default search action
Siamak F. Shahandashti
Person information
- affiliation: University of York, UK
- affiliation (former): Newcastle University, UK
- affiliation (former): University of Wollongong, Australia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c29]Christopher Battarbee, Delaram Kahrobaei, Ludovic Perret, Siamak F. Shahandashti:
A Subexponential Quantum Algorithm for the Semidirect Discrete Logarithm Problem. PQCrypto (1) 2024: 202-226 - [i45]Ali Cherry, Konstantinos Barmpis, Siamak F. Shahandashti:
The Emperor is Now Clothed: A Secure Governance Framework for Web User Authentication through Password Managers. CoRR abs/2407.07205 (2024) - 2023
- [j17]Henry Gray, Christopher Battarbee, Siamak F. Shahandashti, Delaram Kahrobaei:
A novel attack on McEliece's cryptosystem. Int. J. Comput. Math. Comput. Syst. Theory 8(3): 178-191 (2023) - [c28]Dan Turner, Siamak F. Shahandashti, Helen Petrie:
The Effect of Length on Key Fingerprint Verification Security and Usability. ARES 2023: 23:1-23:11 - [c27]Najla Aldaraani, Helen Petrie, Siamak F. Shahandashti:
Online Security Attack Experience and Worries of Young Adults in the Kingdom of Saudi Arabia. HAISA 2023: 364-376 - [c26]Jenjira Lomchan, Rungrat Wiangsripanawan, Siamak F. Shahandashti:
The Comparison of Password Composition Policies Among US, German, and Thailand Samples. JCSSE 2023: 213-218 - [c25]Christopher Battarbee, Delaram Kahrobaei, Ludovic Perret, Siamak F. Shahandashti:
SPDH-Sign: Towards Efficient, Post-quantum Group-Based Signatures. PQCrypto 2023: 113-138 - [i44]Christopher Battarbee, Delaram Kahrobaei, Ludovic Perret, Siamak F. Shahandashti:
SPDH-Sign: towards Efficient, Post-quantum Group-based Signatures. CoRR abs/2304.12900 (2023) - [i43]Dan Turner, Siamak F. Shahandashti, Helen Petrie:
The Effect of Length on Key Fingerprint Verification Security and Usability. CoRR abs/2306.04574 (2023) - [i42]Christopher Battarbee, Delaram Kahrobaei, Siamak F. Shahandashti:
Semidirect Product Key Exchange: the State of Play. IACR Cryptol. ePrint Arch. 2023: 594 (2023) - [i41]Christopher Battarbee, Delaram Kahrobaei, Ludovic Perret, Siamak F. Shahandashti:
SPDH-Sign: towards Efficient, Post-quantum Group-based Signatures. IACR Cryptol. ePrint Arch. 2023: 595 (2023) - 2022
- [j16]Christopher Battarbee, Delaram Kahrobaei, Dylan Tailor, Siamak F. Shahandashti:
On the efficiency of a general attack against the MOBS cryptosystem. J. Math. Cryptol. 16(1): 289-297 (2022) - [j15]Philokypros P. Ioulianou, Vassilios G. Vassilakis, Siamak F. Shahandashti:
A Trust-Based Intrusion Detection System for RPL Networks: Detecting a Combination of Rank and Blackhole Attacks. J. Cybersecur. Priv. 2(1): 124-152 (2022) - [c24]Philokypros P. Ioulianou, Vassilios G. Vassilakis, Siamak F. Shahandashti:
ML-based Detection of Rank and Blackhole Attacks in RPL Networks. CSNDSP 2022: 338-343 - [c23]Najla Aldaraani, Helen Petrie, Siamak F. Shahandashti:
Online Security Attack Experience and Worries of Young Adults in the United Kingdom. HAISA 2022: 300-309 - [i40]Christopher Battarbee, Delaram Kahrobaei, Siamak F. Shahandashti:
Semidirect Product Key Exchange: the State of Play. CoRR abs/2202.05178 (2022) - [i39]Christopher Battarbee, Delaram Kahrobaei, Ludovic Perret, Siamak F. Shahandashti:
