University of Surrey

Test tubes in the lab Research in the ATI Dance Research

Items where Author is "Sadeghi, A"

Up a level
Export as [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 20.

Article

Manulis, M and Sadeghi, A-R (2010) Key Agreement for Heterogeneous Mobile Ad-Hoc Groups International Journal of Wireless and Mobile Computing (IJWMC), 4 (1). pp. 17-30.

Catuogno, L, Löhr, H, Manulis, M, Sadeghi, A-R, Stüble, C and Winandy, M (2010) Trusted Virtual Domains: Color Your Network Datenschutz und Datensicherheit (DuD), 34 (5). pp. 289-294.

Gajek, S, Manulis, M, Pereira, O, Sadeghi, A-R and Schwenk, J (2008) Universally Composable Security Analysis of TLS - Secure Sessions with Handshake and Record Layer Protocols. IACR Cryptology ePrint Archive, 2008. p. 251.

Manulis, M, Sadeghi, A-R and Schwenk, J (2006) Linkable Democratic Group Signatures. IACR Cryptology ePrint Archive, 2006. p. 40.

Conference or Workshop Item

Ahmad, JJ, Li, SJ, Sadeghi, A-R and Schneider, T (2012) CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm In: FC 2012: Financial Cryptography and Data Security, 2012-02-27 - 2012-03-02, Bonaire, the Netherlands Antilles.

Li, SJ, Sadeghi, A-R, Heisrath, S, Schmitz, R and Ahmad, JJ (2012) hPIN/hTAN: A lightweight and low-cost e-banking solution against untrusted computers In: 15th International Conference on Financial Cryptography and Data Security (FC 2011), 2011-02-28 - 2011-03-04, Gros Islet, St. Lucia.

Li, SJ, Khayam, SA, Sadeghi, AR and Schmitz, R (2010) Breaking Randomized Linear Generation Functions based Virtual Password System In: 2010 IEEE International Conference on Communications (ICC 2010), 2010-05-23 - 2010-05-27, Cape Town, South Africa.

Li, SJ, Shah, SAH, Khan, MAU, Khayam, SA, Sadeghi, A-R and Schmitz, R (2010) Breaking e-banking CAPTCHAs In: 26th Annual Computer Security Applications Conference (ACSAC 2010), 2010-12-06 - 2010-12-10, Austin, TX, USA.

Li, SJ, Asghar, HJ, Pieprzyk, J, Sadeghi, AR, Schmitz, R and Wang, HX (2009) On the Security of PAS (Predicate-based Authentication Service) In: 25th Annual Computer Security Applications Conference (ACSAC 2009), 2009-12-07 - 2009-12-11, Honolulu, HI, USA.

Catuogno, L, Löhr, H, Manulis, M, Sadeghi, A-R and Winandy, M (2009) Transparent Mobile Storage Protection in Trusted Virtual Domains In: 23rd Large Installation System Administration Conference, 2009-11-01 - 2009-11-06, Baltimore, MD.

Chen, L, Escalante, AN, Löhr, H, Manulis, M and Sadeghi, A-R (2008) A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection against Splitting

Chen, L, Löhr, H, Manulis, M and Sadeghi, A-R (2008) Property-Based Attestation without a Trusted Third Party

Gajek, S, Manulis, M, Sadeghi, A-R and Schwenk, J (2008) Provably Secure Browser-Based User-Aware Mutual Authentication over TLS In: ACM Symposium on Information, Computer & Communication Security (ASIACCS '08), 2008-03-18 - 2008-03-20, Tokyo, Japan.

Armknecht, F, Escalante, AN, Löhr, H, Manulis, M and Sadeghi, A-R (2008) Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly

Gajek, S, Manulis, M, Pereira, O, Sadeghi, A-R and Schwenk, J (2008) Universally Composable Security Analysis of TLS.

Manulis, M, Sadeghi, A-R and Schwenk, J (2006) Linkable Democratic Group Signatures

Manulis, M and Sadeghi, A-R (2006) Property-Based Taming of Lying Mobile Nodes

Book

Pieprzyk, J, Sadeghi, AR and Manulis, M (2012) Cryptology and Network Security — CANS 2012 Lecture Notes in Computer Science, 7712 . UNSPECIFIED. ISBN 978-3-642-35403-8

Thesis

Sadeghi, Arjang (2002) Equivalent Earthquake Loads for Some Families of Barrel Vaults Doctoral thesis, University of Surrey.

Other

Li, SJ, Sadeghi, AR and Schmitz, R (2010) hPIN/hTAN: Low-Cost e-Banking Secure against Untrusted Computers .

This list was generated on Tue Sep 19 22:45:46 2017 UTC.

Information about this web site

© The University of Surrey, Guildford, Surrey, GU2 7XH, United Kingdom.
+44 (0)1483 300800