Reihaneh Safavi-Naini mostly deals with Computer security, Cryptography, Theoretical computer science, Encryption and Public-key cryptography. He combines subjects such as Scheme and Digital content with his study of Computer security. His Cryptography study combines topics from a wide range of disciplines, such as Ring signature, Electronic cash, Authentication, Merkle signature scheme and Digital watermarking.
He has included themes like ElGamal signature scheme, Algorithm, Schnorr signature and Proxy signature in his Ring signature study. His Theoretical computer science study incorporates themes from Signature, Privacy policy, Computer security model and Risk analysis. The Probabilistic encryption and Attribute-based encryption research Reihaneh Safavi-Naini does as part of his general Encryption study is frequently linked to other disciplines of science, such as Point, therefore creating a link between diverse domains of science.
His main research concerns Computer security, Theoretical computer science, Cryptography, Computer network and Adversary. Many of his studies on Computer security apply to Scheme as well. His research in Theoretical computer science intersects with topics in Code, Construct, Hash function, Verifiable secret sharing and Upper and lower bounds.
His research on Cryptography frequently connects to adjacent areas such as ID-based cryptography. His study explores the link between Computer network and topics such as Key that cross with problems in Communication channel, Alice and Bob and Reliability. His Adversary research also works with subjects such as
His primary scientific interests are in Computer security, Adversary, Key, Theoretical computer science and Cryptography. Reihaneh Safavi-Naini is involved in the study of Computer security that focuses on Provable security in particular. His Adversary research is multidisciplinary, incorporating perspectives in Code word, Computer network, Physical layer and Access structure.
His Key research integrates issues from Set, Communication channel and Channel. His Theoretical computer science research includes themes of Scalability, Verifiable secret sharing, Block cipher and Hash function. His Message authentication code study, which is part of a larger body of work in Cryptography, is frequently linked to Coding, bridging the gap between disciplines.
Reihaneh Safavi-Naini mainly investigates Computer security, Adversary, Cloud computing, Secret sharing and Cryptography. The study incorporates disciplines such as Pseudocode, Home automation, Control, Scheme and Computer network in addition to Computer security. His Adversary research incorporates elements of Discrete mathematics, Set, Upper and lower bounds, Key and Secure communication.
The concepts of his Cloud computing study are interwoven with issues in Ciphertext, Encryption, Provable security and The Internet. His Cryptography research integrates issues from Event, Quantum computer, Information privacy and Host. His Theoretical computer science study frequently intersects with other fields, such as Hash function.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
An Efficient Signature Scheme from Bilinear Pairings and Its Applications
Fangguo Zhang;Reihaneh Safavi-Naini;Willy Susilo.
public key cryptography (2004)
Digital rights management for content distribution
Qiong Liu;Reihaneh Safavi-Naini;Nicholas Paul Sheppard.
ACSW Frontiers '03 Proceedings of the Australasian information security workshop conference on ACSW frontiers 2003 - Volume 21 (2003)
Public Key Encryption with Keyword Search Revisited
Joonsang Baek;Reihaneh Safavi-Naini;Willy Susilo.
international conference on computational science and its applications (2008)
Privacy preserving EHR system using attribute-based infrastructure
Shivaramakrishnan Narayan;Martin Gagné;Reihaneh Safavi-Naini.
cloud computing security workshop (2010)
Certificateless public key encryption without pairing
Joonsang Baek;Reihaneh Safavi-Naini;Willy Susilo.
international conference on information security (2005)
Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems
Siamak F. Shahandashti;Reihaneh Safavi-Naini.
international conference on cryptology in africa (2009)
Efficient multi-receiver identity-based encryption and its application to broadcast encryption
Joonsang Baek;Reihaneh Safavi-Naini;Willy Susilo.
public key cryptography (2005)
Digital license sharing system and method
Qiong Liu;Reihaneh Safavi-Naini;Nicholas Paul Sheppard.
(2005)
Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings
Fangguo Zhang;Reihaneh Safavi-Naini;Willy Susilo.
international conference on cryptology in india (2003)
On the integration of public key data encryption and public key encryption with keyword search
Joonsang Baek;Reihaneh Safavi-Naini;Willy Susilo.
international conference on information security (2006)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Nanyang Technological University
University of Wollongong
Commonwealth Scientific and Industrial Research Organisation
University of Wollongong
Sun Yat-sen University
University of Calgary
The University of Texas at Dallas
University of Calgary
Ibaraki University
University of California, Berkeley
University of New South Wales
Victoria University of Wellington
Universidade Nova de Lisboa
University of British Columbia
United States Department of Agriculture
University of Leeds
Peking University
Federal University of Rio de Janeiro
Helsinki Region Environmental Services Authority
École Normale Supérieure
University of Arizona
The University of Texas Medical Branch at Galveston
Erasmus University Rotterdam
University of Pretoria
University of California, Berkeley
University of Sussex