2025

[APS25] Ibtihal Alotaibi, Helen Petrie and Siamak F. Shahandashti. "Use of and Concerns about Online Authentication Technologies among British University Staff and Students". Late Breaking Work, BCS HCI 2025 (to appear).
 ePrint

[QWGS25] Aunam Quyoum, Mark Wong, Sebati Ghosh and Siamak F. Shahandashti. "Minoritised Ethnic People’s Security and Privacy Concerns and Responses towards Essential Online Services". SOUPS 2025: 259–278, USENIX, 2025.
 ePrint |  Open Proceedings Version |  BibTeX

[BAS25] Hina Binte Haq, Syed Taha Ali and Siamak F. Shahandashti. "Cuckoo's Nest: An Ultra-Lightweight DoS-Resilient Bitcoin Mempool". ICBC 2025, IEEE, 2025.
 ePrint |  DoI |  Code |  Dataset |  Slides | Follows  [BASMS25a] and  [BASMS25]

[BASMS25a] Hina Binte Haq, Syed Taha Ali, Asad Salman, Patrick McCorry and Siamak F. Shahandashti. "Carbyne: An Ultra-Lightweight DoS-Resilient Mempool for Bitcoin". Blockchain: Research and Applications: 100391, 2025.
 ePrint |  DoI (Open Access) |  Code |  Dataset | Follows  [BASMS25] and followed by  [BAS25]

[BASMS25] Hina Binte Haq, Syed Taha Ali, Asad Salman, Patrick McCorry and Siamak F. Shahandashti. "Neonpool: Reimagining cryptocurrency transaction pools for lightweight clients and IoT devices".
 ePrint |  Code | Followed by  [BASMS25a] and  [BAS25]


2024

[CBS24] Ali Cherry, Konstantinos Barmpis and Siamak F. Shahandashti. "The Emperor is Now Clothed: A Secure Governance Framework for Web User Authentication through Password Managers". ICICS 2024, LNCS 15057: 233–252, Springer, 2024.
 ePrint |  DoI |  Code |  BibTeX

[PSS24] Helen Petrie, Gayathri Sreekumar and Siamak F. Shahandashti. "Understanding users' mental models of Federated Identity Management (FIM): use of a new tangible elicitation method". HAISA 2024, IFIP AICT 721: 308–322, Springer, 2024.
 ePrint |  DoI |  BibTeX

[APS24] Najla Aldaraani, Helen Petrie, and Siamak F. Shahandashti. "A Diary Study to Understand Young Saudi Adult Users' Experiences of Online Security Threats". HAISA 2024, IFIP AICT 721: 47–60, Springer, 2024.
 ePrint |  DoI |  BibTeX | Related to  [APS23]

[BKPS24] Christopher Battarbee, Delaram Kahrobaei, Ludovic Perret, and Siamak F. Shahandashti. "A Subexponential Quantum Algorithm for the Semdirect Discrete Logarithm Problem". PQCrypto 2024, LNCS 14771: 202–226, 2024.
 ePrint |  DoI |  Slides |  Video |  BibTeX

[BKS24] Christopher Battarbee, Delaram Kahrobaei, and Siamak F. Shahandashti. "Semidirect Product Key Exchange: The State of Play". Journal of Algebra and Its Applications 23(07): 2550066, 2024.
 ePrint |  DoI


2023

[GBSK23] Henry Gray, Christopher Battarbee, Siamak F. Shahandashti, and Delaram Kahrobaei. "A novel attack on McEliece's cryptosystem". Int'l J. of Computer Mathematics: Computer Systems Theory 8(3): 178–191, 2023.
 DoI (Open Access) |  BibTeX

[BKPS23] Christopher Battarbee, Delaram Kahrobaei, Ludovic Perret, and Siamak F. Shahandashti. "SPDH-Sign: Towards Efficient, Post-quantum Group-Based Signatures". PQCrypto 2023, LNCS 14154: 113–138, Springer, 2023.
 ePrint |  DoI |  Slides |  Video |  BibTeX

