NEWS
Find a Professional: Explore Experts Across 197 Disciplines in 221 Countries!
Just Updated: Compare Your Institution (Live Data)
Print Your Certificate
New! Young University / Institution Rankings 2025
New! Art & Humanities Rankings 2025
New! Social Sciences and Humanities Rankings 2025
Highly Cited Researchers 2025 (Updated Today)
AD
Scientific Index 2025
Scientist Rankings
University Rankings
Subject Rankings
Country Rankings
Login
Register & Pricing
insights
H-Index Rankings
insights
i10 Productivity Rankings
format_list_numbered
Citation Rankings
subject
University Subject Rankings
school
Young Universities
format_list_numbered
Top 100 Scientists
format_quote
Top 100 Institutions
format_quote
For Students
local_fire_department
Country Reports
person
Find a Professional
Siamak F Shahandashti
University of York - York / United Kingdom
Engineering & Technology / Computer Science
AD Scientific Index ID: 1491281
Registration, Add Profile,
Premium Membership
Get Your Global Impact Certificate
Ranking &
Analysis
Job
Experiences
Education
Information
Published Books
Book Chapters
Articles
Presentations
Lessons
Projects
Co-Authors
Subject Leaders
Editorship, Referee &
Scientific Board
Patents /
Designs
Academic Grants
& Awards
Artistic
Activities
Certificate / Course
/ Trainings
Association &
Society Memberships
Contact, Office
& Social Media
person_outline
Siamak F Shahandashti's MOST POPULAR ARTICLES
1-)
A smart contract for boardroom voting with maximum voter privacy Financial Cryptography and Data Security: 21st International Conference, FC …, 2017
2-)
Threshold attribute-based signatures and their application to anonymous credential systems Progress in Cryptology–AFRICACRYPT 2009: Second International Conference on …, 2009
3-)
Towards bitcoin payment networks Information Security and Privacy: 21st Australasian Conference, ACISP 2016 …, 2016
4-)
Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts International journal of information security 12, 251-265, 2013
5-)
Attribute-based encryption without key cloning International Journal of Applied Cryptography 2 (3), 250-270, 2012
ARTICLES
Add your articles
We use cookies to personalize our website and offer you a better experience. If you accept cookies, we can offer you special services.
Cookie Policy
Accept