2018

Feng Hao, Roberto Metere, Siamak F. Shahandashti, and Changyu Dong. "Analysing and Patching SPEKE in ISO/IEC". IEEE Transactions on Information Forensics & Security (to appear).
 ePrint |  DoI |  Code

Sepideh Avizheh, Reihaneh Safavi-Naini, and Siamak F. Shahandashti. "A New Look at the Refund Mechanism in the Bitcoin Payment Protocol". Financial Cryptography and Data Security (FC) 2018 (to appear).
 ePrint

Maryam Mehrnezhad, Ehsan Toreini, Siamak F. Shahandashti, and Feng Hao. "Stealing PINs via Mobile Sensors: Actual Risk versus User Perception". International Journal of Information Security, 17(3): 291-313 2018.
 ePrint |  DoI (Open Access) |  BibTeX

Feng Hao, Dylan Clarke, Brian Randell, and Siamak F. Shahandashti. "Verifiable Classroom Voting in Practice". IEEE Security & Privacy, 16(1): 72-81, IEEE, 2018.
 ePrint |  DoI |  BibTeX


2017

Ehsan Toreini, Siamak F. Shahandashti, and Feng Hao. "Texture to the Rescue: Practical Paper Fingerprinting based on Texture Patterns". ACM Transactions on Privacy and Security (TOPS): 20(3), Article No. 9, ACM, 2017.
 ePrint |  Open Journal Version |  DoI |  more info inc. abstract, media coverage, and BibTeX

Patrick McCorry, Siamak F. Shahandashti, and Feng Hao. "A Smart Contract for Boardroom Voting with Maximum Voter Privacy". FC 2017, LNCS 10322, pp. 357-375, Springer, 2017.
 ePrint |  Code |  DoI |  more info inc. abstract, media coverage, and BibTeX


2016

Siamak F. Shahandashti and Feng Hao. "DRE-ip: A Verifiable E-Voting Scheme without Tallying Authorities". ESORICS 2016, LNCS 9879, pp. 223-240, Springer, 2016.
 ePrint |  DoI |  BibTeX

Maryam Mehrnezhad, Ehsan Toreini, Siamak F. Shahandashti, and Feng Hao. "Stealing PINs via Mobile Sensors: Actual Risk versus User Perception". EuroUSEC 2016.
 ePrint |  Slides

Patrick McCorry, Malte Möser, Siamak F. Shahandashti, and Feng Hao. "Towards Bitcoin Payment Networks". ACISP 2016, LNCS 9722, pp. 57-76, Springer, 2016.
 ePrint |  DoI |  BibTeX

Siamak F. Shahandashti. "Electoral Systems Used around the World". Real-World Electronic Voting: Design, Analysis and Deployment. Hao and Ryan (eds), Series in Security, Privacy and Trust, pp. 77-102, CRC Press, 2016.
 ePrint |  DoI

Peter Hyun-Jeen Lee and Siamak F. Shahandashti. "Theoretical Attacks on E2E Voting Systems". Real-World Electronic Voting: Design, Analysis and Deployment. Hao and Ryan (eds), Series in Security, Privacy and Trust, pp. 219–236, CRC Press, 2016.
 ePrint |  DoI

Patrick McCorry, Siamak F. Shahandashti, and Feng Hao. "Refund Attacks on Bitcoin's Payment Protocol". FC 2016, LNCS 9603, pp. 581-599, Springer, 2016.
 ePrint |  DoI |  BibTeX

Maryam Mehrnezhad, Ehsan Toreini, Siamak F. Shahandashti, and Feng Hao. "TouchSignatures: Identification of User Touch Actions and PINs Based on Mobile Sensor Data via JavaScript". Journal of Information Security and Applications, 26: 23–38, Elsevier, 2016.
 ePrint |  DoI |  more info inc. abstract, industry impact, media coverage, and BibTeX


2015

Patrick McCorry, Siamak F. Shahandashti, Dylan Clarke, and Feng Hao. "Authenticated Key Exchange over Bitcoin". SSR 2015, LNCS 9497, pp. 3–20, Springer, 2015.
 ePrint |  DoI |  BibTeX

Maryam Mehrnezhad, Feng Hao, and Siamak F. Shahandashti. "Tap-Tap and Pay (TTP): Preventing The Mafia Attack in NFC Payment". SSR 2015, LNCS 9497, pp. 21–39, Springer, 2015.
 ePrint |  DoI |  BibTeX

Siamak F. Shahandashti, Reihaneh Safavi-Naini, and Nashad Ahmed Safa. "Reconciling User Privacy and Implicit Authentication for Mobile Devices". Computers & Security 53: 215–233, Elsevier, 2015.
 ePrint |  DoI |  BibTeX

