2020

[HWB+20] Feng Hao, Shen Wang, Samiran Bag, Rob Procter, Siamak F. Shahandashti, Maryam Mehrnezhad, Ehsan Toreini, Roberto Metere, and Lana Liu. "End-to-End Verifiable E-Voting Trial for Polling Station Voting". IEEE Security & Privacy (to appear), 2020.
 ePrint |  DoI | Trial of  [SH16]

[CS20] Michael Carr and Siamak F. Shahandashti. "Revisiting Security Vulnerabilities in Commercial Password Managers". IFIP SEC 2020 (to appear), 2020.
 ePrint |  Abstract & Media Coverage

[SPI+20] Ryan Smith, Daniel Palin, Philokypros P. Ioulianou, Vassilios G. Vassilakis, and Siamak F. Shahandashti. "Battery Draining Attacks against Edge Computing Nodes in IoT Networks". Cyber-Physical Systems, 6(2): 96–116, 2020.
 ePrint |  DoI

[BHSR20] Samiran Bag, Feng Hao, Siamak F. Shahandashti, and Indranil G. Ray. "SEAL: Sealed-Bid Auction without Auctioneers". IEEE Transactions on Information Forensics & Security 15: 2042–2052, 2020.
 ePrint |  DoI |  BibTeX


2019

[TMSH19] Ehsan Toreini, Maryam Mehrnezhad, Siamak F. Shahandashti, and Feng Hao. "DOMtegrity: Ensuring Web Page Integrity against Malicious Browser Extensions". International Journal of Information Security, 18(6): 801–814, Springer, 2019.
 ePrint |  DoI (Open Access) |  Code |  BibTeX


2018

[HMSD18] Feng Hao, Roberto Metere, Siamak F. Shahandashti, and Changyu Dong. "Analysing and Patching SPEKE in ISO/IEC". IEEE Transactions on Information Forensics & Security 13(11): 2844–2855, IEEE, 2018.
 ePrint |  DoI |  Code |  BibTeX

[ASS18] Sepideh Avizheh, Reihaneh Safavi-Naini, and Siamak F. Shahandashti. "A New Look at the Refund Mechanism in the Bitcoin Payment Protocol". FC 2018, LNCS 10957, pp. 369–387, Springer, 2018.
 ePrint |  DoI |  BibTeX

[MTSH18] Maryam Mehrnezhad, Ehsan Toreini, Siamak F. Shahandashti, and Feng Hao. "Stealing PINs via Mobile Sensors: Actual Risk versus User Perception". International Journal of Information Security, 17(3): 291–313, Springer, 2018.
 ePrint |  DoI (Open Access) |  Code |  BibTeX | Journal version of  [MTSH16b]

[HCRS18] Feng Hao, Dylan Clarke, Brian Randell, and Siamak F. Shahandashti. "Verifiable Classroom Voting in Practice". IEEE Security & Privacy, 16(1): 72–81, IEEE, 2018.
 ePrint |  DoI |  BibTeX


2017

[TSH17] Ehsan Toreini, Siamak F. Shahandashti, and Feng Hao. "Texture to the Rescue: Practical Paper Fingerprinting based on Texture Patterns". ACM Transactions on Privacy and Security (TOPS): 20(3), Article No. 9, ACM, 2017.
 ePrint |  Open Journal Version |  DoI |  Abstract & Media Coverage |  BibTeX

[MSH17] Patrick McCorry, Siamak F. Shahandashti, and Feng Hao. "A Smart Contract for Boardroom Voting with Maximum Voter Privacy". FC 2017, LNCS 10322, pp. 357–375, Springer, 2017.
 ePrint |  DoI |  Code |  Abstract & Media Coverage |  BibTeX


2016

[SH16] Siamak F. Shahandashti and Feng Hao. "DRE-ip: A Verifiable E-Voting Scheme without Tallying Authorities". ESORICS 2016, LNCS 9879, pp. 223–240, Springer, 2016.
 ePrint |  DoI |  BibTeX | Trial:  [HWB+20]

