Select Publications

Book Chapters

Buser M; Dowsley R; Esgin MF; Kasra Kermanshahi S; Kuchta V; Liu JK; Phan RCW; Zhang Z, 2022, 'Post-Quantum Verifiable Random Function from Symmetric Primitives in PoS Blockchain', in , pp. 25 - 45, http://dx.doi.org/10.1007/978-3-031-17140-6_2

Kermanshahi SK; Dowsley R; Steinfeld R; Sakzad A; Liu JK; Nepal S; Yi X, 2021, 'Geo-DRS: Geometric Dynamic Range Search on Spatial Data with Backward and Content Privacy', in , pp. 24 - 43, http://dx.doi.org/10.1007/978-3-030-88428-4_2

Kasra Kermanshahi S, 2014, 'Secure Identity-Based Cryptographic Schemes', in Security In Computing and Networking, Universiti Teknologi Malaysia (UTM)

Journal articles

Jafarbeiki S; Sakzad A; Steinfeld R; Kasra Kermanshahi S; Thapa C; Kume Y, 2024, 'ACE: A Consent-Embedded privacy-preserving search on genomic database', Heliyon, 10, http://dx.doi.org/10.1016/j.heliyon.2024.e29399

Kermanshahi SK; Steinfeld R; Yi X; Liu JK; Nepal S; Lou J, 2024, 'Fast and private multi-dimensional range search over encrypted data', Information Sciences, 652, http://dx.doi.org/10.1016/j.ins.2023.119773

Buser M; Dowsley R; Esgin M; Gritti C; Kermanshahi SK; Kuchta V; Legrow J; Liu J; Phan R; Sakzad A; Steinfeld R; Yu J; Kasra Kermanshahi S, 2023, 'A Survey on Exotic Signatures for Post-quantum Blockchain: Challenges and Research Directions', ACM Computing Surveys, 55, pp. 1 - 32, http://dx.doi.org/10.1145/3572771

Kasra Kermanshahi S; Dowsley R; Steinfeld R; Sakzad A; Liu J; Nepal S; Yi X; Lai S, 2022, 'Range search on encrypted spatial data with dynamic updates', Journal of Computer Security, 30, pp. 829 - 849, http://dx.doi.org/10.3233/jcs-210168

Kermanshahi SK; Sun SF; Liu JK; Steinfeld R; Nepal S; Lau WF; Au MHA, 2022, 'Geometric Range Search on Encrypted Data with Forward/Backward Security', IEEE Transactions on Dependable and Secure Computing, 19, pp. 698 - 716, http://dx.doi.org/10.1109/TDSC.2020.2982389

Jafarbeiki S; Sakzad A; Kasra Kermanshahi S; Gaire R; Steinfeld R; Lai S; Abraham G; Thapa C, 2022, 'PrivGenDB: Efficient and privacy-preserving query executions over encrypted SNP-Phenotype database', Informatics in Medicine Unlocked, 31, pp. 100988, http://dx.doi.org/10.1016/j.imu.2022.100988

Kasra Kermanshahi S; Liu JK; Steinfeld R; Nepal S; Lai S; Loh R; Zuo C, 2019, 'Multi-client Cloud-based Symmetric Searchable Encryption', IEEE Transactions on Dependable and Secure Computing, pp. 1 - 1, http://dx.doi.org/10.1109/tdsc.2019.2950934

Kasra-Kermanshahi S; Salleh M; Chizari H, 2016, 'Appropriate lightweight cryptosystems for wireless sensor networks', ARPN Journal of Engineering and Applied Sciences, 11, pp. 6296 - 6302

Conference Papers

Jafarbeiki S; Sakzad A; Kermanshahi SK; Steinfeld R; Gaire R, 2022, 'PRESSGenDB: PRivacy-prEserving Substring Search on Encrypted Genomic DataBase', in INFOCOM WKSHPS 2022 - IEEE Conference on Computer Communications Workshops, http://dx.doi.org/10.1109/INFOCOMWKSHPS54753.2022.9797931

Jafarbeiki S; Sakzad A; Kermanshahi SK; Steinfeld R; Gaire R; Lai S, 2021, 'A Non-interactive Multi-user Protocol for Private Authorised Query Processing on Genomic Data', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 70 - 94, http://dx.doi.org/10.1007/978-3-030-91356-4_5

Jafarbeiki S; Gaire R; Sakzad A; Kermanshahi SK; Steinfeld R, 2021, 'Collaborative analysis of genomic data: vision and challenges', in Proceedings - 2021 IEEE 7th International Conference on Collaboration and Internet Computing, CIC 2021, pp. 77 - 86, http://dx.doi.org/10.1109/CIC52973.2021.00020

Yu B; Kermanshahi SK; Sakzad A; Nepal S, 2019, 'Chameleon Hash Time-Lock Contract for Privacy Preserving Payment Channel Networks', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 303 - 318, http://dx.doi.org/10.1007/978-3-030-31919-9_18

Kasra Kermanshahi S; Liu JK; Steinfeld R; Nepal S, 2019, 'Generic Multi-keyword Ranked Search on Encrypted Cloud Data', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 322 - 343, http://dx.doi.org/10.1007/978-3-030-29962-0_16

Kermanshahi SK; Liu JK; Steinfeld R, 2017, 'Multi-user cloud-based secure keyword search', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 227 - 247, http://dx.doi.org/10.1007/978-3-319-60055-0_12

Kasra-Kermanshahi S; Salleh M, 2015, 'A novel authentication scheme for mobile environments in the context of Elliptic Curve Cryptography', in I4CT 2015 - 2015 2nd International Conference on Computer, Communications, and Control Technology, Art Proceeding, pp. 506 - 510, http://dx.doi.org/10.1109/I4CT.2015.7219630

Kermanshahi SK; Salleh M, 2015, 'An enhanced certificateless cryptosystem for mobile ad hoc networks', in Proceedings - 2014 International Symposium on Biometrics and Security Technologies, ISBAST 2014, pp. 176 - 181, http://dx.doi.org/10.1109/ISBAST.2014.7013117

Kasra-Kermanshahi S; Salleh M, 2015, 'An improved certificateless public key authentication scheme for mobile ad hoc networks over elliptic curves', in Advances in Intelligent Systems and Computing, pp. 327 - 334, http://dx.doi.org/10.1007/978-3-319-17398-6_30

Reports

Kasra Kermanshahi S; Thai V; von Kaenel J; Arrigo R; Baulch B; Pham T; Chhetri P; Nguyen T; Alamgir Hossain M; Shahparvari S, 2022, Vietnam’s Industry 4.0 Opportunities for Australian Business, file:///C:/Users/z3540640/Downloads/atih-industry-4-0-in-vietnam.pdf

Preprints

Sultan NH; Kasra-Kermanshahi S; Tran Y; Lai S; Varadharajan V; Nepal S; Yi X, 2023, A Multi-Client Searchable Encryption Scheme for IoT Environment, , http://arxiv.org/abs/2305.09221v1


Back to profile page