Follow
Mohammad Sadeq Dousti
Mohammad Sadeq Dousti
Verified email at uni-mainz.de
Title
Cited by
Cited by
Year
FORSAKES: A forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes
MS Dousti, R Jalili
Advances in Mathematics of Communications (AMC) 9 (4), 471–514, 2015
192015
Efficient Statistical Zero-Knowledge Authentication Protocols for Smart Cards Secure Against Active & Concurrent Attacks
MS Dousti, R Jalili
16*2013
An efficient statistical zero-knowledge authentication protocol for smart cards
MS Dousti, R Jalili
International Journal of Computer Mathematics 93 (3), 453-481, 2016
14*2016
Moderated redactable blockchains: A definitional framework with an efficient construct
MS Dousti, A Küpçü
Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS …, 2020
132020
An efficient and provably-secure coercion-resistant e-voting protocol
AT Haghighat, MS Dousti, R Jalili
2013 Eleventh Annual Conference on Privacy, Security and Trust, 161-168, 2013
92013
Statistical Disclosure: Improved, Extended, and Resisted
N Emamdoost, MS Dousti, R Jalili
The 6th International Conference on Emerging Security Information, Systems …, 2012
4*2012
Tri-op redactable blockchains with block modification, removal, and insertion
MS Dousti, A Küpçü
Turkish Journal of Electrical Engineering & Computer Sciences 2022 (2), 376-391, 2022
32022
An efficient DC-net based anonymous message transmission protocol
AA Sardroud, MS Dousti, R Jalili
Proceedings of the 6th International ISC Conference on Information Security …, 2009
32009
Neural Networks, Inside Out: Solving for Inputs Given Parameters (A Preliminary Investigation)
M Sadeq Dousti
arXiv e-prints, arXiv: 2110.03649, 2021
1*2021
Minimal assumptions to achieve privacy in e-voting protocols
AT Haghighat, MA Kargar, MS Dousti, R Jalili
2013 10th International ISC Conference on Information Security and …, 2013
12013
Black-box computational zero-knowledge proofs, revisited: The simulation-extraction paradigm
MS Dousti
Cryptology ePrint Archive, 2010
12010
Fast Private Parameter Learning and Inference for Sum-Product Networks
E Althaus, MS Dousti, S Kramer, NJP Rassau
arXiv preprint arXiv:2104.07353, 2021
2021
SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing.
JG Chamani, MS Dousti, R Jalili, D Papadopoulos
ISeCure 11 (1), 2019
2019
Amplification Lemma for BPP
MS Dousti
2015
Milder Definitions of Computational Approximability: The Case of Zero-Knowledge Protocols
MS Dousti, R Jalili
Cryptology ePrint Archive, 2011
2011
Universally Composable Priced Oblivious Transfer
Y Sobhdel, MS Dousti, R Jalili
2010
Privacy-Preserving Single Layer Perceptron
MS Dousti, M AmirHaeri, R Jalili
The system can't perform the operation now. Try again later.
Articles 1–17