51³Ô¹Ïapp

Blank avatar image

Dr Shabnam Kasra Kermanshahi

Professor

Ph.D., Security Sciences (Applied Cryptography), Information Technology, Monash University

UNSW Canberra
School of Systems & Computing

Dr. Shabnam Kasra is a Senior Lecturer specializing in cybersecurity at the University of New South Wales (UNSW) Canberra. She earned her Ph.D. in Security Sciences, with a focus on Applied Cryptography, from Monash University in Melbourne, Australia. Dr. Kasra has extensive experience in the field of cybersecurity, having served as a Postdoctoral Research Fellow at CSIRO's Data61, a Lecturer at RMIT University's School of Computing Technologies, and a Senior Lecturer at UNSW Canberra. Her research interests lie in the areas of cryptography, cybersecurity, information privacy, Automotive Cyber Security, and Blockchain.

Dr. Kasra is a researcher with a strong record of publications in top-tier international journals, conferences, and workshops such as ESORICS (Core A), TDSC (Core A), Information Sciences (Core A), ACM Computing Surveys (Core A*), and INFOCOM (Core A*), to name just a few. She is a CI in the SELFY consortium, a European project led by Eurecat with a budget of 7 million Euros. She was also a CI and Work Package Lead for Vietnam's Industry 4.0 Opportunities for Australian Business project (VHESIF Pool 1 - Asia Trade and Innovation Hub). Furthermore, Dr. Kasra is Project Leader for a project aimed at identifying cybersecurity best practices for the marine renewable energy sector, at Oceania Cyber Security Centre (OCSC).

Contact me for Ph.D. supervision opportunities accompanied by a highly competitive scholarship.

Location
Building 15, Room 217
  • Book Chapters | 2022
    Buser M; Dowsley R; Esgin MF; Kasra Kermanshahi S; Kuchta V; Liu JK; Phan RCW; Zhang Z, 2022, 'Post-Quantum Verifiable Random Function fromÌýSymmetric Primitives inÌýPoS Blockchain', in , pp. 25 - 45,
    Book Chapters | 2021
    Kermanshahi SK; Dowsley R; Steinfeld R; Sakzad A; Liu JK; Nepal S; Yi X, 2021, 'Geo-DRS: Geometric Dynamic Range Search on Spatial Data with Backward and Content Privacy', in , pp. 24 - 43,
    Book Chapters | 2014
    Kasra Kermanshahi S, 2014, 'Secure Identity-Based Cryptographic Schemes', in Security In Computing and Networking, Universiti Teknologi Malaysia (UTM)
  • Journal articles | 2024
    Jafarbeiki S; Sakzad A; Steinfeld R; Kasra Kermanshahi S; Thapa C; Kume Y, 2024, 'ACE: A Consent-Embedded privacy-preserving search on genomic database', Heliyon, 10,
    Journal articles | 2024
    Kermanshahi SK; Steinfeld R; Yi X; Liu JK; Nepal S; Lou J, 2024, 'Fast and private multi-dimensional range search over encrypted data', Information Sciences, 652,
    Journal articles | 2024
    Sultan NH; Kermanshahi SK; Tran HY; Lai S; Varadharajan V; Nepal S; Yi X, 2024, 'Securely sharing outsourced IoT data: A secure access and privacy preserving keyword search scheme', Ad Hoc Networks, 158,
    Journal articles | 2023
    Buser M; Dowsley R; Esgin M; Gritti C; Kermanshahi SK; Kuchta V; Legrow J; Liu J; Phan R; Sakzad A; Steinfeld R; Yu J; Kasra Kermanshahi S, 2023, 'A Survey on Exotic Signatures for Post-quantum Blockchain: Challenges and Research Directions', ACM Computing Surveys, 55, pp. 1 - 32,
    Journal articles | 2022
    Jafarbeiki S; Sakzad A; Kasra Kermanshahi S; Gaire R; Steinfeld R; Lai S; Abraham G; Thapa C, 2022, 'PrivGenDB: Efficient and privacy-preserving query executions over encrypted SNP-Phenotype database', Informatics in Medicine Unlocked, 31, pp. 100988,
    Journal articles | 2022
    Kasra Kermanshahi S; Dowsley R; Steinfeld R; Sakzad A; Liu J; Nepal S; Yi X; Lai S, 2022, 'Range search on encrypted spatial data with dynamic updates', Journal of Computer Security, 30, pp. 829 - 849,
    Journal articles | 2022
    Kermanshahi SK; Sun SF; Liu JK; Steinfeld R; Nepal S; Lau WF; Au MHA, 2022, 'Geometric Range Search on Encrypted Data with Forward/Backward Security', IEEE Transactions on Dependable and Secure Computing, 19, pp. 698 - 716,
    Journal articles | 2019
    Kasra Kermanshahi S; Liu JK; Steinfeld R; Nepal S; Lai S; Loh R; Zuo C, 2019, 'Multi-client Cloud-based Symmetric Searchable Encryption', IEEE Transactions on Dependable and Secure Computing, pp. 1 - 1,
    Journal articles | 2016
    Kasra-Kermanshahi S; Salleh M; Chizari H, 2016, 'Appropriate lightweight cryptosystems for wireless sensor networks', ARPN Journal of Engineering and Applied Sciences, 11, pp. 6296 - 6302
  • Conference Papers | 2024
    Wang M; Boshuijzen-van Burken C; Sun N; Kasra Kermanshahi S; Zhang Y; Hu J, 2024, 'VirtuGuard: Ethically Aligned Artificial Intelligence Framework for Cyberbullying Mitigation', Singapore, presented at 2024 IEEE Conference on Artificial Intelligence (CAI), Singapore, 23 June 2024,
    Preprints | 2023
    Sultan NH; Kasra-Kermanshahi S; Tran Y; Lai S; Varadharajan V; Nepal S; Yi X, 2023, A Multi-Client Searchable Encryption Scheme for IoT Environment,
    Conference Papers | 2022
    Jafarbeiki S; Sakzad A; Kermanshahi SK; Steinfeld R; Gaire R, 2022, 'PRESSGenDB: PRivacy-prEserving Substring Search on Encrypted Genomic DataBase', in INFOCOM WKSHPS 2022 - IEEE Conference on Computer Communications Workshops,
    Reports | 2022
    Kasra Kermanshahi S; Thai V; von Kaenel J; Arrigo R; Baulch B; Pham T; Chhetri P; Nguyen T; Alamgir Hossain M; Shahparvari S, 2022, Vietnam’s Industry 4.0 Opportunities for Australian Business, file:///C:/Users/z3540640/Downloads/atih-industry-4-0-in-vietnam.pdf
    Conference Papers | 2021
    Jafarbeiki S; Gaire R; Sakzad A; Kermanshahi SK; Steinfeld R, 2021, 'Collaborative analysis of genomic data: vision and challenges', in Proceedings - 2021 IEEE 7th International Conference on Collaboration and Internet Computing, CIC 2021, pp. 77 - 86,
    Conference Papers | 2021
    Jafarbeiki S; Sakzad A; Kermanshahi SK; Steinfeld R; Gaire R; Lai S, 2021, 'A Non-interactive Multi-user Protocol for Private Authorised Query Processing on Genomic Data', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 70 - 94,
    Conference Papers | 2019
    Kasra Kermanshahi S; Liu JK; Steinfeld R; Nepal S, 2019, 'Generic Multi-keyword Ranked Search on Encrypted Cloud Data', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 322 - 343,
    Conference Papers | 2019
    Yu B; Kermanshahi SK; Sakzad A; Nepal S, 2019, 'Chameleon Hash Time-Lock Contract for Privacy Preserving Payment Channel Networks', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 303 - 318,
    Conference Papers | 2017
    Kermanshahi SK; Liu JK; Steinfeld R, 2017, 'Multi-user cloud-based secure keyword search', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 227 - 247,
    Conference Papers | 2015
    Kasra-Kermanshahi S; Salleh M, 2015, 'A novel authentication scheme for mobile environments in the context of Elliptic Curve Cryptography', in I4CT 2015 - 2015 2nd International Conference on Computer, Communications, and Control Technology, Art Proceeding, pp. 506 - 510,
    Conference Papers | 2015
    Kasra-Kermanshahi S; Salleh M, 2015, 'An improved certificateless public key authentication scheme for mobile ad hoc networks over elliptic curves', in Advances in Intelligent Systems and Computing, pp. 327 - 334,
    Conference Papers | 2015
    Kermanshahi SK; Salleh M, 2015, 'An enhanced certificateless cryptosystem for mobile ad hoc networks', in Proceedings - 2014 International Symposium on Biometrics and Security Technologies, ISBAST 2014, pp. 176 - 181,

