2024
[CBS24]
Ali Cherry, Konstantinos Barmpis and Siamak F. Shahandashti.
"The Emperor is Now Clothed: A Secure Governance Framework for Web User Authentication through Password Managers".
ICICS 2024 (to appear).
ePrint
| Code
[PSS24]
Helen Petrie, Gayathri Sreekumar and Siamak F. Shahandashti.
"Understanding users' mental models of Federated Identity Management (FIM): use of a new tangible elicitation method".
HAISA 2024 (to appear).
ePrint
[APS24]
Najla Aldaraani, Helen Petrie, and Siamak F. Shahandashti.
"A Diary Study to Understand Young Saudi Adult Users' Experiences of Online Security Threats".
HAISA 2024 (to appear).
ePrint
| Related to [APS23]
[BKPS24]
Christopher Battarbee, Delaram Kahrobaei, Ludovic Perret, and Siamak F. Shahandashti.
"A Subexponential Quantum Algorithm for the Semdirect Discrete Logarithm Problem".
PQCrypto 2024, LNCS 14771: 202–226, 2024.
ePrint
| DoI
| Slides
| Video
| BibTeX
[BKS24]
Christopher Battarbee, Delaram Kahrobaei, and Siamak F. Shahandashti.
"Semidirect Product Key Exchange: The State of Play".
Journal of Algebra and Its Applications 23(07): 2550066, 2024.
ePrint
| DoI
2023
[GBSK23]
Henry Gray, Christopher Battarbee, Siamak F. Shahandashti, and Delaram Kahrobaei.
"A novel attack on McEliece's cryptosystem".
Int'l J. of Computer Mathematics: Computer Systems Theory 8(3): 178–191, 2023.
DoI (Open Access)
| BibTeX
[BKPS23]
Christopher Battarbee, Delaram Kahrobaei, Ludovic Perret, and Siamak F. Shahandashti.
"SPDH-Sign: Towards Efficient, Post-quantum Group-Based Signatures".
PQCrypto 2023, LNCS 14154: 113–138, Springer, 2023.
ePrint
| DoI
| Slides
| Video
| BibTeX
[LWS23]
Jenjira Lomchan, Rungrat Wiangsripanawan, and Siamak F. Shahandashti.
"The Comparison of Password Composition Policies Among US, German, and Thailand Samples".
JCSSE 2023: 213–218, IEEE, 2023.
DoI
| BibTeX
[APS23]
Najla Aldaraani, Helen Petrie, and Siamak F. Shahandashti.
"Online Security Attack Experience and Worries of Young Adults in the Kingdom of Saudi Arabia".
HAISA 2023, IFIP AICT 674: 364–376, Springer, 2023.
ePrint
| DoI
| BibTeX
| Related to [APS22] and [APS24]
[TSP23]
Dan Turner, Siamak F. Shahandashti, and Helen Petrie.
"The Effect of Length on Key Fingerprint Verification Security and Usability".
ARES 2023: 23: 1–11, 2023.
ePrint
| DoI
| Slides
| BibTeX
2022
[APS22]
Najla Aldaraani, Helen Petrie, and Siamak F. Shahandashti.
"Online Security Attack Experience and Worries of Young Adults in the United Kingdom".
HAISA 2022, IFIP AICT 658: 300–309, Springer, 2022.
ePrint
| DoI
| BibTeX
| Related to [APS23]
[IVS22a]
Philokypros P. Ioulianou, Vassilios G. Vassilakis, and Siamak F. Shahandashti.
"ML-Based Detection of Blackhole and Rank Attacks in RPL Networks".
CSNDSP 2022: 338–343, IEEE, 2022.
ePrint |
DoI |
BibTeX
[BKTS22]
Christopher Battarbee, Delaram Kahrobaei, Dylan Tailor, and Siamak F. Shahandashti.
"On the Efficiency of A General Attack against the MOBS Cryptosystem".
Journal of Mathematical Cryptology 16(1): 289–297, 2022.
ePrint |
DoI (Open Access) |
Code
| BibTeX
[BKS22]
Christopher Battarbee, Delaram Kahrobaei, and Siamak F. Shahandashti.
"Cryptanalysis of Semidirect Product Key Exchange Using Matrices Over Non-Commutative Rings".
Mathematical Cryptology 1(2): 2–9, 2022.
ePrint |
Open Journal Version
[IVS22]
Philokypros P. Ioulianou, Vassilios G. Vassilakis, and Siamak F. Shahandashti.
"A Trust-Based Intrusion Detection System for RPL Networks: Detecting a Combination of Rank and Blackhole Attacks".