[LWS23] Jenjira Lomchan, Rungrat Wiangsripanawan, and Siamak F. Shahandashti. "The Comparison of Password Composition Policies Among US, German, and Thailand Samples". JCSSE 2023: 213–218, IEEE, 2023.
 DoI |  BibTeX

[APS23] Najla Aldaraani, Helen Petrie, and Siamak F. Shahandashti. "Online Security Attack Experience and Worries of Young Adults in the Kingdom of Saudi Arabia". HAISA 2023, IFIP AICT 674: 364–376, Springer, 2023.
 ePrint |  DoI |  BibTeX | Related to  [APS22] and  [APS24]

[TSP23] Dan Turner, Siamak F. Shahandashti, and Helen Petrie. "The Effect of Length on Key Fingerprint Verification Security and Usability". ARES 2023: 23: 1–11, 2023.
 ePrint |  DoI |  Slides |  BibTeX


2022

[APS22] Najla Aldaraani, Helen Petrie, and Siamak F. Shahandashti. "Online Security Attack Experience and Worries of Young Adults in the United Kingdom". HAISA 2022, IFIP AICT 658: 300–309, Springer, 2022.
 ePrint |  DoI |  BibTeX | Related to  [APS23]

[IVS22a] Philokypros P. Ioulianou, Vassilios G. Vassilakis, and Siamak F. Shahandashti. "ML-Based Detection of Blackhole and Rank Attacks in RPL Networks". CSNDSP 2022: 338–343, IEEE, 2022.
 ePrint |  DoI |  BibTeX

[BKTS22] Christopher Battarbee, Delaram Kahrobaei, Dylan Tailor, and Siamak F. Shahandashti. "On the Efficiency of A General Attack against the MOBS Cryptosystem". Journal of Mathematical Cryptology 16(1): 289–297, 2022.
 ePrint |  DoI (Open Access) |  Code |  BibTeX

[BKS22] Christopher Battarbee, Delaram Kahrobaei, and Siamak F. Shahandashti. "Cryptanalysis of Semidirect Product Key Exchange Using Matrices Over Non-Commutative Rings". Mathematical Cryptology 1(2): 2–9, 2022.
 ePrint |  Open Journal Version

[IVS22] Philokypros P. Ioulianou, Vassilios G. Vassilakis, and Siamak F. Shahandashti. "A Trust-Based Intrusion Detection System for RPL Networks: Detecting a Combination of Rank and Blackhole Attacks". J. Cybersecur. Priv. 2(1): 124–153, 2022.
 DoI (Open Access)


2021

[MMTSH21] Patrick Mccorry, Maryam Mehrnezhad, Ehsan Toreini, Siamak F. Shahandashti, and Feng Hao. "On Secure E-Voting over Blockchain". Digital Threats: Research and Practice 2(4): Article 33, ACM, 2021.
 DoI (Open Access)

[LPSF21] Lee Livsey, Helen Petrie, Siamak F. Shahandashti, and Aidan Fray. "Performance and Usability of Visual and Verbal Verification of Word-based Key Fingerprints". HAISA 2021, IFIP AICT 613: 199–210, Springer, 2021.
 ePrint |  DoI |  BibTeX

[KS21] George Kampanos and Siamak F. Shahandashti. "Accept All: The Landscape of Cookie Banners in Greece and the UK". IFIP SEC 2021, IFIP Advances in Information & Communication Technology 625: 213–227, Springer, 2021.
 ePrint |  DoI |  Code |  BibTeX

[MSMH21] Paolo Modesti, Siamak F. Shahandashti, Patrick McCorry, and Feng Hao. "Formal Modelling and Security Analysis of Bitcoin's Payment Protocol". Computers & Security 107: 102279, Elsevier, 2021.
 ePrint |  DoI |  BibTeX | Extension of  [MSH16]


2020

[YFA+20] Poonam Yadav, Angelo Feraudo, Budi Arief, Siamak F. Shahandashti, and Vassilios G. Vassilakis. "Position paper: A systematic framework for categorising IoT device fingerprinting mechanisms". Workshop on Challenges in Artificial Intelligence and Machine Learning (AIChallengeIoT 2020): 62–68, ACM, 2020.
 ePrint |  DoI |  BibTeX

