Blank avatar image

Dr Shabnam Kasra Kermanshahi

Professor

Ph.D., Security Sciences (Applied Cryptography), Information Technology, Monash University

UNSW Canberra
School of Systems & Computing

Dr. Shabnam Kasra is a Senior Lecturer specializing in cybersecurity at the University of New South Wales (UNSW) Canberra. She earned her Ph.D. in Security Sciences, with a focus on Applied Cryptography, from Monash University in Melbourne, Australia. Dr. Kasra has extensive experience in the field of cybersecurity, having served as a Postdoctoral Research Fellow at CSIRO's Data61, a Lecturer at RMIT University's School of Computing Technologies, and a Senior Lecturer at UNSW Canberra. Her research interests lie in the areas of cryptography, cybersecurity, information privacy, Automotive Cyber Security, and Blockchain.

Dr. Kasra is a researcher with a strong record of publications in top-tier international journals, conferences, and workshops such as ESORICS (Core A), TDSC (Core A), Information Sciences (Core A), ACM Computing Surveys (Core A*), and INFOCOM (Core A*), to name just a few. She is a CI in the SELFY consortium, a European project led by Eurecat with a budget of 7 million Euros. She was also a CI and Work Package Lead for Vietnam's Industry 4.0 Opportunities for Australian Business project (VHESIF Pool 1 - Asia Trade and Innovation Hub). Furthermore, Dr. Kasra is Project Leader for a project aimed at identifying cybersecurity best practices for the marine renewable energy sector, at Oceania Cyber Security Centre (OCSC).

Contact me for Ph.D. supervision opportunities accompanied by a highly competitive scholarship.

Location
Building 15, Room 217
  • Book Chapters | 2022
    Buser M; Dowsley R; Esgin MF; Kasra Kermanshahi S; Kuchta V; Liu JK; Phan RCW; Zhang Z, 2022, 'Post-Quantum Verifiable Random Function from Symmetric Primitives in PoS Blockchain', in , pp. 25 - 45, http://dx.doi.org/10.1007/978-3-031-17140-6_2
    Book Chapters | 2021
    Kermanshahi SK; Dowsley R; Steinfeld R; Sakzad A; Liu JK; Nepal S; Yi X, 2021, 'Geo-DRS: Geometric Dynamic Range Search on Spatial Data with Backward and Content Privacy', in , pp. 24 - 43, http://dx.doi.org/10.1007/978-3-030-88428-4_2
    Book Chapters | 2014
    Kasra Kermanshahi S, 2014, 'Secure Identity-Based Cryptographic Schemes', in Security In Computing and Networking, Universiti Teknologi Malaysia (UTM)
  • Journal articles | 2024
    Ibrahim YM; Kermanshahi SK; Kasmarik K; Hu J, 2024, 'A Taxonomy-Based Survey of EM-SCA and Implications for Multi-Robot Systems', IEEE Open Journal of the Computer Society, 5, pp. 511 - 529, http://dx.doi.org/10.1109/OJCS.2024.3461808
    Journal articles | 2024
    Jafarbeiki S; Sakzad A; Steinfeld R; Kasra Kermanshahi S; Thapa C; Kume Y, 2024, 'ACE: A Consent-Embedded privacy-preserving search on genomic database', Heliyon, 10, http://dx.doi.org/10.1016/j.heliyon.2024.e29399
    Journal articles | 2024
    Kermanshahi SK; Steinfeld R; Yi X; Liu JK; Nepal S; Lou J, 2024, 'Fast and private multi-dimensional range search over encrypted data', Information Sciences, 652, http://dx.doi.org/10.1016/j.ins.2023.119773
    Journal articles | 2024
    Khan M; Kermanshahi SK; Hu J, 2024, 'GHOSTForge: A Scalable Consensus Mechanism for DAG-Based Blockchains', IEEE Open Journal of the Computer Society, 5, pp. 736 - 747, http://dx.doi.org/10.1109/OJCS.2024.3497892
    Journal articles | 2024
    Sultan NH; Kermanshahi SK; Tran HY; Lai S; Varadharajan V; Nepal S; Yi X, 2024, 'Securely sharing outsourced IoT data: A secure access and privacy preserving keyword search scheme', Ad Hoc Networks, 158, http://dx.doi.org/10.1016/j.adhoc.2024.103478
    Journal articles | 2024
    Zhu X; Zhou J; Dai Y; Shen P; Kermanshahi SK; Hu J, 2024, 'A Verifiable and Efficient Symmetric Searchable Encryption Scheme for Dynamic Dataset with Forward and Backward Privacy', IEEE Transactions on Dependable and Secure Computing, http://dx.doi.org/10.1109/TDSC.2024.3521423
    Journal articles | 2023
    Buser M; Dowsley R; Esgin M; Gritti C; Kermanshahi SK; Kuchta V; Legrow J; Liu J; Phan R; Sakzad A; Steinfeld R; Yu J; Kasra Kermanshahi S, 2023, 'A Survey on Exotic Signatures for Post-quantum Blockchain: Challenges and Research Directions', ACM Computing Surveys, 55, pp. 1 - 32, http://dx.doi.org/10.1145/3572771
    Journal articles | 2022
    Jafarbeiki S; Sakzad A; Kasra Kermanshahi S; Gaire R; Steinfeld R; Lai S; Abraham G; Thapa C, 2022, 'PrivGenDB: Efficient and privacy-preserving query executions over encrypted SNP-Phenotype database', Informatics in Medicine Unlocked, 31, pp. 100988, http://dx.doi.org/10.1016/j.imu.2022.100988
    Journal articles | 2022
    Kasra Kermanshahi S; Dowsley R; Steinfeld R; Sakzad A; Liu J; Nepal S; Yi X; Lai S, 2022, 'Range search on encrypted spatial data with dynamic updates', Journal of Computer Security, 30, pp. 829 - 849, http://dx.doi.org/10.3233/JCS-210168
    Journal articles | 2022
    Kermanshahi SK; Sun SF; Liu JK; Steinfeld R; Nepal S; Lau WF; Au MHA, 2022, 'Geometric Range Search on Encrypted Data with Forward/Backward Security', IEEE Transactions on Dependable and Secure Computing, 19, pp. 698 - 716, http://dx.doi.org/10.1109/TDSC.2020.2982389
    Journal articles | 2019
    Kasra Kermanshahi S; Liu JK; Steinfeld R; Nepal S; Lai S; Loh R; Zuo C, 2019, 'Multi-client Cloud-based Symmetric Searchable Encryption', IEEE Transactions on Dependable and Secure Computing, pp. 1 - 1, http://dx.doi.org/10.1109/tdsc.2019.2950934
    Journal articles | 2016
    Kasra-Kermanshahi S; Salleh M; Chizari H, 2016, 'Appropriate lightweight cryptosystems for wireless sensor networks', ARPN Journal of Engineering and Applied Sciences, 11, pp. 6296 - 6302
  • Conference Presentations | 2024
    Kasra Kermanshahi S, 2024, 'Automotive Cyber Security and Information Privacy', presented at The 29th Australasian Conference on Information Security and Privacy, Sydney, 15 July 2024 - 17 July 2024
    Conference Presentations | 2024
    Kasra Kermanshahi S, 2024, 'Can Aussie cyber security turbocharge cooperative autonomous adventures in the land down under?', presented at Australian Cyber Conference (CyberCon 2024), Melbourne, 26 November 2024 - 28 November 2024, https://melbourne2024.cyberconference.com.au/speakers/shabnam-kasra-2ryrz
    Conference Papers | 2024
    Tran HY; Hu J; Kasra Kermanshahi S, 2024, 'On Sealed-bid Combinatorial Auction with Privacy-Preserving Dynamic Programming', in 18th International Conference on Provable and Practical Security, ProvSec 2024, Gold Coast, Australia, presented at The 18th International Conference on Provable and Practical Security, Gold Coast, Australia, 25 September 2024 - 27 September 2024, https://link.springer.com/book/9789819609567
    Conference Papers | 2024
    Wang M; Boshuijzen-van Burken C; Sun N; Kasra Kermanshahi S; Zhang Y; Hu J, 2024, 'VirtuGuard: Ethically Aligned Artificial Intelligence Framework for Cyberbullying Mitigation', Singapore, presented at 2024 IEEE Conference on Artificial Intelligence (CAI), Singapore, 23 June 2024, http://dx.doi.org/10.1109/CAI59869.2024.00271
    Conference Proceedings (Editor of) | 2024
    Kasra Kermanshahi S, (ed.), 2024, '21st Annual International Conference on Privacy, Security, and Trust (PST2024)', IEEE, Sydney, presented at 21st Annual International Conference on Privacy, Security, and Trust (PST2024), Sydney, 28 August 2024 - 30 August 2024, http://dx.doi.org/10.1109/PST62714.2024.10788077
    Preprints | 2023
    Sultan NH; Kasra-Kermanshahi S; Tran Y; Lai S; Varadharajan V; Nepal S; Yi X, 2023, A Multi-Client Searchable Encryption Scheme for IoT Environment, http://arxiv.org/abs/2305.09221v1
    Conference Papers | 2022
    Jafarbeiki S; Sakzad A; Kermanshahi SK; Steinfeld R; Gaire R, 2022, 'PRESSGenDB: PRivacy-prEserving Substring Search on Encrypted Genomic DataBase', in INFOCOM WKSHPS 2022 - IEEE Conference on Computer Communications Workshops, http://dx.doi.org/10.1109/INFOCOMWKSHPS54753.2022.9797931
    Reports | 2022
    Kasra Kermanshahi S; Thai V; von Kaenel J; Arrigo R; Baulch B; Pham T; Chhetri P; Nguyen T; Alamgir Hossain M; Shahparvari S, 2022, Vietnam’s Industry 4.0 Opportunities for Australian Business, file:///C:/Users/z3540640/Downloads/atih-industry-4-0-in-vietnam.pdf
    Conference Papers | 2021
    Jafarbeiki S; Gaire R; Sakzad A; Kermanshahi SK; Steinfeld R, 2021, 'Collaborative analysis of genomic data: vision and challenges', in Proceedings - 2021 IEEE 7th International Conference on Collaboration and Internet Computing, CIC 2021, pp. 77 - 86, http://dx.doi.org/10.1109/CIC52973.2021.00020
    Conference Papers | 2021
    Jafarbeiki S; Sakzad A; Kermanshahi SK; Steinfeld R; Gaire R; Lai S, 2021, 'A Non-interactive Multi-user Protocol for Private Authorised Query Processing on Genomic Data', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 70 - 94, http://dx.doi.org/10.1007/978-3-030-91356-4_5
    Conference Papers | 2019
    Kasra Kermanshahi S; Liu JK; Steinfeld R; Nepal S, 2019, 'Generic Multi-keyword Ranked Search on Encrypted Cloud Data', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 322 - 343, http://dx.doi.org/10.1007/978-3-030-29962-0_16
    Conference Papers | 2019
    Yu B; Kermanshahi SK; Sakzad A; Nepal S, 2019, 'Chameleon Hash Time-Lock Contract for Privacy Preserving Payment Channel Networks', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 303 - 318, http://dx.doi.org/10.1007/978-3-030-31919-9_18
    Conference Papers | 2017
    Kermanshahi SK; Liu JK; Steinfeld R, 2017, 'Multi-user cloud-based secure keyword search', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 227 - 247, http://dx.doi.org/10.1007/978-3-319-60055-0_12
    Conference Papers | 2015
    Kasra-Kermanshahi S; Salleh M, 2015, 'A novel authentication scheme for mobile environments in the context of Elliptic Curve Cryptography', in I4CT 2015 - 2015 2nd International Conference on Computer, Communications, and Control Technology, Art Proceeding, pp. 506 - 510, http://dx.doi.org/10.1109/I4CT.2015.7219630
    Conference Papers | 2015
    Kasra-Kermanshahi S; Salleh M, 2015, 'An improved certificateless public key authentication scheme for mobile ad hoc networks over elliptic curves', in Advances in Intelligent Systems and Computing, pp. 327 - 334, http://dx.doi.org/10.1007/978-3-319-17398-6_30
    Conference Papers | 2015
    Kermanshahi SK; Salleh M, 2015, 'An enhanced certificateless cryptosystem for mobile ad hoc networks', in Proceedings - 2014 International Symposium on Biometrics and Security Technologies, ISBAST 2014, pp. 176 - 181, http://dx.doi.org/10.1109/ISBAST.2014.7013117

  • SELFY; "contributing with expertise in Artificial Intelligence techniques to detect cyber-attacks in distributed systems." European project consortium led by Eurecat
  • Vietnam’s Industry 4.0 Opportunities for Australian Business (VHESIF Pool 1 - Asia Trade and Innovation Hub)
  • Identifying cybersecurity best practices for marine renewable energy, The not-for-profit Oceania Cyber Security Centre (OCSC)
  • Secure Content Storage and Delivery via Blockchain Technology

  • Ethically aligned AI cyberbullying detection tools

  • Innovations in online postgraduate teaching to enhance engagement, learning outcomes, and course scores

 

  • Nominee Vice Chancellor’s and RMIT Research Awards
  • Postgraduate Publication Award
  • People’s Choice Award, Faculty of IT 3 Minute Thesis Competition- Monash University
  • Winner’s Award, Faculty of IT 3 Minute Thesis Competition- Monash University
  • Best Student Paper Award (ACISP 2017)
  • CSIRO Data61 research scholarship
  • Monash Graduate Scholarship (MGS)
  • Best Student Award with golden medal (Master degree)

My Research Supervision

** Scholarships of $35,000 (AUD) are available for PhD students who achieved High Distinction (H1) in their undergraduate program and/or have completed a Masters by Research.

Research Student (PhD & Master by Research) Scholarships:

Several types of scholarships are available; however, admission and scholarship applications are highly competitive. A self-assessment tool is available to get a general feel for your competitiveness. You need to meet the English language requirements.

If you are eligible and interested in working on the following (or closely related) topics or keywords, please send me your CVacademic transcripts, the result of the self-assessment, and a research proposal: highlight research MotivationResearch problemsResearch Objectives and Questions, a brief Review of the most relevant Literature, your proposed Methodology (discussing your proposed approach to answer the RQs including the type of data you need and how you will get them, techniques, etc.) and Expected Outcome.

For more information, please refer to the following links on how and when to apply for a research degree.

  • Applied Cryptography
  • Searchable Encryption
  • Secure Content Storage and Delivery via Blockchain Technology
  • The privacy implications of blockchain technology
  • Cyber security in vehicular networks
  • Data Privacy in Healthcare 
  • Socio-technical aspects of Securing Machine Learning Systems