaneh Safavi-Naini mostly deals with Computer security, Cryptography, Theoretical computer science, Encryption and Public-key cryptography. He combines subjects such as Scheme and Digital content with his study of Computer security. His Cryptography study combines topics from a wide range of disciplines, such as Ring signature, Electronic cash, Authentication, Merkle signature scheme and Digital watermarking.

He has included themes like ElGamal signature scheme, Algorithm, Schnorr signature and Proxy signature in his Ring signature study. His Theoretical computer science study incorporates themes from Signature, Privacy policy, Computer security model and Risk analysis. The Probabilistic encryption and Attribute-based encryption research Reihaneh Safavi-Naini does as part of his general Encryption study is frequently linked to other disciplines of science, such as Point, therefore creating a link between diverse domains of science.

His most cited work include:

  • An Efficient Signature Scheme from Bilinear Pairings and Its Applications (411 citations)
  • Digital rights management for content distribution (350 citations)
  • Public Key Encryption with Keyword Search Revisited (310 citations)

What are the main themes of his work throughout his whole career to date?

His main research concerns Computer security, Theoretical computer science, Cryptography, Computer network and Adversary. Many of his studies on Computer security apply to Scheme as well. His research in Theoretical computer science intersects with topics in Code, Construct, Hash function, Verifiable secret sharing and Upper and lower bounds.

His research on Cryptography frequently connects to adjacent areas such as ID-based cryptography. His study explores the link between Computer network and topics such as Key that cross with problems in Communication channel, Alice and Bob and Reliability. His Adversary research also works with subjects such as

  • Code word together with Discrete mathematics,
  • Secure communication that connect with fields like Secrecy.

He most often published in these fields:

  • Computer security (40.97%)
  • Theoretical computer science (28.37%)
  • Cryptography (19.48%)

What were the highlights of his more recent work (between 2015-2021)?

  • Computer security (40.97%)
  • Adversary (14.04%)
  • Key (13.47%)

In recent papers he was focusing on the following fields of study:

His primary scientific interests are in Computer security, Adversary, Key, Theoretical computer science and Cryptography. Reihaneh Safavi-Naini is involved in the study of Computer security that focuses on Provable security in particular. His Adversary research is multidisciplinary, incorporating perspectives in Code word, Computer network, Physical layer and Access structure.

His Key research integrates issues from Set, Communication channel and Channel. His Theoretical computer science research includes themes of Scalability, Verifiable secret sharing, Block cipher and Hash function. His Message authentication code study, which is part of a larger body of work in Cryptography, is frequently linked to Coding, bridging the gap between disciplines.

Between 2015 and 2021, his most popular works were:

  • A Model for Adversarial Wiretap Channels (24 citations)
  • Towards a Resilient Smart Home (20 citations)
  • A Secure Event Logging System for Smart Homes (9 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • Computer network
  • Cryptography

Reihaneh Safavi-Naini mainly investigates Computer security, Adversary, Cloud computing, Secret sharing and Cryptography. The study incorporates disciplines such as Pseudocode, Home automation, Control, Scheme and Computer network in addition to Computer security. His Adversary research incorporates elements of Discrete mathematics, Set, Upper and lower bounds, Key and Secure communication.

The concepts of his Cloud computing study are interwoven with issues in Ciphertext, Encryption, Provable security and The Internet. His Cryptography research integrates issues from Event, Quantum computer, Information privacy and Host. His Theoretical computer science study frequently intersects with other fields, such as Hash function.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

An Efficient Signature Scheme from Bilinear Pairings and Its Applications

Fangguo Zhang;Reihaneh Safavi-Naini;Willy Susilo.
public key cryptography (2004)

664 Citations

Digital rights management for content distribution

Qiong Liu;Reihaneh Safavi-Naini;Nicholas Paul Sheppard.
ACSW Frontiers '03 Proceedings of the Australasian information security workshop conference on ACSW frontiers 2003 - Volume 21 (2003)