[HWB+20] Feng Hao, Shen Wang, Samiran Bag, Rob Procter, Siamak F. Shahandashti, Maryam Mehrnezhad, Ehsan Toreini, Roberto Metere, and Lana Liu. "End-to-End Verifiable E-Voting Trial for Polling Station Voting". IEEE Security & Privacy 18(6): 6–13, IEEE, 2020.
 ePrint |  DoI |  BibTeX | Trial of  [SH16]

[CS20] Michael Carr and Siamak F. Shahandashti. "Revisiting Security Vulnerabilities in Commercial Password Managers". IFIP SEC 2020, IFIP Advances in Information & Communication Technology 580: 265–279, Springer, 2020.
 ePrint |  DoI |  Abstract & Media Coverage |  BibTeX

[SPI+20] Ryan Smith, Daniel Palin, Philokypros P. Ioulianou, Vassilios G. Vassilakis, and Siamak F. Shahandashti. "Battery Draining Attacks against Edge Computing Nodes in IoT Networks". Cyber-Physical Systems, 6(2): 96–116, 2020.
 ePrint |  DoI |  BibTeX

[BHSR20] Samiran Bag, Feng Hao, Siamak F. Shahandashti, and Indranil G. Ray. "SEAL: Sealed-Bid Auction without Auctioneers". IEEE Transactions on Information Forensics & Security 15: 2042–2052, 2020.
 ePrint |  DoI |  BibTeX


2019

[TMSH19] Ehsan Toreini, Maryam Mehrnezhad, Siamak F. Shahandashti, and Feng Hao. "DOMtegrity: Ensuring Web Page Integrity against Malicious Browser Extensions". International Journal of Information Security, 18(6): 801–814, Springer, 2019.
 ePrint |  DoI (Open Access) |  Code |  BibTeX


2018

[HMSD18] Feng Hao, Roberto Metere, Siamak F. Shahandashti, and Changyu Dong. "Analysing and Patching SPEKE in ISO/IEC". IEEE Transactions on Information Forensics & Security 13(11): 2844–2855, IEEE, 2018.
 ePrint |  DoI |  Code |  BibTeX

[ASS18] Sepideh Avizheh, Reihaneh Safavi-Naini, and Siamak F. Shahandashti. "A New Look at the Refund Mechanism in the Bitcoin Payment Protocol". FC 2018, LNCS 10957, pp. 369–387, Springer, 2018.
 ePrint |  DoI |  BibTeX

[MTSH18] Maryam Mehrnezhad, Ehsan Toreini, Siamak F. Shahandashti, and Feng Hao. "Stealing PINs via Mobile Sensors: Actual Risk versus User Perception". International Journal of Information Security, 17(3): 291–313, Springer, 2018.
 ePrint |  DoI (Open Access) |  Code |  BibTeX | Journal version of  [MTSH16b]

[HCRS18] Feng Hao, Dylan Clarke, Brian Randell, and Siamak F. Shahandashti. "Verifiable Classroom Voting in Practice". IEEE Security & Privacy, 16(1): 72–81, IEEE, 2018.
 ePrint |  DoI |  BibTeX


2017

[TSH17] Ehsan Toreini, Siamak F. Shahandashti, and Feng Hao. "Texture to the Rescue: Practical Paper Fingerprinting based on Texture Patterns". ACM Transactions on Privacy and Security (TOPS): 20(3), Article No. 9, ACM, 2017.
 ePrint |  DoI |  Abstract & Media Coverage |  BibTeX

[MSH17] Patrick McCorry, Siamak F. Shahandashti, and Feng Hao. "A Smart Contract for Boardroom Voting with Maximum Voter Privacy". FC 2017, LNCS 10322, pp. 357–375, Springer, 2017.
 ePrint |  DoI |  Code |  Abstract & Media Coverage |  BibTeX


