An efficient signature scheme from bilinear pairings and its applications F Zhang, R Safavi-Naini, W Susilo Public Key Cryptography–PKC 2004: 7th International Workshop on Theory and …, 2004 | 732 | 2004 |
Public key encryption with keyword search revisited J Baek, R Safavi-Naini, W Susilo Computational Science and Its Applications–ICCSA 2008: International …, 2008 | 731 | 2008 |
Digital rights management for content distribution Q Liu, R Safavi-Naini, NP Sheppard Conferences in Research and Practice in Information Technology Series 34, 49-58, 2003 | 628 | 2003 |
Privacy preserving EHR system using attribute-based infrastructure S Narayan, M Gagné, R Safavi-Naini Proceedings of the 2010 ACM workshop on Cloud computing security workshop, 47-52, 2010 | 395 | 2010 |
Certificateless public key encryption without pairing J Baek, R Safavi-Naini, W Susilo International conference on information security, 134-148, 2005 | 307 | 2005 |
Threshold attribute-based signatures and their application to anonymous credential systems SF Shahandashti, R Safavi-Naini Progress in Cryptology–AFRICACRYPT 2009: Second International Conference on …, 2009 | 289 | 2009 |
Cancelable key-based fingerprint templates R Ang, R Safavi-Naini, L McAven Australasian conference on information security and privacy, 242-252, 2005 | 246 | 2005 |
Efficient multi-receiver identity-based encryption and its application to broadcast encryption J Baek, R Safavi-Naini, W Susilo Public Key Cryptography-PKC 2005: 8th International Workshop on Theory and …, 2005 | 245 | 2005 |
Cryptographic hash functions: A survey S Bakhtiari, R Safavi-Naini, J Pieprzyk Technical Report 95-09, Department of Computer Science, University of Wollongong, 1995 | 223 | 1995 |
Digital License Sharing System and Method Q Liu, R Safavi-Naini, N Sheppard US Patent App. 10/599,517, 2007 | 207 | 2007 |
Efficient verifiably encrypted signature and partially blind signature from bilinear pairings F Zhang, R Safavi-Naini, W Susilo Progress in Cryptology-INDOCRYPT 2003: 4th International Conference on …, 2003 | 193 | 2003 |
New proxy signature, proxy blind signature and proxy ring signature schemes from bilinear pairing F Zhang, R Safavi-Naini, CY Lin Cryptology ePrint Archive, 2003 | 154 | 2003 |
A survey of identity-based cryptography J Baek, J Newmarch, R Safavi-Naini, W Susilo Proc. of Australian Unix Users Group Annual Conference, 95-102, 2004 | 153 | 2004 |
On the integration of public key data encryption and public key encryption with keyword search J Baek, R Safavi-Naini, W Susilo Information Security: 9th International Conference, ISC 2006, Samos Island …, 2006 | 151 | 2006 |
Linear authentication codes: bounds and constructions H Wang, C Xing, R Safavi-Naini IEEE Transactions on Information Theory 49 (4), 866-872, 2003 | 129 | 2003 |
Threshold attribute-based signcryption M Gagné, S Narayan, R Safavi-Naini International Conference on Security and Cryptography for Networks, 154-171, 2010 | 125 | 2010 |
Web filtering using text classification R Du, R Safavi-Naini, W Susilo The 11th IEEE International Conference on Networks, 2003. ICON2003., 325-330, 2003 | 109 | 2003 |
Sequential traitor tracing R Safavi-Naini, Y Wang IEEE Transactions on Information Theory 49 (5), 1319-1326, 2003 | 109 | 2003 |
Collusion Secure q-ary Fingerprinting for Perceptual Content R Safavi-Naini, Y Wang Security and Privacy in Digital Rights Management: ACM CCS-8 Workshop DRM …, 2002 | 94 | 2002 |
Multireceiver authentication codes: models, bounds, constructions, and extensions R Safavi-Naini, H Wang Information and Computation 151 (1-2), 148-172, 1999 | 93 | 1999 |