[MTSH16b] Maryam Mehrnezhad, Ehsan Toreini, Siamak F. Shahandashti, and Feng Hao. "Stealing PINs via Mobile Sensors: Actual Risk versus User Perception". EuroUSEC 2016.
 ePrint |  Slides | Journal version:  [MTSH18]

[MMSH16] Patrick McCorry, Malte Möser, Siamak F. Shahandashti, and Feng Hao. "Towards Bitcoin Payment Networks". ACISP 2016, LNCS 9722, pp. 57–76, Springer, 2016.
 ePrint |  DoI |  BibTeX

[Sha16] Siamak F. Shahandashti. "Electoral Systems Used around the World". Real-World Electronic Voting: Design, Analysis and Deployment. Hao and Ryan (eds), Series in Security, Privacy and Trust, pp. 77–102, CRC Press, 2016.
 ePrint |  DoI (book)

[LS16] Peter Hyun-Jeen Lee and Siamak F. Shahandashti. "Theoretical Attacks on E2E Voting Systems". Real-World Electronic Voting: Design, Analysis and Deployment. Hao and Ryan (eds), Series in Security, Privacy and Trust, pp. 219–236, CRC Press, 2016.
 ePrint |  DoI (book)

[MSH16] Patrick McCorry, Siamak F. Shahandashti, and Feng Hao. "Refund Attacks on Bitcoin's Payment Protocol". FC 2016, LNCS 9603, pp. 581–599, Springer, 2016.
 ePrint |  DoI |  BibTeX

[MTSH16a] Maryam Mehrnezhad, Ehsan Toreini, Siamak F. Shahandashti, and Feng Hao. "TouchSignatures: Identification of User Touch Actions and PINs Based on Mobile Sensor Data via JavaScript". Journal of Information Security and Applications, 26: 23–38, Elsevier, 2016.
 ePrint |  DoI |  Abstract, Industry Impact & Media Coverage |  BibTeX | Journal version of  [MTSH15]


2015

[MSCH15] Patrick McCorry, Siamak F. Shahandashti, Dylan Clarke, and Feng Hao. "Authenticated Key Exchange over Bitcoin". SSR 2015, LNCS 9497, pp. 3–20, Springer, 2015.
 ePrint |  DoI |  BibTeX

[MHS15] Maryam Mehrnezhad, Feng Hao, and Siamak F. Shahandashti. "Tap-Tap and Pay (TTP): Preventing The Mafia Attack in NFC Payment". SSR 2015, LNCS 9497, pp. 21–39, Springer, 2015.
 ePrint |  DoI |  BibTeX

[SSS15] Siamak F. Shahandashti, Reihaneh Safavi-Naini, and Nashad Ahmed Safa. "Reconciling User Privacy and Implicit Authentication for Mobile Devices". Computers & Security 53: 215–233, Elsevier, 2015.
 ePrint |  DoI |  BibTeX | Journal version of  [SSS14]

[HCS15] Feng Hao, Xun Yi, Liqun Chen, and Siamak F. Shahandashti. "The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group". In ACM Workshop on IoT Privacy, Trust, and Security (IoTPTS '15), pp. 27–34, ACM, 2015.
 ePrint |  DoI |  BibTeX

[MTSH15] Maryam Mehrnezhad, Ehsan Toreini, Siamak F. Shahandashti, and Feng Hao. "TouchSignatures: Identification of User Touch Actions Based on Mobile Sensors via JavaScript". ASIACCS 2015, p. 673, ACM, 2015.
 DoI |  BibTeX | Journal version:  [MTSH16a]


2014

[HS14] Feng Hao and Siamak F. Shahandashti. "The SPEKE Protocol Revisited". SSR 2014, LNCS 8893, pp. 26–38, Springer, 2014.
 ePrint |  DoI |  BibTeX

[HKR+14] Feng Hao, Matthew N. Kreeger, Brian Randell, Dylan Clarke, Siamak F. Shahandashti, and Peter Hyun-Jeen Lee. "Every Vote Counts: Ensuring Integrity in Large-Scale Electronic Voting". USENIX Journal of Election Technology and Systems (JETS) 2(3): 1–25, USENIX Association, 2014.
 Journal Paper (Open Access) |  BibTeX