J. Cybersecur. Priv. 2(1): 124–153, 2022.
DoI (Open Access)
2021
[MMTSH21]
Patrick Mccorry, Maryam Mehrnezhad, Ehsan Toreini, Siamak F. Shahandashti, and Feng Hao.
"On Secure E-Voting over Blockchain".
Digital Threats: Research and Practice 2(4): Article 33, ACM, 2021.
DoI (Open Access)
[LPSF21]
Lee Livsey, Helen Petrie, Siamak F. Shahandashti, and Aidan Fray.
"Performance and Usability of Visual and Verbal Verification of Word-based Key Fingerprints".
HAISA 2021, IFIP AICT 613: 199–210, Springer, 2021.
ePrint |
DoI |
BibTeX
[KS21]
George Kampanos and Siamak F. Shahandashti.
"Accept All: The Landscape of Cookie Banners in Greece and the UK".
IFIP SEC 2021, IFIP Advances in Information & Communication Technology 625: 213–227, Springer, 2021.
ePrint |
DoI |
Code |
BibTeX
[MSMH21]
Paolo Modesti, Siamak F. Shahandashti, Patrick McCorry, and Feng Hao.
"Formal Modelling and Security Analysis of Bitcoin's Payment Protocol".
Computers & Security 107: 102279, Elsevier, 2021.
ePrint |
DoI |
BibTeX |
Extension of [MSH16]
2020
[YFA+20]
Poonam Yadav, Angelo Feraudo, Budi Arief, Siamak F. Shahandashti, and Vassilios G. Vassilakis.
"Position paper: A systematic framework for categorising IoT device fingerprinting mechanisms".
Workshop on Challenges in Artificial Intelligence and Machine Learning (AIChallengeIoT 2020): 62–68, ACM, 2020.
ePrint |
DoI |
BibTeX
[HWB+20]
Feng Hao, Shen Wang, Samiran Bag, Rob Procter, Siamak F. Shahandashti, Maryam Mehrnezhad, Ehsan Toreini, Roberto Metere, and Lana Liu.
"End-to-End Verifiable E-Voting Trial for Polling Station Voting".
IEEE Security & Privacy 18(6): 6–13, IEEE, 2020.
ePrint |
DoI |
BibTeX |
Trial of [SH16]
[CS20]
Michael Carr and Siamak F. Shahandashti.
"Revisiting Security Vulnerabilities in Commercial Password Managers".
IFIP SEC 2020, IFIP Advances in Information & Communication Technology 580: 265–279, Springer, 2020.
ePrint |
DoI |
Abstract & Media Coverage |
BibTeX
[SPI+20]
Ryan Smith, Daniel Palin, Philokypros P. Ioulianou, Vassilios G. Vassilakis, and Siamak F. Shahandashti.
"Battery Draining Attacks against Edge Computing Nodes in IoT Networks".
Cyber-Physical Systems, 6(2): 96–116, 2020.
ePrint |
DoI |
BibTeX
[BHSR20]
Samiran Bag, Feng Hao, Siamak F. Shahandashti, and Indranil G. Ray.
"SEAL: Sealed-Bid Auction without Auctioneers".
IEEE Transactions on Information Forensics & Security 15: 2042–2052, 2020.
ePrint |
DoI |
BibTeX
2019
[TMSH19]
Ehsan Toreini, Maryam Mehrnezhad, Siamak F. Shahandashti, and Feng Hao.
"DOMtegrity: Ensuring Web Page Integrity against Malicious Browser Extensions".
International Journal of Information Security, 18(6): 801–814, Springer, 2019.
ePrint |
DoI (Open Access) |
Code |
BibTeX
2018
[HMSD18]
Feng Hao, Roberto Metere, Siamak F. Shahandashti, and Changyu Dong.
"Analysing and Patching SPEKE in ISO/IEC".
IEEE Transactions on Information Forensics & Security 13(11): 2844–2855, IEEE, 2018.
ePrint |
DoI |
Code |
BibTeX
[ASS18]
Sepideh Avizheh, Reihaneh Safavi-Naini, and Siamak F. Shahandashti.
"A New Look at the Refund Mechanism in the Bitcoin Payment Protocol".
FC 2018, LNCS 10957, pp. 369–387, Springer, 2018.
ePrint |
DoI |
BibTeX
[MTSH18]
Maryam Mehrnezhad, Ehsan Toreini, Siamak F. Shahandashti, and Feng Hao.
"Stealing PINs via Mobile Sensors: Actual Risk versus User Perception".
International Journal of Information Security, 17(3): 291–313, Springer, 2018.
ePrint |
DoI (Open Access) |
Code |
BibTeX |
Journal version of [MTSH16b]
[HCRS18]
Feng Hao, Dylan Clarke, Brian Randell, and Siamak F. Shahandashti.
