1![A New Look at the Refund Mechanism in the Bitcoin Payment Protocol Sepideh Avizheh1 , Reihaneh Safavi-Naini1 , and Siamak F. Shahandashti2 1 University of Calgary, Calgary, Alberta, Canada A New Look at the Refund Mechanism in the Bitcoin Payment Protocol Sepideh Avizheh1 , Reihaneh Safavi-Naini1 , and Siamak F. Shahandashti2 1 University of Calgary, Calgary, Alberta, Canada](https://www.pdfsearch.io/img/e35fd533d6f76348c8513c2784c80848.jpg) | Add to Reading ListSource URL: fc18.ifca.aiLanguage: English - Date: 2018-01-14 11:45:37
|
---|
2![Privacy-Preserving Implicit Authentication Nashad Safa Rei Safavi-Naini Siamak Shahandashti Privacy-Preserving Implicit Authentication Nashad Safa Rei Safavi-Naini Siamak Shahandashti](https://www.pdfsearch.io/img/5884bebe6e72e613fd5610d2ad8300d2.jpg) | Add to Reading ListSource URL: www-users.cs.york.ac.ukLanguage: English - Date: 2017-02-20 12:19:35
|
---|
3![International Organizing Committee Young Physicists’ Tournament IOC meeting Minutes July 30th 2011, Safavi Hotel, Esfahan, Iran International Organizing Committee Young Physicists’ Tournament IOC meeting Minutes July 30th 2011, Safavi Hotel, Esfahan, Iran](https://www.pdfsearch.io/img/fc7082f84966a8080718815760e06774.jpg) | Add to Reading ListSource URL: www.iypt.orgLanguage: English - Date: 2015-02-07 19:49:48
|
---|
4![Private Fingerprint Matching Siamak F Shahandashti Reihaneh Safavi-Naini Philip Ogunbona Uni of Wollongong Private Fingerprint Matching Siamak F Shahandashti Reihaneh Safavi-Naini Philip Ogunbona Uni of Wollongong](https://www.pdfsearch.io/img/0860743727f03e892cb5edd533d9cf09.jpg) | Add to Reading ListSource URL: www-users.cs.york.ac.ukLanguage: English - Date: 2017-02-20 12:22:44
|
---|
5![Economically Optimal Variable Tag Length Message Authentication Reihaneh Safavi-Naini1 , Viliam Lis´y2 , and Yvo Desmedt3 1 Department of Computer Science, University of Calgary, CA, Economically Optimal Variable Tag Length Message Authentication Reihaneh Safavi-Naini1 , Viliam Lis´y2 , and Yvo Desmedt3 1 Department of Computer Science, University of Calgary, CA,](https://www.pdfsearch.io/img/cbf8dcda554d4c261f38e9383800d6c1.jpg) | Add to Reading ListSource URL: fc17.ifca.ai- Date: 2017-03-17 11:59:45
|
---|
6![Privacy Consensus in Anonymization Systems Via Game Theory Rosa Karimi Adl, Mina Askari, Ken Barker, and Reihaneh Safavi-Naini Department of Computer Science, University of Calgary, Canada {rkarimia,maskari,kbarker,rei}@ Privacy Consensus in Anonymization Systems Via Game Theory Rosa Karimi Adl, Mina Askari, Ken Barker, and Reihaneh Safavi-Naini Department of Computer Science, University of Calgary, Canada {rkarimia,maskari,kbarker,rei}@](https://www.pdfsearch.io/img/3f2dba430ae8d9af35e663bf21979f83.jpg) | Add to Reading ListSource URL: dspace.ucalgary.ca- Date: 2015-03-19 05:09:30
|
---|
7![Reducing Million-Node Graphs to a Few Structural Patterns: A Unified Approach Yike Liu Tara Safavi Reducing Million-Node Graphs to a Few Structural Patterns: A Unified Approach Yike Liu Tara Safavi](https://www.pdfsearch.io/img/c10d817229dec85680375f1ea9e6cf9c.jpg) | Add to Reading ListSource URL: www.mlgworkshop.orgLanguage: English - Date: 2016-08-14 01:22:56
|
---|
8![Cite as: M.A. Giese, G. Ravishankar, S. Safavi, D. Endres (2013): Physiologically-inspired neural model for the processing of dynamic facial expressions. Presented at the 10Th Göttingen Meeting of the German Neuroscienc Cite as: M.A. Giese, G. Ravishankar, S. Safavi, D. Endres (2013): Physiologically-inspired neural model for the processing of dynamic facial expressions. Presented at the 10Th Göttingen Meeting of the German Neuroscienc](https://www.pdfsearch.io/img/700cad7f3574c7cef1ee0866eed10887.jpg) | Add to Reading ListSource URL: www.kyb.tuebingen.mpg.deLanguage: English - Date: 2015-03-11 06:47:29
|
---|
9![Specialized insulin is used for chemical warfare by fish-hunting cone snails Helena Safavi-Hemamia,b,1, Joanna Gajewiaka, Santhosh Karanthc,d, Samuel D. Robinsone, Beatrix Ueberheidef, Adam D. Douglassg, Amnon Schlegelc, Specialized insulin is used for chemical warfare by fish-hunting cone snails Helena Safavi-Hemamia,b,1, Joanna Gajewiaka, Santhosh Karanthc,d, Samuel D. Robinsone, Beatrix Ueberheidef, Adam D. Douglassg, Amnon Schlegelc,](https://www.pdfsearch.io/img/d549e754de09dcac5182408cfbe61159.jpg) | Add to Reading ListSource URL: www.yandell-lab.orgLanguage: English - Date: 2015-03-09 14:29:08
|
---|
10![Automated Security Proof for Symmetric Encryption Modes. ? Martin Gagné2 , Pascal Lafourcade1 , Yassine Lakhnech1 , and Reihaneh Safavi-Naini2 1 Automated Security Proof for Symmetric Encryption Modes. ? Martin Gagné2 , Pascal Lafourcade1 , Yassine Lakhnech1 , and Reihaneh Safavi-Naini2 1](https://www.pdfsearch.io/img/d3100bea5b85e57c26b6dd6c2efaab91.jpg) | Add to Reading ListSource URL: www.lsv.ens-cachan.frLanguage: English - Date: 2009-09-01 13:12:37
|
---|