ORCID as entered in ROS

Select Publications
2022, 'Post-Quantum Verifiable Random Function from Symmetric Primitives in PoS Blockchain', in , pp. 25 - 45, http://dx.doi.org/10.1007/978-3-031-17140-6_2
,2021, 'Geo-DRS: Geometric Dynamic Range Search on Spatial Data with Backward and Content Privacy', in , pp. 24 - 43, http://dx.doi.org/10.1007/978-3-030-88428-4_2
,2014, 'Secure Identity-Based Cryptographic Schemes', in Security In Computing and Networking, Universiti Teknologi Malaysia (UTM)
,2025, 'A Verifiable and Efficient Symmetric Searchable Encryption Scheme for Dynamic Dataset With Forward and Backward Privacy', IEEE Transactions on Dependable and Secure Computing, 22, pp. 2741 - 2755, http://dx.doi.org/10.1109/TDSC.2024.3521423
,2024, 'Securely sharing outsourced IoT data: A secure access and privacy preserving keyword search scheme', Ad Hoc Networks, 158, http://dx.doi.org/10.1016/j.adhoc.2024.103478
,2024, 'ACE: A Consent-Embedded privacy-preserving search on genomic database', Heliyon, 10, http://dx.doi.org/10.1016/j.heliyon.2024.e29399
,2024, 'A Taxonomy-Based Survey of EM-SCA and Implications for Multi-Robot Systems', IEEE Open Journal of the Computer Society, 5, pp. 511 - 529, http://dx.doi.org/10.1109/OJCS.2024.3461808
,2024, 'Fast and private multi-dimensional range search over encrypted data', Information Sciences, 652, http://dx.doi.org/10.1016/j.ins.2023.119773
,2024, 'GHOSTForge: A Scalable Consensus Mechanism for DAG-Based Blockchains', IEEE Open Journal of the Computer Society, 5, pp. 736 - 747, http://dx.doi.org/10.1109/OJCS.2024.3497892
,2023, 'A Survey on Exotic Signatures for Post-quantum Blockchain: Challenges and Research Directions', ACM Computing Surveys, 55, pp. 1 - 32, http://dx.doi.org/10.1145/3572771
,2022, 'Range search on encrypted spatial data with dynamic updates', Journal of Computer Security, 30, pp. 829 - 849, http://dx.doi.org/10.3233/JCS-210168
,2022, 'Geometric Range Search on Encrypted Data with Forward/Backward Security', IEEE Transactions on Dependable and Secure Computing, 19, pp. 698 - 716, http://dx.doi.org/10.1109/TDSC.2020.2982389
,2022, 'PrivGenDB: Efficient and privacy-preserving query executions over encrypted SNP-Phenotype database', Informatics in Medicine Unlocked, 31, pp. 100988, http://dx.doi.org/10.1016/j.imu.2022.100988
,2021, 'Multi-Client Cloud-Based Symmetric Searchable Encryption', IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 18, pp. 2419 - 2437, http://dx.doi.org/10.1109/TDSC.2019.2950934
,2016, 'Appropriate lightweight cryptosystems for wireless sensor networks', Arpn Journal of Engineering and Applied Sciences, 11, pp. 6296 - 6302
,2024, 'On Sealed-bid Combinatorial Auction with Privacy-Preserving Dynamic Programming', in 18th International Conference on Provable and Practical Security, ProvSec 2024, Gold Coast, Australia, presented at The 18th International Conference on Provable and Practical Security, Gold Coast, Australia, 25 September 2024 - 27 September 2024, https://link.springer.com/book/9789819609567
,2024, 'VirtuGuard: Ethically Aligned Artificial Intelligence Framework for Cyberbullying Mitigation', Singapore, presented at 2024 IEEE Conference on Artificial Intelligence (CAI), Singapore, 23 June 2024, http://dx.doi.org/10.1109/CAI59869.2024.00271
,2024, 'Experimental Demonstration of Risks and Influences of Cyber Attacks on Wireless Communication in Microgrids', in 2024 21st Annual International Conference on Privacy Security and Trust Pst 2024, http://dx.doi.org/10.1109/PST62714.2024.10788082
,2022, 'PRESSGenDB: PRivacy-prEserving Substring Search on Encrypted Genomic DataBase', in INFOCOM Wkshps 2022 IEEE Conference on Computer Communications Workshops, http://dx.doi.org/10.1109/INFOCOMWKSHPS54753.2022.9797931
,2021, 'A Non-interactive Multi-user Protocol for Private Authorised Query Processing on Genomic Data', in Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, pp. 70 - 94, http://dx.doi.org/10.1007/978-3-030-91356-4_5
,2021, 'Collaborative analysis of genomic data: vision and challenges', in Proceedings 2021 IEEE 7th International Conference on Collaboration and Internet Computing Cic 2021, pp. 77 - 86, http://dx.doi.org/10.1109/CIC52973.2021.00020
,2019, 'Chameleon Hash Time-Lock Contract for Privacy Preserving Payment Channel Networks', in Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, pp. 303 - 318, http://dx.doi.org/10.1007/978-3-030-31919-9_18
,2019, 'Generic Multi-keyword Ranked Search on Encrypted Cloud Data', in Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, pp. 322 - 343, http://dx.doi.org/10.1007/978-3-030-29962-0_16
,2017, 'Multi-user cloud-based secure keyword search', in Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, pp. 227 - 247, http://dx.doi.org/10.1007/978-3-319-60055-0_12
,2015, 'A novel authentication scheme for mobile environments in the context of Elliptic Curve Cryptography', in I4ct 2015 2015 2nd International Conference on Computer Communications and Control Technology Art Proceeding, pp. 506 - 510, http://dx.doi.org/10.1109/I4CT.2015.7219630
,2015, 'An enhanced certificateless cryptosystem for mobile ad hoc networks', in Proceedings 2014 International Symposium on Biometrics and Security Technologies Isbast 2014, pp. 176 - 181, http://dx.doi.org/10.1109/ISBAST.2014.7013117
,2015, 'An improved certificateless public key authentication scheme for mobile ad hoc networks over elliptic curves', in Advances in Intelligent Systems and Computing, pp. 327 - 334, http://dx.doi.org/10.1007/978-3-319-17398-6_30
,Kasra Kermanshahi S, (ed.), 2024, '21st Annual International Conference on Privacy, Security, and Trust (PST2024)', IEEE, Sydney, presented at 21st Annual International Conference on Privacy, Security, and Trust (PST2024), Sydney, 28 August 2024 - 30 August 2024, http://dx.doi.org/10.1109/PST62714.2024.10788077
2024, 'Can Aussie cyber security turbocharge cooperative autonomous adventures in the land down under?', presented at Australian Cyber Conference (CyberCon 2024), Melbourne, 26 November 2024 - 28 November 2024, https://melbourne2024.cyberconference.com.au/speakers/shabnam-kasra-2ryrz
,2024, 'Automotive Cyber Security and Information Privacy', presented at The 29th Australasian Conference on Information Security and Privacy, Sydney, 15 July 2024 - 17 July 2024
,2022, Vietnam’s Industry 4.0 Opportunities for Australian Business, file:///C:/Users/z3540640/Downloads/atih-industry-4-0-in-vietnam.pdf
,2023, A Multi-Client Searchable Encryption Scheme for IoT Environment, http://arxiv.org/abs/2305.09221v1
,