Safavi

Results: 47



#Item
1A New Look at the Refund Mechanism in the Bitcoin Payment Protocol Sepideh Avizheh1 , Reihaneh Safavi-Naini1 , and Siamak F. Shahandashti2 1  University of Calgary, Calgary, Alberta, Canada

A New Look at the Refund Mechanism in the Bitcoin Payment Protocol Sepideh Avizheh1 , Reihaneh Safavi-Naini1 , and Siamak F. Shahandashti2 1 University of Calgary, Calgary, Alberta, Canada

Add to Reading List

Source URL: fc18.ifca.ai

Language: English - Date: 2018-01-14 11:45:37
    2Privacy-Preserving Implicit Authentication Nashad Safa Rei Safavi-Naini Siamak Shahandashti

    Privacy-Preserving Implicit Authentication Nashad Safa Rei Safavi-Naini Siamak Shahandashti

    Add to Reading List

    Source URL: www-users.cs.york.ac.uk

    Language: English - Date: 2017-02-20 12:19:35
    3International Organizing Committee Young Physicists’ Tournament IOC meeting Minutes July 30th 2011, Safavi Hotel, Esfahan, Iran

    International Organizing Committee Young Physicists’ Tournament IOC meeting Minutes July 30th 2011, Safavi Hotel, Esfahan, Iran

    Add to Reading List

    Source URL: www.iypt.org

    Language: English - Date: 2015-02-07 19:49:48
      4Private Fingerprint Matching Siamak F Shahandashti Reihaneh Safavi-Naini Philip Ogunbona Uni of Wollongong

      Private Fingerprint Matching Siamak F Shahandashti Reihaneh Safavi-Naini Philip Ogunbona Uni of Wollongong

      Add to Reading List

      Source URL: www-users.cs.york.ac.uk

      Language: English - Date: 2017-02-20 12:22:44
      5Economically Optimal Variable Tag Length Message Authentication Reihaneh Safavi-Naini1 , Viliam Lis´y2 , and Yvo Desmedt3 1  Department of Computer Science, University of Calgary, CA,

      Economically Optimal Variable Tag Length Message Authentication Reihaneh Safavi-Naini1 , Viliam Lis´y2 , and Yvo Desmedt3 1 Department of Computer Science, University of Calgary, CA,

      Add to Reading List

      Source URL: fc17.ifca.ai

      - Date: 2017-03-17 11:59:45
        6Privacy Consensus in Anonymization Systems Via Game Theory Rosa Karimi Adl, Mina Askari, Ken Barker, and Reihaneh Safavi-Naini Department of Computer Science, University of Calgary, Canada {rkarimia,maskari,kbarker,rei}@

        Privacy Consensus in Anonymization Systems Via Game Theory Rosa Karimi Adl, Mina Askari, Ken Barker, and Reihaneh Safavi-Naini Department of Computer Science, University of Calgary, Canada {rkarimia,maskari,kbarker,rei}@

        Add to Reading List

        Source URL: dspace.ucalgary.ca

        - Date: 2015-03-19 05:09:30
          7Reducing Million-Node Graphs to a Few Structural Patterns: A Unified Approach Yike Liu Tara Safavi

          Reducing Million-Node Graphs to a Few Structural Patterns: A Unified Approach Yike Liu Tara Safavi

          Add to Reading List

          Source URL: www.mlgworkshop.org

          Language: English - Date: 2016-08-14 01:22:56
          8Cite as: M.A. Giese, G. Ravishankar, S. Safavi, D. Endres (2013): Physiologically-inspired neural model for the processing of dynamic facial expressions. Presented at the 10Th Göttingen Meeting of the German Neuroscienc

          Cite as: M.A. Giese, G. Ravishankar, S. Safavi, D. Endres (2013): Physiologically-inspired neural model for the processing of dynamic facial expressions. Presented at the 10Th Göttingen Meeting of the German Neuroscienc

          Add to Reading List

          Source URL: www.kyb.tuebingen.mpg.de

          Language: English - Date: 2015-03-11 06:47:29
            9Specialized insulin is used for chemical warfare by fish-hunting cone snails Helena Safavi-Hemamia,b,1, Joanna Gajewiaka, Santhosh Karanthc,d, Samuel D. Robinsone, Beatrix Ueberheidef, Adam D. Douglassg, Amnon Schlegelc,

            Specialized insulin is used for chemical warfare by fish-hunting cone snails Helena Safavi-Hemamia,b,1, Joanna Gajewiaka, Santhosh Karanthc,d, Samuel D. Robinsone, Beatrix Ueberheidef, Adam D. Douglassg, Amnon Schlegelc,

            Add to Reading List

            Source URL: www.yandell-lab.org

            Language: English - Date: 2015-03-09 14:29:08
              10Automated Security Proof for Symmetric Encryption Modes. ? Martin Gagné2 , Pascal Lafourcade1 , Yassine Lakhnech1 , and Reihaneh Safavi-Naini2 1

              Automated Security Proof for Symmetric Encryption Modes. ? Martin Gagné2 , Pascal Lafourcade1 , Yassine Lakhnech1 , and Reihaneh Safavi-Naini2 1

              Add to Reading List

              Source URL: www.lsv.ens-cachan.fr

              Language: English - Date: 2009-09-01 13:12:37