"Verifiable Classroom Voting in Practice".
IEEE Security & Privacy, 16(1): 72–81, IEEE, 2018.
ePrint |
DoI |
BibTeX
2017
[TSH17]
Ehsan Toreini, Siamak F. Shahandashti, and Feng Hao.
"Texture to the Rescue: Practical Paper Fingerprinting based on Texture Patterns".
ACM Transactions on Privacy and Security (TOPS): 20(3), Article No. 9, ACM, 2017.
ePrint |
Open Journal Version |
DoI |
Abstract & Media Coverage |
BibTeX
[MSH17]
Patrick McCorry, Siamak F. Shahandashti, and Feng Hao.
"A Smart Contract for Boardroom Voting with Maximum Voter Privacy".
FC 2017, LNCS 10322, pp. 357–375, Springer, 2017.
ePrint |
DoI |
Code |
Abstract & Media Coverage |
BibTeX
2016
[SH16]
Siamak F. Shahandashti and Feng Hao.
"DRE-ip: A Verifiable E-Voting Scheme without Tallying Authorities".
ESORICS 2016, LNCS 9879, pp. 223–240, Springer, 2016.
ePrint |
DoI |
BibTeX |
Trial: [HWB+20]
[MTSH16b]
Maryam Mehrnezhad, Ehsan Toreini, Siamak F. Shahandashti, and Feng Hao.
"Stealing PINs via Mobile Sensors: Actual Risk versus User Perception".
EuroUSEC 2016.
ePrint |
Slides |
Journal version: [MTSH18]
[MMSH16]
Patrick McCorry, Malte Möser, Siamak F. Shahandashti, and Feng Hao.
"Towards Bitcoin Payment Networks".
ACISP 2016, LNCS 9722, pp. 57–76, Springer, 2016.
ePrint |
DoI |
BibTeX
[Sha16]
Siamak F. Shahandashti.
"Electoral Systems Used around the World".
Real-World Electronic Voting: Design, Analysis and Deployment.
Hao and Ryan (eds), Series in Security, Privacy and Trust, pp. 77–102, CRC Press, 2016.
ePrint |
DoI (book)
[LS16]
Peter Hyun-Jeen Lee and Siamak F. Shahandashti.
"Theoretical Attacks on E2E Voting Systems".
Real-World Electronic Voting: Design, Analysis and Deployment.
Hao and Ryan (eds), Series in Security, Privacy and Trust, pp. 219–236, CRC Press, 2016.
ePrint |
DoI (book)
[MSH16]
Patrick McCorry, Siamak F. Shahandashti, and Feng Hao.
"Refund Attacks on Bitcoin's Payment Protocol".
FC 2016, LNCS 9603, pp. 581–599, Springer, 2016.
ePrint |
DoI |
BibTeX |
Extension: [MSMH21]
[MTSH16a]
Maryam Mehrnezhad, Ehsan Toreini, Siamak F. Shahandashti, and Feng Hao.
"TouchSignatures: Identification of User Touch Actions and PINs Based on Mobile Sensor Data via JavaScript".
Journal of Information Security and Applications, 26: 23–38, Elsevier, 2016.
ePrint |
DoI |
Abstract, Industry Impact & Media Coverage |
BibTeX |
Journal version of [MTSH15]
2015
[MSCH15]
Patrick McCorry, Siamak F. Shahandashti, Dylan Clarke, and Feng Hao.
"Authenticated Key Exchange over Bitcoin".
SSR 2015, LNCS 9497, pp. 3–20, Springer, 2015.
ePrint |
DoI |
BibTeX
[MHS15]
Maryam Mehrnezhad, Feng Hao, and Siamak F. Shahandashti.
"Tap-Tap and Pay (TTP): Preventing The Mafia Attack in NFC Payment".
SSR 2015, LNCS 9497, pp. 21–39, Springer, 2015.
ePrint |
DoI |
BibTeX
[SSS15]
Siamak F. Shahandashti, Reihaneh Safavi-Naini, and Nashad Ahmed Safa.
"Reconciling User Privacy and Implicit Authentication for Mobile Devices".
Computers & Security 53: 215–233, Elsevier, 2015.
ePrint |
DoI |
BibTeX |
Journal version of [SSS14]
[HCS15]
Feng Hao, Xun Yi, Liqun Chen, and Siamak F. Shahandashti.
"The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group".
In ACM Workshop on IoT Privacy, Trust, and Security (IoTPTS '15), pp. 27–34, ACM, 2015.
ePrint |
DoI |
BibTeX
[MTSH15]
Maryam Mehrnezhad, Ehsan Toreini, Siamak F. Shahandashti, and Feng Hao.
