关注
Setareh Sharifian
Setareh Sharifian
在 intel.com 的电子邮件经过验证
标题
引用次数
引用次数
年份
Secret key agreement using a virtual wiretap channel
S Sharifian, F Lin, R Safavi-Naini
IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017
142017
Fuzzy Nash equilibrium in fuzzy games using ranking fuzzy numbers
A Chakeri, N Sadati, S Sharifian
International Conference on Fuzzy Systems, 1-5, 2010
132010
A capacity-achieving one-way key agreement with improved finite blocklength analysis
S Sharifian, A Poostindouz, R Safavi-Naini
2020 International Symposium on Information Theory and Its Applications …, 2020
112020
Linguisitc representation of Nash equilibriums in fuzzy games
S Sharifian, A Chakeri, F Sheikholeslam
2010 Annual Meeting of the North American Fuzzy Information Processing …, 2010
112010
Hash-then-encode: A modular semantically secure wiretap code
S Sharifian, F Lin, R Safavi-Naini
Proceedings of the 2nd Workshop on Communication Security: Cryptography and …, 2018
102018
A true random generator using human gameplay
M Alimomeni, R Safavi-Naini, S Sharifian
Decision and Game Theory for Security: 4th International Conference, GameSec …, 2013
102013
Identifiable cheating entity flexible round-optimized schnorr threshold (ICE FROST) signature protocol
A González, H Ratoanina, R Salen, S Sharifian, V Soukharev
Cryptology ePrint Archive, 2021
52021
Random number generation using human gameplay
S Sharifian
University of Calgary, 2016
52016
A modular semantically secure wiretap code with shared key for weakly symmetric channels
S Sharifian, R Safavi-Naini
2019 IEEE Information Theory Workshop (ITW), 1-5, 2019
32019
Post-quantum security using channel noise
S Sharifian, R Safavi-Naini, F Lin
Proceedings of the 2018 ACM SIGSAC Conference on computer and communications …, 2018
32018
Information-theoretic key encapsulation and its application to secure communication
S Sharifian, R Safavi-Naini
2021 IEEE International Symposium on Information Theory (ISIT), 2393-2398, 2021
22021
Information-theoretic Key Encapsulation and its Applications
S Sharifian, R Safavi-Naini
arXiv preprint arXiv:2102.02243, 2021
22021
Privacy-Preserving Resource Sharing Using Permissioned Blockchains: (The Case of Smart Neighbourhood)
S Avizheh, M Nabi, S Rahman, S Sharifian, R Safavi-Naini
Financial Cryptography and Data Security. FC 2021 International Workshops …, 2021
22021
A capacity-achieving one-message key agreement with finite blocklength analysis
S Sharifian, A Poostindouz, R Safavi-Naini
arXiv preprint arXiv:1905.04280, 2019
22019
A One-Round Key Agreement Protocol with Information-Theoretic Security.
S Sharifian, A Poostindouz, R Safavi-Naini
arXiv preprint arXiv:1905.04280, 2019
12019
A virtual wiretap channel for secure message transmission
S Sharifian, R Safavi-Naini, F Lin
Paradigms in Cryptology–Mycrypt 2016. Malicious and Exploratory Cryptology …, 2017
12017
CCA-Secure Hybrid Encryption in Correlated Randomness Model and KEM Combiners
S Panja, S Sharifian, S Jiang, R Safavi-Naini
arXiv preprint arXiv:2401.00983, 2024
2024
Encryption/decryption using key encapsulation/decapsulation
S Sharifian, R Safavi-Naeini
US Patent 11,601,260, 2023
2023
Hybrid Encryption in Correlated Randomness Model
R Safavi-Naini, S Sharifian
2021 IEEE Information Theory Workshop (ITW), 1-5, 2021
2021
Contributions to Information Theoretically Secure Communication
S Sharifian
Science, 2020
2020
系统目前无法执行此操作,请稍后再试。
文章 1–20