643 Citations

Public Key Encryption with Keyword Search Revisited

Joonsang Baek;Reihaneh Safavi-Naini;Willy Susilo.
international conference on computational science and its applications (2008)

563 Citations

Privacy preserving EHR system using attribute-based infrastructure

Shivaramakrishnan Narayan;Martin Gagné;Reihaneh Safavi-Naini.
cloud computing security workshop (2010)

360 Citations

Certificateless public key encryption without pairing

Joonsang Baek;Reihaneh Safavi-Naini;Willy Susilo.
international conference on information security (2005)

295 Citations

Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems

Siamak F. Shahandashti;Reihaneh Safavi-Naini.
international conference on cryptology in africa (2009)

260 Citations

Efficient multi-receiver identity-based encryption and its application to broadcast encryption

Joonsang Baek;Reihaneh Safavi-Naini;Willy Susilo.
public key cryptography (2005)

224 Citations

Digital license sharing system and method

Qiong Liu;Reihaneh Safavi-Naini;Nicholas Paul Sheppard.
(2005)

201 Citations

Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings

Fangguo Zhang;Reihaneh Safavi-Naini;Willy Susilo.
international conference on cryptology in india (2003)

198 Citations

On the integration of public key data encryption and public key encryption with keyword search

Joonsang Baek;Reihaneh Safavi-Naini;Willy Susilo.
international conference on information security (2006)

195 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Reihaneh Safavi-Naini

Willy Susilo

Willy Susilo

University of Wollongong

Publications: 94

Yi Mu

Yi Mu

Fujian Normal University

Publications: 76

Sherman S. M. Chow

Sherman S. M. Chow

Chinese University of Hong Kong

Publications: 40

Xiaofeng Chen

Xiaofeng Chen

Xidian University

Publications: 37

Fangguo Zhang

Fangguo Zhang

Sun Yat-sen University

Publications: 36

Huaxiong Wang

Huaxiong Wang

Nanyang Technological University

Publications: 34

Xinyi Huang

Xinyi Huang

Fujian Normal University

Publications: 30

Man Ho Au

Man Ho Au

University of Hong Kong

Publications: 30

Duncan S. Wong

Duncan S. Wong

City University of Hong Kong

Publications: 26

Joseph K. Liu

Joseph K. Liu

Monash University

Publications: 25

Robert H. Deng

Robert H. Deng

Singapore Management University

Publications: 25

Guomin Yang

Guomin Yang

Singapore Management University

Publications: 25

Zhenfu Cao

Zhenfu Cao

East China Normal University

Publications: 23

Jin Li

Jin Li

Chinese Academy of Sciences

Publications: 23

Rongxing Lu

Rongxing Lu

University of New Brunswick

Publications: 21

Hideki Imai

Hideki Imai

Chuo University

Publications: 21

Trending Scientists

Vijay Sivaraman

Vijay Sivaraman

University of New South Wales

Rodney G. Downey

Rodney G. Downey

Victoria University of Wellington

Miguel Pina e Cunha

Miguel Pina e Cunha

Universidade Nova de Lisboa

Heinz H. Bauschke

Heinz H. Bauschke

University of British Columbia

Kevin B. Hicks

Kevin B. Hicks

United States Department of Agriculture

Dwayne E. Heard

Dwayne E. Heard

University of Leeds

Zhi-Min Liao

Zhi-Min Liao

Peking University

Alexander W. A. Kellner

Alexander W. A. Kellner

Federal University of Rio de Janeiro

Hanna E. Manninen

Hanna E. Manninen

Helsinki Region Environmental Services Authority

Sonia Garel

Sonia Garel

École Normale Supérieure

Elena Plante

Elena Plante

University of Arizona

Ernest S. Barratt

Ernest S. Barratt

The University of Texas Medical Branch at Galveston

Caspar W. N. Looman

Caspar W. N. Looman

Erasmus University Rotterdam

Stella M. Nkomo

Stella M. Nkomo

University of Pretoria

Barry M. Staw

Barry M. Staw

University of California, Berkeley

Paul Webb

Paul Webb

University of Sussex

Something went wrong. Please try again later.