[SSS14] Nashad Ahmed Safa, Reihaneh Safavi-Naini and Siamak F. Shahandashti. "Privacy-Preserving Implicit Authentication". SEC 2014, IFIP AICT 428, pp. 471–484, Springer, 2014.
 ePrint |  DoI |  Slides |  BibTeX | Journal version:  [SSS15]


2013

[PPSS13] Duong-Hieu Phan, David Pointcheval, Siamak F. Shahandashti, and Mario Strefler. "Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts". International Journal of Information Security 12(4): 251–265, Springer, 2013.
 ePrint |  DoI |  BibTeX | Journal version of  [PPSS12]


2012

[SPSS12] Reza Sepahi, Josef Pieprzyk, Siamak F. Shahandashti, and Berry Schoenmakers. "New Security Notions and Relations for Public-Key Encryption". Journal of Mathematical Cryptology 6(3-4): 183–227, De Gruyter, 2012.
 DoI |  BibTeX

[PPSS12] Duong-Hieu Phan, David Pointcheval, Siamak F. Shahandashti, and Mario Strefler. "Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts". ACISP 2012, LNCS 7372, pp. 308–321, Springer, 2012.
 ePrint |  DoI |  BibTeX | Journal version:  [PPSS13]

[SSO12] Siamak F. Shahandashti, Reihaneh Safavi-Naini, and Philip Ogunbona. "Private Fingerprint Matching". ACISP 2012, LNCS 7372, pp. 426–433, Springer, 2012.
 ePrint |  DoI |  Slides |  BibTeX

[HJSS12] M. Jason Hinek, Shaoquan Jiang, Reihaneh Safavi-Naini, and Siamak F. Shahandashti. "Attribute-Based Encryption without Key Cloning". Int'l Journal of Applied Cryptography 2(3): 250–270, InderScience, 2012.
 ePrint |  DoI |  BibTeX


2009

[SS09b] Siamak F. Shahandashti and Reihaneh Safavi-Naini. "Generic Constructions for Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures". IET Information Security 3(4): 152–176, IET, 2009.
 ePrint |  DoI |  BibTeX

[Sha09] Siamak F. Shahandashti. "Contributions to Secure and Privacy-Preserving Use of Electronic Credentials". PhD Thesis. University of Wollongong, Australia. 2009.
 Soft copy |  Hard copy

[SS09a] Siamak F. Shahandashti and Reihaneh Safavi-Naini. "Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems". AfricaCrypt 2009, LNCS 5580, pp. 198–216, Springer, 2009.
 ePrint |  DoI |  BibTeX


2008

[SS08] Siamak F. Shahandashti and Reihaneh Safavi-Naini. "Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures". PKC 2008, LNCS 4939, pp. 121–140, Springer, 2008.
 ePrint |  DoI |  Slides |  BibTeX


2007

[SSB07] Siamak F. Shahandashti, Reihaneh Safavi-Naini, and Joonsang Baek. "Concurrently-Secure Credential Ownership Proofs". ASIACCS 2007, pp. 161–172, ACM, 2007.
 ePrint |  DoI |  BibTeX


2005

[AMSS05] Kooshiar Azimian, Javad Mohajeri, Mahmoud Salmasizadeh, and Siamak F. Shahandashti. "A Verifiable Partial Key Escrow, Based on McCurley Encryption Scheme". ECCC TR05-078, 2005.
 ePrint

[Sha05] Siamak F. Shahandashti. "Provably-Secure Homomorphic Digital Signatures". MSc Thesis. Sharif University of Technology, Tehran, Iran. 2005.
 Hard copy | Main results published in  [SSM05]

[SSM05] Siamak F. Shahandashti, Mahmoud Salmasizadeh, and Javad Mohajeri. "A Provably Secure Short Transitive Signature Scheme from Bilinear Group Pairs". SCN 2004. LNCS 3352, pp. 60–76, Springer, 2005.
 ePrint |  DoI |  BibTeX | Published results of  [Sha05]