  • SELFY; "contributing with expertise in Artificial Intelligence techniques to detect cyber-attacks in distributed systems." European project consortium led by Eurecat
  • Vietnam’s Industry 4.0 Opportunities for Australian Business (VHESIF Pool 1 - Asia Trade and Innovation Hub)
  • Identifying cybersecurity best practices for marine renewable energy, The not-for-profit Oceania Cyber Security Centre (OCSC)
  • Secure Content Storage and Delivery via Blockchain Technology

  • Ethically aligned AIÌýcyberbullying detection tools

  • Innovations in online postgraduate teaching to enhance engagement, learning outcomes, and course scores

Ìý

  • Nominee Vice Chancellor’s and RMIT Research Awards
  • Postgraduate Publication Award
  • People’s Choice Award, Faculty of IT 3 Minute Thesis Competition- Monash University
  • Winner’s Award, Faculty of IT 3 Minute Thesis Competition- Monash University
  • Best Student Paper Award (ACISP 2017)
  • CSIRO Data61 research scholarship
  • Monash Graduate Scholarship (MGS)
  • Best Student Award with golden medal (Master degree)

My Research Supervision

**ÌýScholarships of $35,000 (AUD) are available for PhD students who achieved High Distinction (H1) in their undergraduate program and/or have completed a Masters by Research.

Research StudentÌý(PhD & Master by Research)ÌýScholarships:

Several types of scholarships are available; however, admission and scholarship applications are highly competitive. AÌýÌýis available to get a general feel for your competitiveness. You need to meet theÌýEnglish language requirements.

If you are eligible and interested in working on the following (or closely related) topics or keywords, please send me yourÌýCV,Ìýacademic transcripts,Ìýthe result ofÌýthe self-assessment,Ìýand aÌýresearch proposal:Ìýhighlight researchÌýMotivation,ÌýResearch problems,ÌýResearch ObjectivesÌýandÌýQuestions, a brief Review of the most relevant Literature, your proposedÌýMethodologyÌý(discussing your proposed approach to answer the RQs including the type of data you need and how you will get them, techniques, etc.) andÌýExpected Outcome.

For more information,Ìýplease refer to the following links onÌýÌýandÌýÌýto apply for a research degree.

  • Applied Cryptography
  • Searchable Encryption
  • Secure Content Storage and Delivery via Blockchain Technology
  • The privacy implications of blockchain technology
  • Cyber security in vehicular networks
  • Data Privacy in HealthcareÌý
  • Socio-technical aspects of Securing Machine Learning Systems