A Subexponential Quantum Algorithm for the Semidirect Discrete Logarithm Problem. CoRR abs/2209.02814 (2022) - [i38]Christopher Battarbee, Delaram Kahrobaei, Ludovic Perret, Siamak F. Shahandashti:
A Subexponential Quantum Algorithm for the Semidirect Discrete Logarithm Problem. IACR Cryptol. ePrint Arch. 2022: 1165 (2022) - 2021
- [j14]Paolo Modesti, Siamak F. Shahandashti, Patrick McCorry, Feng Hao:
Formal modelling and security analysis of bitcoin's payment protocol. Comput. Secur. 107: 102279 (2021) - [c22]Lee Livsey, Helen Petrie, Siamak F. Shahandashti, Aidan Fray:
Performance and Usability of Visual and Verbal Verification of Word-Based Key Fingerprints. HAISA 2021: 199-210 - [c21]Georgios Kampanos, Siamak F. Shahandashti:
Accept All: The Landscape of Cookie Banners in Greece and the UK. SEC 2021: 213-227 - [i37]Paolo Modesti, Siamak F. Shahandashti, Patrick McCorry, Feng Hao:
Formal Modelling and Security Analysis of Bitcoin's Payment Protocol. CoRR abs/2103.08436 (2021) - [i36]Georgios Kampanos, Siamak F. Shahandashti:
Accept All: The Landscape of Cookie Banners in Greece and the UK. CoRR abs/2104.05750 (2021) - [i35]Christopher Battarbee, Delaram Kahrobaei, Siamak F. Shahandashti:
Cryptanalysis of Semidirect Product Key Exchange Using Matrices Over Non-Commutative Rings. CoRR abs/2105.07692 (2021) - [i34]Lee Livsey, Helen Petrie, Siamak F. Shahandashti, Aidan Fray:
Performance and Usability of Visual and Verbal Verification of Word-based Key Fingerprints. CoRR abs/2106.01131 (2021) - [i33]Christopher Battarbee, Delaram Kahrobaei, Dylan Tailor, Siamak F. Shahandashti:
On the efficiency of a general attack against the MOBS cryptosystem. CoRR abs/2111.05806 (2021) - [i32]Christopher Battarbee, Delaram Kahrobaei, Siamak F. Shahandashti:
Cryptanalysis of Semidirect Product Key Exchange Using Matrices Over Non-Commutative Rings. IACR Cryptol. ePrint Arch. 2021: 644 (2021) - [i31]Christopher Battarbee, Delaram Kahrobaei, Dylan Tailor, Siamak F. Shahandashti:
On the efficiency of a general attack against the MOBS cryptosystem. IACR Cryptol. ePrint Arch. 2021: 1494 (2021) - 2020
- [j13]Feng Hao, Shen Wang, Samiran Bag, Rob Procter, Siamak F. Shahandashti, Maryam Mehrnezhad, Ehsan Toreini, Roberto Metere, Lana Y. J. Liu:
End-to-End Verifiable E-Voting Trial for Polling Station Voting. IEEE Secur. Priv. 18(6): 6-13 (2020) - [j12]Samiran Bag, Feng Hao, Siamak F. Shahandashti, Indranil Ghosh Ray:
SEAL: Sealed-Bid Auction Without Auctioneers. IEEE Trans. Inf. Forensics Secur. 15: 2042-2052 (2020) - [c20]Michael Carr, Siamak F. Shahandashti:
Revisiting Security Vulnerabilities in Commercial Password Managers. SEC 2020: 265-279 - [c19]Poonam Yadav, Angelo Feraudo, Budi Arief, Siamak F. Shahandashti, Vassilios G. Vassilakis:
Position paper: A systematic framework for categorising IoT device fingerprinting mechanisms. AIChallengeIoT@SenSys 2020: 62-68 - [i30]Ryan Smith, Daniel Palin, Philokypros P. Ioulianou, Vassilios G. Vassilakis, Siamak F. Shahandashti:
Battery draining attacks against edge computing nodes in IoT networks. CoRR abs/2002.00069 (2020) - [i29]Michael Carr, Siamak F. Shahandashti:
Revisiting Security Vulnerabilities in Commercial Password Managers. CoRR abs/2003.01985 (2020) - [i28]Poonam Yadav, Angelo Feraudo, Budi Arief, Siamak F. Shahandashti, Vassilios G. Vassilakis:
