


default search action
Hoda Maleki
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c13]Mahdieh Heidaripour, Ladan Kian, Maryam Rezapour
, Mark Holcomb, Benjamin Fuller, Gagan Agrawal, Hoda Maleki:
Organizing Records for Retrieval in Multi-Dimensional Range Searchable Encryption. SECRYPT 2024: 459-466 - [c12]Asma Jodeiri Akbarfam, Gokila Dorai, Hoda Maleki:
Secure Cross-Chain Provenance for Digital Forensics Collaboration. TPS-ISA 2024: 389-398 - [c11]Asma Jodeiri Akbarfam, Hoda Maleki:
SOK: Blockchain for Provenance. VLDB Workshops 2024 - [i10]Asma Jodeiri Akbarfam, Gokila Dorai, Hoda Maleki:
Secure Cross-Chain Provenance for Digital Forensics Collaboration. CoRR abs/2406.11729 (2024) - [i9]Asma Jodeiri Akbarfam, Hoda Maleki:
SOK: Blockchain for Provenance. CoRR abs/2407.17699 (2024) - [i8]Mahdieh Heidaripour, Ladan Kian, Maryam Rezapour, Mark Holcomb, Benjamin Fuller, Gagan Agrawal, Hoda Maleki:
Organizing Records for Retrieval in Multi-Dimensional Range Searchable Encryption. IACR Cryptol. ePrint Arch. 2024: 635 (2024) - 2023
- [c10]Braxton Bolt, Hoda Maleki, Gagan Agrawal, Jeffrey D. Morris, Khan Farabi:
SecFob: A Remote Keyless Entry Security Solution. ISC2 2023: 1-7 - [c9]Asma Jodeiri Akbarfam, Mahdieh Heidaripour, Hoda Maleki, Gokila Dorai, Gagan Agrawal:
ForensiBlock: A Provenance-Driven Blockchain Framework for Data Forensics and Auditability. TPS-ISA 2023: 136-145 - [i7]Asma Jodeiri Akbarfam, Sina Barazandeh, Hoda Maleki, Deepti Gupta:
DLACB: Deep Learning Based Access Control Using Blockchain. CoRR abs/2303.14758 (2023) - [i6]Asma Jodeiri Akbarfam, Mahdieh Heidaripour, Hoda Maleki, Gokila Dorai, Gagan Agrawal:
ForensiBlock: A Provenance-Driven Blockchain Framework for Data Forensics and Auditability. CoRR abs/2308.03927 (2023) - [i5]Asma Jodeiri Akbarfam, Sina Barazandeh, Deepti Gupta, Hoda Maleki:
Deep Learning meets Blockchain for Automated and Secure Access Control. CoRR abs/2311.06236 (2023) - 2022
- [c8]Md Hasan, Hoda Maleki, Gagan Agrawal:
Securing Pseudonym Schemes for Vehicular Privacy. IEEE Big Data 2022: 6647-6649 - 2021
- [c7]Dane Troyer, Justin Henry, Hoda Maleki, Gokila Dorai, Bethany Sumner, Gagan Agrawal, Jon Ingram:
Privacy-Preserving Framework to Facilitate Shared Data Access for Wearable Devices. IEEE BigData 2021: 2583-2592 - 2020
- [c6]Ran Canetti, Marten van Dijk
, Hoda Maleki, Ulrich Rührmair, Patrick Schaumont:
Using Universal Composition to Design and Analyze Secure Complex Hardware Systems. DATE 2020: 520-525
2010 – 2019
- 2019
- [c5]Kyle Hogan, Hoda Maleki, Reza Rahaeimehr, Ran Canetti, Marten van Dijk
, Jason Hennessey, Mayank Varia, Haibin Zhang:
On the Universally Composable Security of OpenStack. SecDev 2019: 20-33 - 2018
- [c4]Marten van Dijk
, Chenglu Jin, Hoda Maleki, Phuong Ha Nguyen, Reza Rahaeimehr:
Weak-Unforgeable Tags for Secure Supply Chain Management. Financial Cryptography 2018: 80-98 - [i4]Kyle Hogan, Hoda Maleki, Reza Rahaeimehr, Ran Canetti, Marten van Dijk, Jason Hennessey, Mayank Varia, Haibin Zhang:
On the Universally Composable Security of OpenStack. IACR Cryptol. ePrint Arch. 2018: 602 (2018) - 2017
- [c3]Hoda Maleki, Reza Rahaeimehr, Marten van Dijk
:
SoK: RFID-based Clone Detection Mechanisms for Supply Chains. ASHES@CCS 2017: 33-41 - [c2]Hoda Maleki, Reza Rahaeimehr, Chenglu Jin, Marten van Dijk
:
New clone-detection approach for RFID-based supply chains. HOST 2017: 122-127 - [i3]Marten van Dijk, Chenglu Jin, Hoda Maleki, Phuong Ha Nguyen, Reza Rahaeimehr:
Weak-Unforgeable Tags for Secure Supply Chain Management. IACR Cryptol. ePrint Arch. 2017: 1221 (2017) - 2016
- [c1]Hoda Maleki, Saeed Valizadeh, William Koch, Azer Bestavros
, Marten van Dijk
:
Markov Modeling of Moving Target Defense Games. MTD@CCS 2016: 81-92 - [i2]Hoda Maleki, Reza Rahaeimehr, Marten van Dijk:
LightSource: Ultra Lightweight Clone Detection of RFID Tags from Software Unclonable Responses. IACR Cryptol. ePrint Arch. 2016: 608 (2016) - [i1]Mohammad Hadi Valizadeh, Hoda Maleki, William Koch, Azer Bestavros, Marten van Dijk:
Markov Modeling of Moving Target Defense Games. IACR Cryptol. ePrint Arch. 2016: 741 (2016) - 2014
- [j1]Hoda Maleki, Shahrokh Shahriari
, Louis-Gilles Durand, Michel R. Labrosse
, Lyes Kadem:
A metric for the stiffness of calcified aortic valves using a combined computational and experimental approach. Medical Biol. Eng. Comput. 52(1): 1-8 (2014)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-04 22:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint