Home
Publications
Teaching
Contact
1
Time-Delayed Publicly Verifiable Quantum Computation with Classical Verifiers
Ameer Mohammed
,
Aydin Abadi
,
Jaffer Mahdi
Visibility-Aware GHOST: Mitigating Visibility Asymmetry in Subtree-Based Proof-of-Work Consensus
Abdulwahab Almusailem
,
Othman Alenezi
,
Ameer Mohammed
Anonymous Command Authorization for IoT Devices Using Zero-Knowledge Proofs
Mohammad Mahdi
,
Ahmad Alqattan
,
Ameer Mohammed
Quantum Federated Learning for Adaptive Intrusion Detection Systems in Software-Defined Networks
Yousef Alfezea
,
Ameer Mohammed
DOI
Incremental Deployment of Hybrid IP/SDN Network with Optimized Traffic Engineering
Ali Kelkawi
,
Ameer Mohammed
,
Anwar Alyatama
Universal Multi-party Poisoning Attacks
Saeed Mahloujifar
,
Mohammad Mahmoody
,
Ameer Mohammed
PDF
Cite
Lower Bounds on Indistinguishability Obfuscation from All-or-Nothing Encryption Primitives
Sanjam Garg
,
Mohammad Mahmoody
,
Ameer Mohammed
PDF
Cite
When does Functional Encryption Imply Obfuscation?
Sanjam Garg
,
Mohammad Mahmoody
,
Ameer Mohammed
PDF
Cite
On the Power of Hierarchical Identity-based Encryption
Mohammad Mahmoody
,
Ameer Mohammed
PDF
Cite
Lower Bounds on Assumptions Behind Indistinguishability Obfuscation
Mohammad Mahmoody
,
Ameer Mohammed
,
Soheil Nematihaji
,
Rafael Pass
,
abhi shelat
PDF
Cite
»
Cite
×