"TouchSignatures: Identification of User Touch Actions Based on Mobile Sensors via JavaScript".
ASIACCS 2015, p. 673, ACM, 2015.
DoI |
BibTeX |
Journal version: [MTSH16a]
2014
[HS14]
Feng Hao and Siamak F. Shahandashti.
"The SPEKE Protocol Revisited".
SSR 2014, LNCS 8893, pp. 26–38, Springer, 2014.
ePrint |
DoI |
BibTeX
[HKR+14]
Feng Hao, Matthew N. Kreeger, Brian Randell, Dylan Clarke, Siamak F. Shahandashti, and Peter Hyun-Jeen Lee.
"Every Vote Counts: Ensuring Integrity in Large-Scale Electronic Voting".
USENIX Journal of Election Technology and Systems (JETS) 2(3): 1–25, USENIX Association, 2014.
Journal Paper (Open Access) |
BibTeX
[SSS14]
Nashad Ahmed Safa, Reihaneh Safavi-Naini and Siamak F. Shahandashti.
"Privacy-Preserving Implicit Authentication".
SEC 2014, IFIP AICT 428, pp. 471–484, Springer, 2014.
ePrint |
DoI |
Slides |
BibTeX |
Journal version: [SSS15]
2013
[PPSS13]
Duong-Hieu Phan, David Pointcheval, Siamak F. Shahandashti, and Mario Strefler.
"Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts".
International Journal of Information Security 12(4): 251–265, Springer, 2013.
ePrint |
DoI |
BibTeX |
Journal version of [PPSS12]
2012
[SPSS12]
Reza Sepahi, Josef Pieprzyk, Siamak F. Shahandashti, and Berry Schoenmakers.
"New Security Notions and Relations for Public-Key Encryption".
Journal of Mathematical Cryptology 6(3-4): 183–227, De Gruyter, 2012.
DoI |
BibTeX
[PPSS12]
Duong-Hieu Phan, David Pointcheval, Siamak F. Shahandashti, and Mario Strefler.
"Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts".
ACISP 2012, LNCS 7372, pp. 308–321, Springer, 2012.
ePrint |
DoI |
BibTeX |
Journal version: [PPSS13]
[SSO12]
Siamak F. Shahandashti, Reihaneh Safavi-Naini, and Philip Ogunbona.
"Private Fingerprint Matching".
ACISP 2012, LNCS 7372, pp. 426–433, Springer, 2012.
ePrint |
DoI |
Slides |
BibTeX
[HJSS12]
M. Jason Hinek, Shaoquan Jiang, Reihaneh Safavi-Naini, and Siamak F. Shahandashti.
"Attribute-Based Encryption without Key Cloning".
Int'l Journal of Applied Cryptography 2(3): 250–270, InderScience, 2012.
ePrint |
DoI |
BibTeX
2009
[SS09b]
Siamak F. Shahandashti and Reihaneh Safavi-Naini.
"Generic Constructions for Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures".
IET Information Security 3(4): 152–176, IET, 2009.
ePrint |
DoI |
BibTeX
[Sha09]
Siamak F. Shahandashti.
"Contributions to Secure and Privacy-Preserving Use of Electronic Credentials".
PhD Thesis. University of Wollongong, Australia. 2009.
Soft copy |
Hard copy
[SS09a]
Siamak F. Shahandashti and Reihaneh Safavi-Naini.
"Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems".
AfricaCrypt 2009, LNCS 5580, pp. 198–216, Springer, 2009.
ePrint |
DoI |
BibTeX
2008
[SS08]
Siamak F. Shahandashti and Reihaneh Safavi-Naini.
"Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures".
PKC 2008, LNCS 4939, pp. 121–140, Springer, 2008.
ePrint |
DoI |
Slides |
BibTeX
2007
[SSB07]
Siamak F. Shahandashti, Reihaneh Safavi-Naini, and Joonsang Baek.
"Concurrently-Secure Credential Ownership Proofs".
ASIACCS 2007, pp. 161–172, ACM, 2007.
ePrint |
DoI |
BibTeX
2005
[Sha05]
Siamak F. Shahandashti.
"Provably-Secure Homomorphic Digital Signatures".
MSc Thesis. Sharif University of Technology, Tehran, Iran. 2005.
Hard copy |
Main results published in [SSM05]
[SSM05]
Siamak F. Shahandashti, Mahmoud Salmasizadeh, and Javad Mohajeri.
"A Provably Secure Short Transitive Signature Scheme from Bilinear Group Pairs".
SCN 2004. LNCS 3352, pp. 60–76, Springer, 2005.
ePrint |
DoI |
BibTeX |
Published results of [Sha05]