2016

[SH16] Siamak F. Shahandashti and Feng Hao. "DRE-ip: A Verifiable E-Voting Scheme without Tallying Authorities". ESORICS 2016, LNCS 9879, pp. 223–240, Springer, 2016.
 ePrint |  DoI |  BibTeX | Trial:  [HWB+20]

[MTSH16b] Maryam Mehrnezhad, Ehsan Toreini, Siamak F. Shahandashti, and Feng Hao. "Stealing PINs via Mobile Sensors: Actual Risk versus User Perception". EuroUSEC 2016.
 ePrint |  Slides | Journal version:  [MTSH18]

[MMSH16] Patrick McCorry, Malte Möser, Siamak F. Shahandashti, and Feng Hao. "Towards Bitcoin Payment Networks". ACISP 2016, LNCS 9722, pp. 57–76, Springer, 2016.
 ePrint |  DoI |  BibTeX

[Sha16] Siamak F. Shahandashti. "Electoral Systems Used around the World". Real-World Electronic Voting: Design, Analysis and Deployment. Hao and Ryan (eds), Series in Security, Privacy and Trust, pp. 77–102, CRC Press, 2016.
 ePrint |  DoI (book)

[LS16] Peter Hyun-Jeen Lee and Siamak F. Shahandashti. "Theoretical Attacks on E2E Voting Systems". Real-World Electronic Voting: Design, Analysis and Deployment. Hao and Ryan (eds), Series in Security, Privacy and Trust, pp. 219–236, CRC Press, 2016.
 ePrint |  DoI (book)

[MSH16] Patrick McCorry, Siamak F. Shahandashti, and Feng Hao. "Refund Attacks on Bitcoin's Payment Protocol". FC 2016, LNCS 9603, pp. 581–599, Springer, 2016.
 ePrint |  DoI |  BibTeX | Extension:  [MSMH21]

[MTSH16a] Maryam Mehrnezhad, Ehsan Toreini, Siamak F. Shahandashti, and Feng Hao. "TouchSignatures: Identification of User Touch Actions and PINs Based on Mobile Sensor Data via JavaScript". Journal of Information Security and Applications, 26: 23–38, Elsevier, 2016.
 ePrint |  DoI |  Abstract, Industry Impact & Media Coverage |  BibTeX | Journal version of  [MTSH15]


2015

[MSCH15] Patrick McCorry, Siamak F. Shahandashti, Dylan Clarke, and Feng Hao. "Authenticated Key Exchange over Bitcoin". SSR 2015, LNCS 9497, pp. 3–20, Springer, 2015.
 ePrint |  DoI |  BibTeX

[MHS15] Maryam Mehrnezhad, Feng Hao, and Siamak F. Shahandashti. "Tap-Tap and Pay (TTP): Preventing The Mafia Attack in NFC Payment". SSR 2015, LNCS 9497, pp. 21–39, Springer, 2015.
 ePrint |  DoI |  BibTeX

[SSS15] Siamak F. Shahandashti, Reihaneh Safavi-Naini, and Nashad Ahmed Safa. "Reconciling User Privacy and Implicit Authentication for Mobile Devices". Computers & Security 53: 215–233, Elsevier, 2015.
 ePrint |  DoI |  BibTeX | Journal version of  [SSS14]

[HCS15] Feng Hao, Xun Yi, Liqun Chen, and Siamak F. Shahandashti. "The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group". In ACM Workshop on IoT Privacy, Trust, and Security (IoTPTS '15), pp. 27–34, ACM, 2015.
 ePrint |  DoI |  BibTeX

[MTSH15] Maryam Mehrnezhad, Ehsan Toreini, Siamak F. Shahandashti, and Feng Hao. "TouchSignatures: Identification of User Touch Actions Based on Mobile Sensors via JavaScript". ASIACCS 2015, p. 673, ACM, 2015.
 DoI |  BibTeX | Journal version:  [MTSH16a]


2014

[HS14] Feng Hao and Siamak F. Shahandashti. "The SPEKE Protocol Revisited". SSR 2014, LNCS 8893, pp. 26–38, Springer, 2014.
 ePrint |  DoI |  BibTeX

