Lost: location based storage GJ Watson, R Safavi-Naini, M Alimomeni, ME Locasto, S Narayan Proceedings of the 2012 ACM Workshop on Cloud computing security workshop, 59-70, 2012 | 75 | 2012 |
Guessing secrecy M Alimomeni, R Safavi-Naini Information Theoretic Security: 6th International Conference, ICITS 2012 …, 2012 | 26 | 2012 |
A true random generator using human gameplay M Alimomeni, R Safavi-Naini, S Sharifian Decision and Game Theory for Security: 4th International Conference, GameSec …, 2013 | 10 | 2013 |
Performance analysis of linux rng in virtualized environments R Kumari, M Alimomeni, R Safavi-Naini Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop, 29-39, 2015 | 9 | 2015 |
Human assisted randomness generation using video games M Alimomeni, R Safavi-Naini Information Security: 16th International Conference, ISC 2013, Dallas, Texas …, 2015 | 9 | 2015 |
How to Prevent to Delegate Authentication M Alimomeni, R Safavi-Naini International Conference on Security and Privacy in Communication Systems …, 2015 | 4 | 2015 |
New notions of secrecy and user generated randomness in Cryptography M Alimomeni University of Calgary, 2014 | 4 | 2014 |
A note on the minimum interval cost flow problem H Daneshpajouh, M Alimomeni Applied Mathematics and Computation 217 (17), 7051-7052, 2011 | 1 | 2011 |
Modelling request sequences in online-connected video games M Luther, M Alimomeni US Patent 11,734,547, 2023 | | 2023 |
Two‐level security for message sequences M Alimomeni, R Safavi‐Naini Security and Communication Networks 9 (12), 1759-1768, 2016 | | 2016 |
How to Delegate Authentication M Alimomeni, R Safavi-Naini Security and Privacy in Communication Networks. 11th International …, 2016 | | 2016 |