Position paper: A systematic framework for categorising IoT device fingerprinting mechanisms. CoRR abs/2010.08466 (2020) - [i27]Feng Hao, Shen Wang, Samiran Bag, Rob Procter, Siamak F. Shahandashti, Maryam Mehrnezhad, Ehsan Toreini, Roberto Metere, Lana Y. J. Liu:
End-to-End Verifiable E-Voting Trial for Polling Station Voting at Gateshead. IACR Cryptol. ePrint Arch. 2020: 650 (2020)
2010 – 2019
- 2019
- [j11]Ehsan Toreini, Siamak F. Shahandashti, Maryam Mehrnezhad, Feng Hao:
DOMtegrity: ensuring web page integrity against malicious browser extensions. Int. J. Inf. Sec. 18(6): 801-814 (2019) - [i26]Ehsan Toreini, Maryam Mehrnezhad, Siamak F. Shahandashti, Feng Hao:
DOMtegrity: Ensuring Web Page Integrity against Malicious Browser Extensions. CoRR abs/1905.12951 (2019) - [i25]Samiran Bag, Feng Hao, Siamak F. Shahandashti, Indranil Ghosh Ray:
SEAL: Sealed-Bid Auction Without Auctioneers. IACR Cryptol. ePrint Arch. 2019: 1332 (2019) - 2018
- [j10]Feng Hao, Dylan Clarke, Brian Randell, Siamak F. Shahandashti:
Verifiable Classroom Voting in Practice. IEEE Secur. Priv. 16(1): 72-81 (2018) - [j9]Maryam Mehrnezhad, Ehsan Toreini, Siamak F. Shahandashti, Feng Hao:
Stealing PINs via mobile sensors: actual risk versus user perception. Int. J. Inf. Sec. 17(3): 291-313 (2018) - [j8]Feng Hao, Roberto Metere, Siamak F. Shahandashti, Changyu Dong:
Analyzing and Patching SPEKE in ISO/IEC. IEEE Trans. Inf. Forensics Secur. 13(11): 2844-2855 (2018) - [c18]Sepideh Avizheh, Reihaneh Safavi-Naini, Siamak F. Shahandashti:
A New Look at the Refund Mechanism in the Bitcoin Payment Protocol. Financial Cryptography 2018: 369-387 - [i24]Feng Hao, Roberto Metere, Siamak F. Shahandashti, Changyu Dong:
Analysing and Patching SPEKE in ISO/IEC. CoRR abs/1802.04900 (2018) - [i23]Sepideh Avizheh, Reihaneh Safavi-Naini, Siamak F. Shahandashti:
A New Look at the Refund Mechanism in the Bitcoin Payment Protocol. CoRR abs/1807.01793 (2018) - 2017
- [j7]Ehsan Toreini, Siamak F. Shahandashti, Feng Hao:
Texture to the Rescue: Practical Paper Fingerprinting Based on Texture Patterns. ACM Trans. Priv. Secur. 20(3): 9:1-9:29 (2017) - [c17]Patrick McCorry, Siamak F. Shahandashti, Feng Hao:
A Smart Contract for Boardroom Voting with Maximum Voter Privacy. Financial Cryptography 2017: 357-375 - [i22]Ehsan Toreini, Siamak F. Shahandashti, Feng Hao:
Texture to the Rescue: Practical Paper Fingerprinting based on Texture Patterns. CoRR abs/1705.02510 (2017) - [i21]Feng Hao, Dylan Clarke, Brian Randell, Siamak F. Shahandashti:
Verifiable Classroom Voting in Practice. IACR Cryptol. ePrint Arch. 2017: 56 (2017) - [i20]Patrick McCorry, Siamak F. Shahandashti, Feng Hao:
A Smart Contract for Boardroom Voting with Maximum Voter Privacy. IACR Cryptol. ePrint Arch. 2017: 110 (2017) - 2016
- [j6]Maryam Mehrnezhad, Ehsan Toreini, Siamak Fayyaz Shahandashti, Feng Hao:
TouchSignatures: Identification of user touch actions and PINs based on mobile sensor data via JavaScript. J. Inf. Secur. Appl. 26: 23-38 (2016) - [c16]Patrick McCorry, Malte Möser, Siamak Fayyaz Shahandashti, Feng Hao:
Towards Bitcoin Payment Networks. ACISP (1) 2016: 57-76 - [c15]Siamak F. Shahandashti, Feng Hao:
DRE-ip: A Verifiable E-Voting Scheme Without Tallying Authorities. ESORICS (2) 2016: 223-240 - [c14]Patrick McCorry, Siamak F. Shahandashti, Feng Hao:
Refund Attacks on Bitcoin's Payment Protocol. Financial Cryptography 2016: 581-599 - [i19]Maryam Mehrnezhad, Ehsan Toreini, Siamak Fayyaz Shahandashti, Feng Hao:
TouchSignatures: Identification of User Touch Actions and PINs Based on Mobile Sensor Data via JavaScript. CoRR abs/1602.04115 (2016) - [i18]Siamak Fayyaz Shahandashti:
Electoral Systems Used around the World. CoRR abs/1605.01343 (2016) - [i17]Maryam Mehrnezhad, Ehsan Toreini, Siamak Fayyaz Shahandashti, Feng Hao:
Stealing PINs via Mobile Sensors: Actual Risk versus User Perception. CoRR abs/1605.05549 (2016) - [i16]Patrick McCorry, Siamak Fayyaz Shahandashti, Feng Hao:
Refund attacks on Bitcoin's Payment Protocol. IACR Cryptol. ePrint Arch. 2016: 24 (2016) - [i15]Patrick McCorry, Malte Möser, Siamak Fayyaz Shahandashti, Feng Hao:
Towards Bitcoin Payment Networks. IACR Cryptol. ePrint Arch. 2016: 408 (2016) - [i14]Peter Hyun-Jeen Lee, Siamak Fayyaz Shahandashti:
Theoretical Attacks on E2E Voting Systems. IACR Cryptol. ePrint Arch. 2016: 447 (2016) - [i13]Siamak Fayyaz Shahandashti, Feng Hao:
DRE-ip: A Verifiable E-Voting Scheme without Tallying Authorities. IACR Cryptol. ePrint Arch. 2016: 670 (2016) - 2015
- [j5]Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini, Nashad Ahmed Safa:
Reconciling user privacy and implicit authentication for mobile devices. Comput. Secur. 53: 215-233 (2015) - [c13]Feng Hao, Xun Yi, Liqun Chen, Siamak Fayyaz Shahandashti:
The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group. IoTPTS@AsiaCCS 2015: 27-34 - [c12]Maryam Mehrnezhad, Ehsan Toreini, Siamak Fayyaz Shahandashti, Feng Hao:
TouchSignatures: Identification of User Touch Actions based on Mobile Sensors via JavaScript. AsiaCCS 2015: 673 - [c11]Patrick McCorry, Siamak Fayyaz Shahandashti, Dylan Clarke, Feng Hao:
Authenticated Key Exchange over Bitcoin. SSR 2015: 3-20 - [c10]Maryam Mehrnezhad, Feng Hao, Siamak Fayyaz Shahandashti:
Tap-Tap and Pay (TTP): Preventing the Mafia Attack in NFC Payment. SSR 2015: 21-39 - [i12]Feng Hao, Xun Yi, Liqun Chen, Siamak Fayyaz Shahandashti:
The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group. IACR Cryptol. ePrint Arch. 2015: 80 (2015) - [i11]Patrick McCorry, Siamak Fayyaz Shahandashti, Dylan Clarke, Feng Hao:
Authenticated Key Exchange over Bitcoin. IACR Cryptol. ePrint Arch. 2015: 308 (2015) - [i10]Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini, Nashad Ahmed Safa:
Reconciling User Privacy and Implicit Authentication for Mobile Devices. IACR Cryptol. ePrint Arch. 2015: 707 (2015) - 2014
- [c9]Nashad Ahmed Safa, Reihaneh Safavi-Naini, Siamak Fayyaz Shahandashti:
Privacy-Preserving Implicit Authentication. SEC 2014: 471-484 - [c8]Feng Hao, Siamak Fayyaz Shahandashti:
The SPEKE Protocol Revisited. SSR 2014: 26-38 - [c7]Feng Hao, Matthew Nicolas Kreeger, Brian Randell, Dylan Clarke, Siamak Fayyaz Shahandashti, Peter Hyun-Jeen Lee:
Every Vote Counts: Ensuring Integrity in Large-Scale Electronic Voting. EVT/WOTE 2014 - [i9]Nashad Ahmed Safa, Reihaneh Safavi-Naini, Siamak Fayyaz Shahandashti:
Privacy-Preserving Implicit Authentication. IACR Cryptol. ePrint Arch. 2014: 203 (2014) - [i8]Feng Hao, Siamak Fayyaz Shahandashti:
