generated by bibbase.org
  2021 (2)
Anti-Counterfeiting for Polymer Banknotes Based on Polymer Substrate Fingerprinting. Wang, S.; Toreini, E.; and Hao, F. IEEE Transactions on Information Forensics and Security, 16: 2823–2835. 2021. Publisher: IEEE
link   bibtex  
On Secure E-Voting over Blockchain. MCCORRY, P.; MEHRNEZHAD, M.; TOREINI, E.; SHAHANDASHTI, S. F; and HAO, F. . 2021.
link   bibtex  
  2020 (7)
Authentication of physical object using internal structure. Hao, F.; Toreini, E.; and Shahandashti, S. F June 2020.
link   bibtex  
The relationship between trust in AI and trustworthy machine learning technologies. Toreini, E.; Aitken, M.; Coopamootoo, K.; Elliott, K.; Zelaya, C. G.; and van Moorsel, A. In Proceedings of the 2020 Conference on Fairness, Accountability, and Transparency, pages 272–283, 2020.
link   bibtex  
Establishing a social licence for Financial Technology: Reflections on the role of the private sector in pursuing ethical data practices. Aitken, M.; Toreini, E.; Carmichael, P.; Coopamootoo, K.; Elliott, K.; and van Moorsel, A. Big Data & Society, 7(1): 2053951720908892. 2020. Publisher: SAGE Publications Sage UK: London, England
link   bibtex  
End-to-End Verifiable E-Voting Trial for Polling Station Voting at Gateshead. Hao, F.; Wang, S.; Bag, S.; Procter, R.; Shahandashti, S. F; Mehrnezhad, M.; Toreini, E.; Metere, R.; and Liu, L. IEEE Security & Privacy. 2020. Publisher: York
link   bibtex  
Simulating the Effects of Social Presence on Trust, Privacy Concerns & Usage Intentions in Automated Bots for Finance. Ng, M.; Coopamootoo, K. P.; Toreini, E.; Aitken, M.; Elliot, K.; and van Moorsel, A. arXiv preprint arXiv:2006.15449. 2020.
link   bibtex  
Technologies for Trustworthy Machine Learning: A Survey in a Socio-Technical Context. Toreini, E.; Aitken, M.; Coopamootoo, K. P.; Elliott, K.; Zelaya, V. G.; Missier, P.; Ng, M.; and van Moorsel, A. arXiv preprint arXiv:2007.08911. 2020.
link   bibtex  
Keeping it Human: A Focus Group Study of Public Attitudes Towards AI in Banking. Aitken, M.; Ng, M.; Toreini, E.; van Moorsel, A.; Coopamootoo, K. P.; and Elliott, K. In European Symposium on Research in Computer Security, pages 21–38, 2020. Springer
link   bibtex  
  2019 (2)
What Is This Sensor and Does This App Need Access to It?. Mehrnezhad, M.; and Toreini, E. In Informatics, volume 6, pages 7, 2019. Multidisciplinary Digital Publishing Institute Issue: 1
link   bibtex  
DOMtegrity: ensuring web page integrity against malicious browser extensions. Toreini, E.; Shahandashti, S. F; Mehrnezhad, M.; and Hao, F. International Journal of Information Security, 18(6): 801–814. 2019. Publisher: Springer Berlin Heidelberg
link   bibtex  
  2018 (3)
Stealing PINs via mobile sensors: actual risk versus user perception. Mehrnezhad, M.; Toreini, E.; Shahandashti, S. F; and Hao, F. International Journal of Information Security, 17(3): 291–313. 2018. Publisher: Springer Berlin Heidelberg
link   bibtex  
Making sense of sensors: mobile sensor security awareness and education. Mehrnezhad, M.; Toreini, E.; and Alajrami, S. In Proceedings of the 7th Workshop on Socio-Technical Aspects in Security and Trust, pages 40–52, 2018.
link   bibtex  
New advances in tamper evident technologies. Toreini, E. Ph.D. Thesis, Newcastle University, 2018.
link   bibtex  
  2017 (2)
PiSHi: click the images and I tell if you are a human. Mehrnezhad, M.; Bafghi, A. G.; Harati, A.; and Toreini, E. International Journal of Information Security, 16(2): 133–149. 2017. Publisher: Springer Berlin Heidelberg
link   bibtex  
Texture to the rescue: Practical paper fingerprinting based on texture patterns. Toreini, E.; Shahandashti, S. F; and Hao, F. ACM Transactions on Privacy and Security (TOPS), 20(3): 1–29. 2017. Publisher: ACM New York, NY, USA
link   bibtex  
  2016 (3)
Touchsignatures: identification of user touch actions and pins based on mobile sensor data via javascript. Mehrnezhad, M.; Toreini, E.; Shahandashti, S. F; and Hao, F. Journal of Information Security and Applications, 26: 23–38. 2016. Publisher: Elsevier
link   bibtex  
Removing trusted tallying authorities. McCorry, P.; Toreini, E.; and Mehrnezhad, M. School of Computing Science Technical Report Series. 2016. Publisher: Newcastle University
link   bibtex  
Identification of user touch actions and PINs based on mobile sensor data via JavaScript. Mehrnezhad, M; Toreini, E; Shahandashti, S.; and Hao, F Journal of Information Security and Applications, 26: 23 – 38. 2016.
link   bibtex  
  2015 (3)
An acoustic side channel attack on enigma. Toreini, E.; Randell, B.; and Hao, F. School of Computing Science Technical Report Series. 2015. Publisher: Newcastle University
link   bibtex  
Touchsignatures: Identification of user touch actions based on mobile sensors via javascript. Mehrnezhad, M.; Toreini, E.; Shahandashti, S. F; and Hao, F. In Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, pages 673–673, 2015.
link   bibtex  
Determining User Passwords From Partial Information. Clarke, D.; Toreini, E.; and Hao, F. School of Computing Science Technical Report Series. 2015. Publisher: Newcastle University
link   bibtex  
  2014 (2)
On the privacy of private browsing-A forensic approach. Satvat, K.; Forshaw, M.; Hao, F.; and Toreini, E. Journal of information security and applications, 19(1): 88–100. 2014.
link   bibtex  
  2012 (1)
Seimcha: a new semantic image captcha using geometric transformations. Mehrnejad, M.; Ghaemi Bafghi, A.; Harati, A.; and Toreini, E. ISeCure-The ISC International Journal of Information Security, 4(1): 63–76. 2012. Publisher: Tehran, Iranian Society of Cryptology
link   bibtex  
  2011 (6)
A novel fuzzy metric to evaluate clusters for prolonging lifetime in wireless sensor networks. Neamatollahi, P.; Taheri, H.; Toreini, E.; Naghibzadeh, M.; and Yaghmaee, M. H. In International Symposium on Artificial Intelligence and Signal Processing (AISP), pages 118–123, 2011. IEEE
link   bibtex  
Clustering data with Particle Swarm Optimization using a new fitness. Toreini, E.; and Mehrnejad, M. In 3rd Conference on Data Mining and Optimization (DMO), pages 266–270, 2011. IEEE
link   bibtex  
Security analyzing and designing GUI with the resources model. Mehrnejad, M.; Toreini, E.; and Bafghi, A. G. In 8th International ISC Conference on Information Security and Cryptology, pages 29–36, 2011. IEEE
link   bibtex  
A novel method in fuzzy data clustering based on chaotic PSO. Toreini, E.; and Mehrnejad, M. In International Conference for Internet Technology and Secured Transactions, pages 335–340, 2011. IEEE
link   bibtex  
Multiple seimcha: multiple semantic image captcha. Mehrnejad, M.; Bafghi, A. G.; Harati, A.; and Toreini, E. In International Conference for Internet Technology and Secured Transactions, pages 196–201, 2011. IEEE
link   bibtex  
A new image based CAPTCHA based on geometric transformations. Mehrnejad, M; Ghaemi, A; Harati, A; and Toreini, E In 8th International ISC Conference on Information Security and Cryptology, FUM, Iran, 2011.
link   bibtex