Publications
Articles in refereed publications —
Published or Accepted
-
R. Safavi-Naini, M. A. Alam Tuhin, Efficient 1-Round Almost-Perfect Secure Message Transmission Protocols with Flexible Connectivity, Advances in Network Analysis and its Applications, Springer, Mathematics in Industry, Volume 18, pp. 221-240, 2013.
-
G. Watson, R. Safavi-Naini, M. Alimomeni, M. Locasto, S. Narayan, LoSt: Location Based Storage, CCSW 2012: Proceedings of the ACM Cloud Computing Security Workshop, pp. 59-70, October, 2012, Raleigh, NC, USA.
-
M. Alimomeni, R. Safavi-Naini, Efficient 1-Round Almost-Perfect Secure Message Transmission Protocols with Flexible Connectivity, ICITS'12: Proceedings of the 6th International Conference on Information Theoretic Security, pp. 1-13, August, 2012, Montreal, Canada.
-
R. Safavi-Naini, M. A. Alam Tuhin, Bounds and Constructions for 1-Round (0, δ)-Secure Message Transmission against Generalized Adversary, AFRICACRYPT'12: Proceedings of the 5th International Conference on Cryptology in Africa, pp. 82-98, Ifrane, Morocco, July, 2012.
-
R. Safavi-Naini, M. A. Alam Tuhin, P. Wang, A General Construction for 1-round δ-RMT and (0, δ)-SMT, ACNS'12:Proceedings of the 10th International Conference on Applied Cryptography and Network Security, pp. 344-362, Singapore, June, 2012.
-
M. Backes, I. Goldberg, A. Kate, E. Mohammadi, Provably Secure and Practical Onion Routing, CSF'12: Proceedings of the 25th IEEE Computer Security Foundations Symposium, Cambridge, MA, USA, June, 2012.
-
M. Askari, R. Safavi-Naini, K. Barker, A General Information Theoretic Privacy and Utility Measure for Data Sanitization Mechanisms, 2nd ACM Conference on Data and Application Security and Privacy (CODASPY'12), San Antonio, USA, Winner of "outstanding paper" award), February 2012.
- Tao Wang, Kevin Bauer, Clara Forero, Ian Goldberg. "Congestion-aware Path Selection for Tor". Financial Cryptography and Data Security 2012. 15 pages. February 2012.
-
Vincent Herbert and Sumanta Sarkar, On the Triple-Error-Correcting Cyclic Codes with Zero Set {1, 2i+1, 2j+1} , IMACC, Springer, LNCS 7089, pp. 79-96, December 2012.
- S. Pidcock, R. Smits, U. Hengartner, I. Goldberg. "NotiSense: An Urban Sensing Notification System To Improve Bystander Privacy". PhoneSense 2011. 5 pages. November 2011.
- R. Smits, D. Jain, S. Pidcock, I. Goldberg, Urs Hengartner. "BridgeSPA: Improving Tor Bridges with Single Packet Authorization". 2011 Workshop on Privacy in the Electronic Society. 9 pages. October 2011.
-
M. Jafari, R. Safavi-Naini, and N. P. Sheppard, A Rights Management Approach to Protection of Privacy in a Cloud of Electronic Health Records, The 11th Annual ACM Workshop on Digital Rights Management (DRM '11), pp. 213–224, October 2011.
- J. Day, Y. Huang, E. Knapp, I. Goldberg. "SPEcTRe: Spot-checked Private Ecash Tolling at Roadside". 2011 Workshop on Privacy in the Electronic Society. 9 pages. October 2011.
- R., F. Olumofin, I. Goldberg. "Practical PIR for Electronic Commerce". 18th ACM Conference on Computer and Communications Security. 12 pages. October 2011.
-
N. Safa, S. Sarkar, R. Safavi-Naini, and M. Ghaderi, Secure Localization Using Dynamic Verifiers, European Symposium on Research in Computer Security (ESORICS'11), pp. 1–20, September 2011.
- P. Mittal, F. Olumofin, C. Troncoso, N. Borisov, Ian Goldberg. "PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval". 20th USENIX Security Symposium. pp. 475–490. August 2011.
- E. Wustrow, S. Wolchok, I. Goldberg, J. A. Halderman. "Telex: Anticensorship in the Network Infrastructure". 20th USENIX Security Symposium. pp. 459–474. August 2011.
- M. AlSabah, K. Bauer, I. Goldberg, D. Grunwald, D. McCoy, S. Savage, G. Voelker. "DefenestraTor: Throwing out Windows in Tor". 11th Privacy Enhancing Technologies Symposium. pp. 134–154. July 2011.
- A. Kate, I. Goldberg. "Generalizing Cryptosystems Based on the Subset Sum Problem". International Journal of Information Security. Vol. 10, No. 3. pp. 189–199. June 2011.
- R. Henry, I. Goldberg. "Formalizing Anonymous Blacklisting Systems". 32nd IEEE Symposium on Security and Privacy. pp. 81–95. May 2011.
- R. Henry, I. Goldberg. "Extending Nymble-like Systems". 32nd IEEE Symposium on Security and Privacy. pp. 523–537. May 2011.
-
P. Charpin and S. Sarkar, Polynomials With Linear Structure and Maiorana–McFarland Construction, IEEE Transactions on Information Theory. Vol 57, No. 6, pp. 3796–3804, May 2011.
- F. Olumofin, I. Goldberg. "Revisiting the Computational Practicality of Private Information Retrieval". Fifteenth International Conference on Financial Cryptography and Data Security. 15 pages. February 2011.
-
R. Safavi-Naini, M. A. Alam Tuhin , and H. Shi, Optimal Message Transmission Protocols with Flexible Parameters, ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011), pp. 453-458, March 2011.
-
M. A. Alam Tuhin and R. Safavi-Naini, Optimal One Round Almost Perfectly Secure Message Transmission, Proceedings of International Conference on Financial Cryptography and Data Security (FC 2011), St. Lucia, pp. 173-181, February 2011.
-
M. Jafari, P. W.L. Fong, R. Safavi-Naini, K. Barker, and N. P. Sheppard, Towards defining semantic foundations for purpose-based privacy policies, The First ACM conference on Data and Application Security and Privacy (CODASPY '11), pp. 213–224, February 2011.
-
H. Shi, S. Jiang, R. Safavi-Naini, M. A. Tuhin, On Optimal Secure Message Transmission by Public Discussion, IEEE Transactions on Information Theory, Vol. 57, No. 1, pp. 572-585, January 2011.
- I. Goldberg, A. Mashatan, D. Stinson. "On Message Recognition Protocols: Recoverability and Explicit Confirmation". International Journal of Applied Cryptography. pp. 100–120. December 2010.
- A. Kate, G. Zaverucha and I. Goldberg, Pairing-Based Onion Routing with Improved Forward Secrecy. ACM Transactions on Information and System Security. pp. 29:1–29:32. December 2010.
- A. Kate, G. Zaverucha, I. Goldberg. "Constant-Size Commitments to Polynomials and Their Applications". 16th Annual International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt 2010). pp/ 177–194. December 2010.
-
S. Narayan, M. Gagne, and R. Safavi-Naini, Privacy Preserving EHR System using Attribute-based Infrastructure, ACM Workshop on Cloud Computing Security (CCSW-2010), 6 pages, October 2010.
-
M. Jafari, R. Safavi-Naini, C. Saunders, and N. P. Sheppard, Using Digital Rights Management for Securing Data in a Medical Research Environment, 10th ACM Workshop on Digital Rights Management (ACM-DRM'10), 6 pages, October 2010.
- Can Tang, Ian Goldberg. "An Improved Algorithm for Tor Circuit Scheduling". 17th ACM Conference on Computer and Communications Security. pp. 329–339. October 2010.
- Aniket Kate, Ian Goldberg. "Distributed Private-Key Generators for Identity-Based Cryptography". 7th Conference on Security and Cryptography for Networks. pp. 436–453. September 2010.
-
M. Gagne, S. Narayan, and R. Safavi-Naini, Threshold Attribute-Based Signcryption, 7th International Conference on Security and Cryptography for Networks (SCN'10), 18 pages, September 2010.
-
M. Jafari, R. Safavi-Naini, C. Saunders, and N. P. Sheppard, Securing Medical Research Data with a Rights Management System, 1st USENIX Workshop on Health Security and Privacy (HealthSec'10), 2 pages, August 2010.
- Ryan Henry, Kevin Henry, Ian Goldberg. "Making a Nymbler Nymble using VERBS". 10th Privacy Enhancing Technologies Symposium. pp. 111–129. July 2010.
- Femi Olumofin, Ian Goldberg. "Privacy-preserving Queries over Relational Databases". 10th Privacy Enhancing Technologies Symposium. pp. 75–92. July 2010.
- Femi Olumofin, Piotr K. Tysowski, Ian Goldberg, Urs Hengartner. "Achieving Efficient Query Privacy for Location Based Services". 10th Privacy Enhancing Technologies Symposium. pp. 93–110. July 2010.
- Maxwell Young, Aniket Kate, Ian Goldberg, Martin Karsten. "Practical Robust Communication in DHTs Tolerating a Byzantine Adversary". 30th International Conference on Distributed Computing Systems. pp. 263–272. June 2010.
-
M. A. Tuhin, Hongsong Shi, and R. Safavi-Naini, ($\varepsilon$, 0)-Secure Message Transmission, Canadian Workshop on Information Theory, Ottawa, Canada, 5 pages, May 2009.
-
M. Sramka, R. Safavi-Naini, J. Denzinger, and M. Askari, A Practice-oriented Framework for Measuring Privacy and Utility in Data Sanitization Systems, International Workshop on Privacy and Anonymity in the Information Society (PAIS), Switzerland, March 2010.
- Aniket Kate, Ian Goldberg. "Using Sphinx to Improve Onion Routing Circuit Construction". Financial Cryptography and Data Security 2010. pp. 359–366. January 2010.
-
M. Sramka, R. Safavi-Naini, J. Denzinger, An
Attack on the Privacy of Sanitized Data That Fuses the Outputs of
Multiple Data Miners, International Workshop on Privacy Aspects of Data Mining (PADM 2009), December 2009.
- I. Goldberg, B. Ustaoğlu, M. Van Gundy, H. Chen, Multi-party Off-the-Record Messaging. 16th ACM Conference on Computer and Communications Security. pp. 358–368. November 2009.
- M. Jafari, R. Safavi-Naini, N. P. Sheppard, Enforcing Purpose of Use via
Workflows. 8th ACM Workshop on Privacy in the Electronic Society (WPES'09), 4 pages, November 2009.
- C. Alexander, J. Reardon, I. Goldberg, Plinko: Polling with a Physical Implementation of a Noisy Channel. Workshop on Privacy in the Electronic Society 2009. pp. 109–112. November 2009.
- J. Reardon, I. Goldberg, Improving Tor Using a TCP-over-DTLS Tunnel. 18th USENIX Security Symposium. pp. 119–133. August 2009.
- N. P. Sheppard, R. Safavi-Naini, M. Jafari, A Digital Rights Management Model for Healthcare. IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY 2009). pp. 106–109. July 2009.
- K. Barker, M. Askari, M. Banerjee, K. Ghazinour, B. Mackas, M. Majedi, S. Pun and A. Williams, A Data Privacy Taxonomy. 26th British National Conference on Databases (BNCOD 2009). pp. 42-54. July 2009.
- S. F. Shahandashti, R. Safavi-Naini, Threshold Attribute-based Signatures and their Application to
Anonymous Credential Systems.
AFRICACRYPT 2009. pp. 198–216. June 2009.
- A. Kate, I. Goldberg, Distributed Key Generation for the Internet. 29th International Conference on Distributed Computing Systems. pp. 119–128. June 2009.
-
I. Goldberg, A. Mashatan and D. Stinson,
A New Message Recognition Protocol with Self-recoverability
for Ad Hoc Pervasive Networks. 7th International Conference on Applied Cryptography and Network Security. pp. 219–237. June 2009.
- G. Danezis, I. Goldberg, Sphinx: A Compact and Provably Secure Mix Format. 2009 IEEE Symposium on Security and Privacy. pp. 269–282. May 2009.
- K. Kianmehr and R. Alhajj, Calling
Communities Analysis and Identification Using Machine Learning
Techniques. Journal of Expert Systems with Applications,
Vol. 36, No. 3, pp. 6218-6226. April 2009.
- C. Y. Ng, W. Susilo, Y. Mu and R.
Safavi-Naini, RFID
Privacy Models Revisited. The 13th European Symposium on
Research in Computer Security (ESORICS 2008), pp. 251-266. October
2008.
- M. Sramka, R. Safavi-Naini, J. Denzinger,
M. Askari and J. Gao, Utility
of Knowledge Extracted from Unsanitized Data when Applied to Sanitized
Data. The 6th Annual Conference on
Privacy, Security and Trust (PST 2008), pp. 227-231. October 2008.
-
S. Jiang, R. Safavi-Naini, An Efficient Deniable Key Exchange Protocol, Financial Cryptography, vol. 5143, pp. 47-52, August 2008.
- R. Stedman, K. Yoshida and I. Goldberg,
A User Study of Off-the-Record Messaging. The 2008 Symposium On Usable Privacy and Security (SOUPS 2008), pp. 95–104. July 2008.
- K. Kianmehr and R. Alhajj, Effectiveness of Machine Learning Techniques for Automated Identification of Calling Communities. The 12th International Conference Information Visualisation, International Symposium on Open Source Intelligence and Web Mining, pp. 308-313. July 2008.
