Publications
-
Hammad Afzali, Santiago Torres-Arias, Reza Curtmola and Justin Cappos, Towards adding verifiability to web-based Git repositories, Journal of Computer Security, vol. 28, no. 4, pp. 405-436, 2020.
[BibTeX] [PDF] [Project Page]@article{afzali2020towards, author = {Afzali, Hammad and Torres-Arias, Santiago and Curtmola, Reza and Cappos, Justin}, title = {Towards adding verifiability to web-based Git repositories}, journal = {Journal of Computer Security}, publisher = {IOS Press}, year = {2020}, volume = {28}, number = {4}, pages = {405--436} }
-
Santiago Torres-Arias, Hammad Afzali, Trishank Karthik Kuppusamy, Reza Curtmola and Justin Cappos, in-toto: Providing farm-to-table guarantees for bits and bytes, in 28th USENIX Security Symposium (USENIX Security 19), pp. 1393-1410, 2019.
[BibTeX] [PDF] [Project Page]@inproceedings{torres2019toto, author = {Torres-Arias, Santiago and Afzali, Hammad and Kuppusamy, Trishank Karthik and Curtmola, Reza and Cappos, Justin}, title = {in-toto: Providing farm-to-table guarantees for bits and bytes}, booktitle = {28th USENIX Security Symposium (USENIX Security 19)}, year = {2019}, pages = {1393--1410} }
-
Hammad Afzali, Santiago Torres-Arias, Reza Curtmola and Justin Cappos, le-git-imate: Towards verifiable web-based Git repositories, in Proceedings of the 2018 on Asia Conference on Computer and Communications Security, pp. 469-482, 2018.
[BibTeX] [PDF]@inproceedings{afzali2018git, author = {Afzali, Hammad and Torres-Arias, Santiago and Curtmola, Reza and Cappos, Justin}, title = {le-git-imate: Towards verifiable web-based Git repositories}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security}, year = {2018}, pages = {469--482} }
-
Hammad Afzali, Hamed Nemati and Reza Azmi, Private Key-Based Query on Encrypted Data, in ISC International Journal of Information Security (ISeCure), vol. 4, no. 1, pp. 41-50, 2012.
[BibTeX] [PDF]@article{afzali2012isecure, author = {Afzali, Hammad and Nemati, Hamed and Azmi, Reza}, title = {Private Key-Based Query on Encrypted Data}, journal = {ISC International Journal of Information Security (ISeCure)}, year = {2012}, volume = {4}, number = {1}, pages = {41--50} }