• 46 Citations
  • 2 h-Index
20092020

Research output per year

If you made any changes in Pure these will be visible here soon.

Fingerprint Dive into the research topics where Hoda Maleki is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output

  • 46 Citations
  • 2 h-Index
  • 8 Conference contribution

Using Universal Composition to Design and Analyze Secure Complex Hardware Systems

Canetti, R., Van Dijk, M., Maleki, H., Ruhrmair, U. & Schaumont, P., Mar 2020, Proceedings of the 2020 Design, Automation and Test in Europe Conference and Exhibition, DATE 2020. Di Natale, G., Bolchini, C. & Vatajelu, E-I. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 520-525 6 p. 9116295. (Proceedings of the 2020 Design, Automation and Test in Europe Conference and Exhibition, DATE 2020).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • On the universally composable security of openstack

    Hogan, K., Maleki, H., Rahaeimehr, R., Canetti, R., Van Dijk, M., Hennessey, J., Varia, M. & Zhang, H., Sep 2019, Proceedings - 2019 IEEE Secure Development, SecDev 2019. Institute of Electrical and Electronics Engineers Inc., p. 20-33 14 p. 8901675. (Proceedings - 2019 IEEE Secure Development, SecDev 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations

    Weak-Unforgeable Tags for Secure Supply Chain Management

    van Dijk, M., Jin, C., Maleki, H., Ha Nguyen, P. & Rahaeimehr, R., Jan 1 2018, Financial Cryptography and Data Security - 22nd International Conference, FC 2018, Revised Selected Papers. Meiklejohn, S. & Sako, K. (eds.). Springer Verlag, p. 80-98 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10957 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • New clone-detection approach for RFID-based supply chains

    Maleki, H., Rahaeimehr, R., Jin, C. & Van Dijk, M., Jun 16 2017, Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2017. Institute of Electrical and Electronics Engineers Inc., p. 122-127 6 p. 7951810. (Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2 Scopus citations

    SoK: RFID-based clone detection mechanisms for supply chains

    Maleki, H., Rahaeimehr, R. & Van Dijk, M., Nov 3 2017, ASHES 2017 - Proceedings of the 2017 Workshop on Attacks and Solutions in Hardware Security, co-located with CCS 2017. Association for Computing Machinery, Inc, p. 33-41 9 p. (ASHES 2017 - Proceedings of the 2017 Workshop on Attacks and Solutions in Hardware Security, co-located with CCS 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 1 Scopus citations