Sima jafarikhah
Sima jafarikhah
University of North Carolina Wilmington
No verified email
Cited by
Cited by
Homomorphic secret sharing from paillier encryption
N Fazio, R Gennaro, T Jafarikhah, WE Skeith
Provable Security: 11th International Conference, ProvSec 2017, Xi'an, China …, 2017
Traditional countermeasures to unwanted email
H Siadati, S Jafarikhah, M Jakobsson
Understanding social engineering based scams, 51-62, 2016
The Riesz Representation Operator on the Dual of C [0; 1] is Computable.
T Jafarikhah, K Weihrauch
J. Univers. Comput. Sci. 19 (6), 750-770, 2013
Computable Jordan decomposition of linear continuous functionals on C [0; 1]
T Jafarikhah, K Weihrauch
Log. Methods Comput. Sci 10 (3), 13, 2014
Publicly evaluatable perceptual hashing
R Gennaro, D Hadaller, T Jafarikhah, Z Liu, WE Skeith, A Timashova
Applied Cryptography and Network Security: 18th International Conference …, 2020
Computable Jordan Decomposition of Linear Continuous Functionals on
K Weihrauch, T Jafarikhah
Logical Methods in Computer Science 10, 2014
DevPhish: Exploring Social Engineering in Software Supply Chain Attacks on Developers
H Siadati, S Jafarikhah, E Sahin, TB Hernandez, EL Tripp, D Khryashchev
arXiv preprint arXiv:2402.18401, 2024
Exploring the Threat of Software Supply Chain Attacks on Containerized Applications
M Mounesan, S Siadati, Hossein, Jafarikhah
6th International Conference on Security of Information and Networks, 2023
Efficient Protocols for Multi-Party Computation
T Jafarikhah
City University of New York, 2021
Efficient Virtual Machine Provisioning Techniques in Cloud Computing: A Systematic Review
K Kaushik, G Sharma, G Chhabra, A Vishnoi, P Narooka, C Pavel, ...
Computable Riesz Representation on The Dual of C [0; 1]) Revisited
T Jafarikhah, K Weihrauch
The system can't perform the operation now. Try again later.
Articles 1–11