The SPEKE Protocol Revisited. IACR Cryptol. ePrint Arch. 2014: 585 (2014) - 2013
- [j4]Duong Hieu Phan, David Pointcheval, Siamak Fayyaz Shahandashti, Mario Strefler:
Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts. Int. J. Inf. Sec. 12(4): 251-265 (2013) - 2012
- [j3]M. Jason Hinek, Shaoquan Jiang, Reihaneh Safavi-Naini, Siamak Fayyaz Shahandashti:
Attribute-based encryption without key cloning. Int. J. Appl. Cryptogr. 2(3): 250-270 (2012) - [j2]Reza Sepahi, Josef Pieprzyk, Siamak Fayyaz Shahandashti, Berry Schoenmakers:
New security notions and relations for public-key encryption. J. Math. Cryptol. 6(3-4): 183-227 (2012) - [c6]Duong Hieu Phan, David Pointcheval, Siamak Fayyaz Shahandashti, Mario Strefler:
Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts. ACISP 2012: 308-321 - [c5]Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini, Philip Ogunbona:
Private Fingerprint Matching. ACISP 2012: 426-433 - [i7]Duong Hieu Phan, David Pointcheval, Siamak Fayyaz Shahandashti, Mario Strefler:
Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts. IACR Cryptol. ePrint Arch. 2012: 216 (2012) - [i6]Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini, Philip Ogunbona:
Private Fingerprint Matching. IACR Cryptol. ePrint Arch. 2012: 219 (2012)
2000 – 2009
- 2009
- [j1]Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini:
Generic constructions for universal designated-verifier signatures and identitybased signatures from standard signatures. IET Inf. Secur. 3(4): 152-176 (2009) - [c4]Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini:
Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems. AFRICACRYPT 2009: 198-216 - [i5]Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini:
Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems. IACR Cryptol. ePrint Arch. 2009: 126 (2009) - 2008
- [c3]Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini:
Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures. Public Key Cryptography 2008: 121-140 - [i4]M. Jason Hinek, Shaoquan Jiang, Reihaneh Safavi-Naini, Siamak Fayyaz Shahandashti:
Attribute-Based Encryption with Key Cloning Protection. IACR Cryptol. ePrint Arch. 2008: 478 (2008) - 2007
- [c2]Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini, Joonsang Baek:
Concurrently-secure credential ownership proofs. AsiaCCS 2007: 161-172 - [i3]Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini:
Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures. IACR Cryptol. ePrint Arch. 2007: 462 (2007) - 2005
- [i2]Kooshiar Azimian, Javad Mohajeri, Mahmoud Salmasizadeh, Siamak Fayyaz Shahandashti:
A Verifiable Partial Key Escrow, Based on McCurley Encryption Scheme. CoRR abs/cs/0505055 (2005) - [i1]Kooshiar Azimian, Javad Mohajeri, Mahmoud Salmasizadeh, Siamak Fayyaz Shahandashti:
A Verifiable Partial Key Escrow, Based on McCurley Encryption Scheme. Electron. Colloquium Comput. Complex. TR05 (2005) - 2004
- [c1]Siamak Fayyaz Shahandashti, Mahmoud Salmasizadeh, Javad Mohajeri:
A Provably Secure Short Transitive Signature Scheme from Bilinear Group Pairs. SCN 2004: 60-76
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-18 00:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint