FORSAKES: A forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes MS Dousti, R Jalili Advances in Mathematics of Communications (AMC) 9 (4), 471–514, 2015 | 20 | 2015 |
Efficient Statistical Zero-Knowledge Authentication Protocols for Smart Cards Secure Against Active & Concurrent Attacks MS Dousti, R Jalili | 19* | 2013 |
Moderated redactable blockchains: A definitional framework with an efficient construct MS Dousti, A Küpçü International Workshop on Data Privacy Management, 355-373, 2020 | 15 | 2020 |
An efficient statistical zero-knowledge authentication protocol for smart cards MS Dousti, R Jalili International Journal of Computer Mathematics 93 (3), 453-481, 2016 | 13 | 2016 |
An efficient and provably-secure coercion-resistant e-voting protocol AT Haghighat, MS Dousti, R Jalili 2013 Eleventh Annual Conference on Privacy, Security and Trust, 161-168, 2013 | 10 | 2013 |
Statistical Disclosure: Improved, Extended, and Resisted N Emamdoost, MS Dousti, R Jalili The 6th International Conference on Emerging Security Information, Systems …, 2012 | 8* | 2012 |
Tri-op redactable blockchains with block modification, removal, and insertion MS Dousti, A Küpçü Turkish Journal of Electrical Engineering & Computer Sciences 2022 (2), 376-391, 2022 | 3 | 2022 |
An efficient DC-net based anonymous message transmission protocol AA Sardroud, MS Dousti, R Jalili Proceedings of the 6th International ISC Conference on Information Security …, 2009 | 2 | 2009 |
Neural Networks, Inside Out: Solving for Inputs Given Parameters (A Preliminary Investigation) M Sadeq Dousti arXiv e-prints, arXiv: 2110.03649, 2021 | 1* | 2021 |
Fast Private Parameter Learning and Inference for Sum-Product Networks E Althaus, MS Dousti, S Kramer, NJP Rassau arXiv preprint arXiv:2104.07353, 2021 | 1 | 2021 |
Minimal assumptions to achieve privacy in e-voting protocols AT Haghighat, MA Kargar, MS Dousti, R Jalili 2013 10th International ISC Conference on Information Security and …, 2013 | 1 | 2013 |
Black-box computational zero-knowledge proofs, revisited: The simulation-extraction paradigm MS Dousti Cryptology ePrint Archive, 2010 | 1 | 2010 |
SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing. JG Chamani, MS Dousti, R Jalili, D Papadopoulos ISeCure 11 (1), 2019 | | 2019 |
Amplification Lemma for BPP MS Dousti | | 2015 |
Milder Definitions of Computational Approximability: The Case of Zero-Knowledge Protocols MS Dousti, R Jalili Cryptology ePrint Archive, 2011 | | 2011 |
Universally Composable Priced Oblivious Transfer Y Sobhdel, MS Dousti, R Jalili | | 2010 |
Privacy-Preserving Single Layer Perceptron MS Dousti, M AmirHaeri, R Jalili | | |