-
R. Safavi-Naini, S. Jiang, Non-interactive Conference Key Distribution and its Applications, Proceedings of the ACM Symposium on Information, Computer and Communications Security 2008, pp. 271-282, March 2008.
-
S. F. Shahandashti and R. Safavi-Naini, Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures. The 11th International Workshop on Practice and Theory in Public-Key Cryptography (PKC 2008), pp. 121-140. March 2008.
Articles in refereed publications —
Submitted
-
R. Safavi-Naini, M. A. Alam Tuhin, H. Shi. Secure Message Transmission With Guessing Privacy.
-
H. Zakerzadeh, C. Aggrawal, K. Barker, Towards breaking the curse of dimensionality for high-dimensional anonymization.
-
R. Karimi Adl, M. Askari, K. Barker, R. Safavi-Naini, Privacy Consensus in Sanitization Systems Via Game Theory.
- Ian Goldberg, Douglas Stebila, Berkant Ustaoglu. Anonymity and one-way authentication in key exchange protocols.
- N. Safa and R. Safavi-Naini. Privacy preserving Implicit Authentication.
- N. Safa, S. Sarkar, R. Safavi-Naini and M. Ghaderi. Location-based Authentication with Dynamic Verifiers.
- Maxwell Young, Aniket Kate, Ian Goldberg, Martin Karsten. Practical Robust Communication in DHTs Tolerating a Byzantine Adversary.
Theses
-
Mina Askari, Towards Theoretical and Practical Evaluation of Privacy and Utility of Data Sanitization Mechanisms, PhD Thesis, September, 2012.
-
M. A. Alam Tuhin, New Results on Secure Message Transmission, PhD Thesis, September, 2012.
-
Masoud Barati, Learning Decision Trees Through Black-Box Queries, MSc Thesis, November, 2011.
- N. Safa, Secure Localization in Wireless Environment. M.Sc. Thesis, September 2011.
- F. Olumofin, Practical Private Information Retrieval. Ph.D. Thesis, August 2011.
- R. Henry, Nymbler: Privacy-enhanced Protection from Abuses of Anonymity. Master's Thesis, January 2011.
-
G. Zaverucha, Hash Families and Cover-Free Families with Cryptographic Applications. Ph.D. Thesis, September 2010.
-
C. Tang, An Improved Algorithm for Tor Circuit Scheduling. Master's Thesis, July 2010.
-
A. Kate, Distributed Key Generation and Its Applications. Ph.D. Thesis, June 2010.
-
J. Reardon, Improving Tor using a TCP-over-DTLS Tunnel. Master's Thesis, September 2008.
Technical Reports
-
R. Safavi-Naini, M. A. Alam Tuhin, P. Wang.
A General Construction for 1-round δ-RMT and (0, δ)-SMT. Cryptology ePrint Archive Report 2012/231, April, 2012.
- Mashael AlSabah, Kevin Bauer, Tariq Elahi, Ian Goldberg. Tempura: Improved Tor Performance with Multipath Routing. CACR Tech Report 2011-29. 21 pages. August 2011.
- Angèle Hamel, Jean-Charles Grégoire, Ian Goldberg. The Mis-entropists: New Approaches to Measures in Tor. CACR Tech Report 2011-18. 10 pages. July 2011.
- Simina Brânzei, Tariq Elahi, Ian Goldberg. Local Anonymity: A Metric for Improving User Privacy in Tor. CACR Tech Report 2011-17. 6 pages. July 2011.
- Michael Backes, Ian Goldberg, Aniket Kate, Tomas Toft. Adding Query Privacy to Robust DHTs. arXiv Tech Report 1107.1072. 18 pages. July 2011.
- Michael Backes, Ian Goldberg, Aniket Kate, Esfandiar Mohammadi. Provably Secure and Practical Onion Routing. ePrint Tech Report 2011/308. 21 pages. June 2011.
- Ian Goldberg, Douglas Stebila, Berkant Ustaoglu. Anonymity and one-way authentication in key exchange protocols. CACR Tech Report 2011-11. 24 pages. May 2011.
- Femi Olumofin, Ian Goldberg. Preserving Access Privacy Over Large Databases. CACR Tech Report 2010-33. 22 pages. November 2010.
- N. P. Sheppard, R. Safavi-Naini, M. Jafari, A Secure Electronic Healthcare Record Infrastructure in the Digital Rights Management Model. Technical Report 2009-939-18, Department of Computer Science, University of Calgary, 2009.
- M. Sramka, R. Safavi-Naini, J. Denzinger,
M. Askari and J. Gao, Utility
of Knowledge Discovered from Sanitized Data. Technical
Report 2008-910-23, Department of Computer Science, University of
Calgary, 2008.