• Publications
  • Influence
Haptic-Based Sensible Graphical Password
Authentication, the process of identifying an individual, currently plays a critical role in security systems. Graphical password schemes are believed to be more secure and resilient to dictionaryExpand
  • 29
  • 5
Novel Shoulder-Surfing Resistant Haptic-based Graphical Password
Graphical password schemes are believed to be more secure and more resilient to dictionary attacks than textual passwords, but more vulnerable to shoulder surfing attacks. In this work, we design aExpand
  • 50
  • 4
Lightweight mutual RFID authentication
  • B. Malek, A. Miri
  • Computer Science
  • IEEE International Conference on Communications…
  • 10 June 2012
TLDR
A lightweight mutual authentication protocol is proposed for RFID systems in which both the tags and the reader can be authenticated to each other. Expand
  • 10
  • 3
Combining Attribute-Based and Access Systems
  • B. Malek, A. Miri
  • Computer Science
  • International Conference on Computational Science…
  • 29 August 2009
TLDR
We design a balanced access control system, where the system settings are set and fixed by an authority – usually the system administrator – and users in the system must comply with these settings. Expand
  • 23
  • 2
Secure Dot-product Protocol Using Trace Functions
  • B. Malek, A. Miri
  • Computer Science
  • IEEE International Symposium on Information…
  • 9 July 2006
TLDR
We propose a non-interactive secure dot-product protocol that only requires one round of interaction with O(n) communication overhead, where n is the size of input vectors. Expand
  • 7
  • 2
Adaptively Secure Broadcast Encryption with Short Ciphertexts
TLDR
We propose an adaptively secure broadcast encryption scheme that immediately yields adaptive security without any increase in the size of ciphertexts or use of a random oracle. Expand
  • 18
  • 1
  • PDF
Chaotic masking for securing RFID systems against relay attacks
TLDR
In this work, we propose a simple but secure masking scheme that counters the relay attack in RFID systems. Expand
  • 6
  • 1
Online Social Network with flexible and dynamic privacy policies
TLDR
We present a privacy protection solution for OSN with a customizable privacy control that is fully customizable to the users’ requirements. Expand
  • 14
Angioplastie des sténoses de l’artère rénale : résultats à court et à long termes
Resume Introduction Les stenoses des arteres renales (SAR) peuvent etre symptomatiques. Le traitement de ces lesions est en premier lieu medical, mais peut parfois necessiter une revascularisationExpand
  • 1
A framework for context-aware authentication
TLDR
We propose a framework to construct a context-aware authentication system, where users customize their preferences and set their rules for authenticating other members without undermining each party's privacy. Expand
  • 8