Sima (Tahereh) jafarikhah
Sima (Tahereh) jafarikhah
Verified email at gradcenter.cuny.edu
Title
Cited by
Cited by
Year
Homomorphic secret sharing from paillier encryption
N Fazio, R Gennaro, T Jafarikhah, WE Skeith
International Conference on Provable Security, 381-399, 2017
262017
Traditional countermeasures to unwanted email
H Siadati, S Jafarikhah, M Jakobsson
Understanding social engineering based scams, 51-62, 2016
162016
Computable Jordan Decomposition of Linear Continuous Functionals on
T Jafarikhah, K Weihrauch
Logical Methods in Computer Science 10, 2014
62014
The Riesz Representation Operator on the Dual of C [0; 1] is Computable.
T Jafarikhah, K Weihrauch
J. Univers. Comput. Sci. 19 (6), 750-770, 2013
62013
Publicly Evaluatable Perceptual Hashing
R Gennaro, D Hadaller, T Jafarikhah, Z Liu, WE Skeith, A Timashova
International Conference on Applied Cryptography and Network Security, 436-455, 2020
22020
Computable Jordan Decomposition of Linear Continuous Functionals on
K Weihrauch, T Jafarikhah
arXiv preprint arXiv:1407.3679, 2014
22014
Efficient Protocols for Multi-Party Computation
T Jafarikhah
2021
Computable Riesz Representation on The Dual of C [0; 1]) Revisited
T Jafarikhah, K Weihrauch
The system can't perform the operation now. Try again later.
Articles 1–8