[HKR+14] Feng Hao, Matthew N. Kreeger, Brian Randell, Dylan Clarke, Siamak F. Shahandashti, and Peter Hyun-Jeen Lee. "Every Vote Counts: Ensuring Integrity in Large-Scale Electronic Voting". USENIX Journal of Election Technology and Systems (JETS) 2(3): 1–25, USENIX Association, 2014.
 Journal Paper (Open Access) |  BibTeX

[SSS14] Nashad Ahmed Safa, Reihaneh Safavi-Naini and Siamak F. Shahandashti. "Privacy-Preserving Implicit Authentication". SEC 2014, IFIP AICT 428, pp. 471–484, Springer, 2014.
 ePrint |  DoI |  Slides |  BibTeX | Journal version:  [SSS15]


2013

[PPSS13] Duong-Hieu Phan, David Pointcheval, Siamak F. Shahandashti, and Mario Strefler. "Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts". International Journal of Information Security 12(4): 251–265, Springer, 2013.
 ePrint |  DoI |  BibTeX | Journal version of  [PPSS12]


2012

[SPSS12] Reza Sepahi, Josef Pieprzyk, Siamak F. Shahandashti, and Berry Schoenmakers. "New Security Notions and Relations for Public-Key Encryption". Journal of Mathematical Cryptology 6(3-4): 183–227, De Gruyter, 2012.
 DoI |  BibTeX

[PPSS12] Duong-Hieu Phan, David Pointcheval, Siamak F. Shahandashti, and Mario Strefler. "Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts". ACISP 2012, LNCS 7372, pp. 308–321, Springer, 2012.
 ePrint |  DoI |  BibTeX | Journal version:  [PPSS13]

[SSO12] Siamak F. Shahandashti, Reihaneh Safavi-Naini, and Philip Ogunbona. "Private Fingerprint Matching". ACISP 2012, LNCS 7372, pp. 426–433, Springer, 2012.
 ePrint |  DoI |  Slides |  BibTeX

[HJSS12] M. Jason Hinek, Shaoquan Jiang, Reihaneh Safavi-Naini, and Siamak F. Shahandashti. "Attribute-Based Encryption without Key Cloning". Int'l Journal of Applied Cryptography 2(3): 250–270, InderScience, 2012.
 ePrint |  DoI |  BibTeX


2009

[SS09b] Siamak F. Shahandashti and Reihaneh Safavi-Naini. "Generic Constructions for Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures". IET Information Security 3(4): 152–176, IET, 2009.
 ePrint |  DoI |  BibTeX

[Sha09] Siamak F. Shahandashti. "Contributions to Secure and Privacy-Preserving Use of Electronic Credentials". PhD Thesis. University of Wollongong, Australia. 2009.
 Soft copy |  Hard copy

[SS09a] Siamak F. Shahandashti and Reihaneh Safavi-Naini. "Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems". AfricaCrypt 2009, LNCS 5580, pp. 198–216, Springer, 2009.
 ePrint |  DoI |  BibTeX


2008

[SS08] Siamak F. Shahandashti and Reihaneh Safavi-Naini. "Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures". PKC 2008, LNCS 4939, pp. 121–140, Springer, 2008.
 ePrint |  DoI |  Slides |  BibTeX


2007

[SSB07] Siamak F. Shahandashti, Reihaneh Safavi-Naini, and Joonsang Baek. "Concurrently-Secure Credential Ownership Proofs". ASIACCS 2007, pp. 161–172, ACM, 2007.
 ePrint |  DoI |  BibTeX


2005

[Sha05] Siamak F. Shahandashti. "Provably-Secure Homomorphic Digital Signatures". MSc Thesis. Sharif University of Technology, Tehran, Iran. 2005.
 Hard copy | Main results published in  [SSM05]

[SSM05] Siamak F. Shahandashti, Mahmoud Salmasizadeh, and Javad Mohajeri. "A Provably Secure Short Transitive Signature Scheme from Bilinear Group Pairs". SCN 2004. LNCS 3352, pp. 60–76, Springer, 2005.
 ePrint |  DoI |  BibTeX | Published results of  [Sha05]