Feng Hao, Xun Yi, Liqun Chen, and Siamak F. Shahandashti. "The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group". In ACM Workshop on IoT Privacy, Trust, and Security (IoTPTS '15), pp. 27–34, ACM, 2015.
 ePrint |  DoI |  BibTeX

Maryam Mehrnezhad, Ehsan Toreini, Siamak F. Shahandashti, and Feng Hao. "TouchSignatures: Identification of User Touch Actions Based on Mobile Sensors via JavaScript". ASIACCS 2015, p. 673, ACM, 2015.
 DoI |  BibTeX


2014

Feng Hao and Siamak F. Shahandashti. "The SPEKE Protocol Revisited". SSR 2014, LNCS 8893, pp. 26–38, Springer, 2014.
 ePrint |  DoI |  BibTeX

Feng Hao, Matthew N. Kreeger, Brian Randell, Dylan Clarke, Siamak F. Shahandashti, and Peter Hyun-Jeen Lee. "Every Vote Counts: Ensuring Integrity in Large-Scale Electronic Voting". USENIX Journal of Election Technology and Systems (JETS) 2(3): 1–25, USENIX Association, 2014.
 DoI |  BibTeX

Nashad Ahmed Safa, Reihaneh Safavi-Naini and Siamak F. Shahandashti. "Privacy-Preserving Implicit Authentication". SEC 2014, IFIP AICT 428, pp. 471–484, Springer, 2014.
 ePrint |  DoI |  Slides |  BibTeX


2013

Duong-Hieu Phan, David Pointcheval, Siamak F. Shahandashti, and Mario Strefler. "Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts". International Journal of Information Security 12(4): 251–265, Springer, 2013.
 ePrint |  DoI |  BibTeX


2012

Reza Sepahi, Josef Pieprzyk, Siamak F. Shahandashti, and Berry Schoenmakers. "New Security Notions and Relations for Public-Key Encryption". Journal of Mathematical Cryptology 6(3-4): 183–227, De Gruyter, 2012.
 DoI |  BibTeX

Duong-Hieu Phan, David Pointcheval, Siamak F. Shahandashti, and Mario Strefler. "Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts". ACISP 2012, LNCS 7372, pp. 308–321, Springer, 2012.
 ePrint |  DoI |  BibTeX

Siamak F. Shahandashti, Reihaneh Safavi-Naini, and Philip Ogunbona. "Private Fingerprint Matching". ACISP 2012, LNCS 7372, pp. 426–433, Springer, 2012.
 ePrint |  DoI |  Slides |  BibTeX

M. Jason Hinek, Shaoquan Jiang, Reihaneh Safavi-Naini, and Siamak F. Shahandashti. "Attribute-Based Encryption without Key Cloning". Int'l Journal of Applied Cryptography 2(3): 250–270, InderScience, 2012.
 ePrint |  DoI |  BibTeX


2009

Siamak F. Shahandashti and Reihaneh Safavi-Naini. "Generic Constructions for Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures". IET Information Security 3(4): 152–176, IET, 2009.
 ePrint |  DoI |  BibTeX

Siamak F. Shahandashti. "Contributions to Secure and Privacy-Preserving Use of Electronic Credentials". PhD Thesis. University of Wollongong, Australia. 2009.
 Soft copy |  Hard copy

Siamak F. Shahandashti and Reihaneh Safavi-Naini. "Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems". AfricaCrypt 2009, LNCS 5580, pp. 198–216, Springer, 2009.
 ePrint |  DoI |  BibTeX


2008

Siamak F. Shahandashti and Reihaneh Safavi-Naini. "Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures". PKC 2008, LNCS 4939, pp. 121–140, Springer, 2008.
 ePrint |  DoI |  Slides |  BibTeX


2007

Siamak F. Shahandashti, Reihaneh Safavi-Naini, and Joonsang Baek. "Concurrently-Secure Credential Ownership Proofs". ASIACCS 2007, pp. 161–172, ACM, 2007.
 ePrint |  DoI |  BibTeX


2005

Kooshiar Azimian, Javad Mohajeri, Mahmoud Salmasizadeh, and Siamak F. Shahandashti. "A Verifiable Partial Key Escrow, Based on McCurley Encryption Scheme". ECCC TR05-078, 2005.
 ePrint

Siamak F. Shahandashti. "Provably-Secure Homomorphic Digital Signatures". MSc Thesis. Sharif University of Technology, Tehran, Iran. 2005.
 Hard copy

Siamak F. Shahandashti, Mahmoud Salmasizadeh, and Javad Mohajeri. "A Provably Secure Short Transitive Signature Scheme from Bilinear Group Pairs". SCN 2004. LNCS 3352, pp. 60–76, Springer, 2005.
 ePrint |  DoI |  BibTeX