Blank avatar image

Dr Shabnam Kasra Kermanshahi

Professor

Ph.D., Security Sciences (Applied Cryptography), Information Technology, Monash University

UNSW Canberra
School of Systems & Computing

Dr. Shabnam Kasra is a Senior Lecturer specializing in cybersecurity at the University of New South Wales (UNSW) Canberra. She earned her Ph.D. in Security Sciences, with a focus on Applied Cryptography, from Monash University in Melbourne, Australia. Dr. Kasra has extensive experience in the field of cybersecurity, having served as a Postdoctoral Research Fellow at CSIRO's Data61, a Lecturer at RMIT University's School of Computing Technologies, and a Senior Lecturer at UNSW Canberra. Her research interests lie in the areas of cryptography, cybersecurity, information privacy, Automotive Cyber Security, and Blockchain.

Dr. Kasra is a researcher with a strong record of publications in top-tier international journals, conferences, and workshops such as ESORICS (Core A), TDSC (Core A), Information Sciences (Core A), ACM Computing Surveys (Core A*), and INFOCOM (Core A*), to name just a few. She is a CI in the SELFY consortium, a European project led by Eurecat with a budget of 7 million Euros. She was also a CI and Work Package Lead for Vietnam's Industry 4.0 Opportunities for Australian Business project (VHESIF Pool 1 - Asia Trade and Innovation Hub). Furthermore, Dr. Kasra is Project Leader for a project aimed at identifying cybersecurity best practices for the marine renewable energy sector, at Oceania Cyber Security Centre (OCSC).

Contact me for Ph.D. supervision opportunities accompanied by a highly competitive scholarship.

Location
Building 15, Room 217
  • Book Chapters | 2022
    Buser M; Dowsley R; Esgin MF; Kasra Kermanshahi S; Kuchta V; Liu JK; Phan RCW; Zhang Z, 2022, 'Post-Quantum Verifiable Random Function from Symmetric Primitives in PoS Blockchain', in , pp. 25 - 45, http://dx.doi.org/10.1007/978-3-031-17140-6_2
    Book Chapters | 2021
    Kermanshahi SK; Dowsley R; Steinfeld R; Sakzad A; Liu JK; Nepal S; Yi X, 2021, 'Geo-DRS: Geometric Dynamic Range Search on Spatial Data with Backward and Content Privacy', in , pp. 24 - 43, http://dx.doi.org/10.1007/978-3-030-88428-4_2
    Book Chapters | 2014
    Kasra Kermanshahi S, 2014, 'Secure Identity-Based Cryptographic Schemes', in Security In Computing and Networking, Universiti Teknologi Malaysia (UTM)
  • Journal articles | 2024
    Jafarbeiki S; Sakzad A; Steinfeld R; Kasra Kermanshahi S; Thapa C; Kume Y, 2024, 'ACE: A Consent-Embedded privacy-preserving search on genomic database', Heliyon, 10, http://dx.doi.org/10.1016/j.heliyon.2024.e29399
    Journal articles | 2024
    Kermanshahi SK; Steinfeld R; Yi X; Liu JK; Nepal S; Lou J, 2024, 'Fast and private multi-dimensional range search over encrypted data', Information Sciences, 652, http://dx.doi.org/10.1016/j.ins.2023.119773
    Journal articles | 2024
    Sultan NH; Kermanshahi SK; Tran HY; Lai S; Varadharajan V; Nepal S; Yi X, 2024, 'Securely sharing outsourced IoT data: A secure access and privacy preserving keyword search scheme', Ad Hoc Networks, 158, http://dx.doi.org/10.1016/j.adhoc.2024.103478
    Journal articles | 2023
    Buser M; Dowsley R; Esgin M; Gritti C; Kermanshahi SK; Kuchta V; Legrow J; Liu J; Phan R; Sakzad A; Steinfeld R; Yu J; Kasra Kermanshahi S, 2023, 'A Survey on Exotic Signatures for Post-quantum Blockchain: Challenges and Research Directions', ACM Computing Surveys, 55, pp. 1 - 32, http://dx.doi.org/10.1145/3572771
    Journal articles | 2022
    Jafarbeiki S; Sakzad A; Kasra Kermanshahi S; Gaire R; Steinfeld R; Lai S; Abraham G; Thapa C, 2022, 'PrivGenDB: Efficient and privacy-preserving query executions over encrypted SNP-Phenotype database', Informatics in Medicine Unlocked, 31, pp. 100988, http://dx.doi.org/10.1016/j.imu.2022.100988
    Journal articles | 2022
    Kasra Kermanshahi S; Dowsley R; Steinfeld R; Sakzad A; Liu J; Nepal S; Yi X; Lai S, 2022, 'Range search on encrypted spatial data with dynamic updates', Journal of Computer Security, 30, pp. 829 - 849, http://dx.doi.org/10.3233/JCS-210168
    Journal articles | 2022
    Kermanshahi SK; Sun SF; Liu JK; Steinfeld R; Nepal S; Lau WF; Au MHA, 2022, 'Geometric Range Search on Encrypted Data with Forward/Backward Security', IEEE Transactions on Dependable and Secure Computing, 19, pp. 698 - 716, http://dx.doi.org/10.1109/TDSC.2020.2982389
    Journal articles | 2019
    Kasra Kermanshahi S; Liu JK; Steinfeld R; Nepal S; Lai S; Loh R; Zuo C, 2019, 'Multi-client Cloud-based Symmetric Searchable Encryption', IEEE Transactions on Dependable and Secure Computing, pp. 1 - 1, http://dx.doi.org/10.1109/tdsc.2019.2950934
    Journal articles | 2016
    Kasra-Kermanshahi S; Salleh M; Chizari H, 2016, 'Appropriate lightweight cryptosystems for wireless sensor networks', ARPN Journal of Engineering and Applied Sciences, 11, pp. 6296 - 6302
  • Conference Papers | 2024
    Wang M; Boshuijzen-van Burken C; Sun N; Kasra Kermanshahi S; Zhang Y; Hu J, 2024, 'VirtuGuard: Ethically Aligned Artificial Intelligence Framework for Cyberbullying Mitigation', Singapore, presented at 2024 IEEE Conference on Artificial Intelligence (CAI), Singapore, 23 June 2024, http://dx.doi.org/10.1109/CAI59869.2024.00271
    Preprints | 2023
    Sultan NH; Kasra-Kermanshahi S; Tran Y; Lai S; Varadharajan V; Nepal S; Yi X, 2023, A Multi-Client Searchable Encryption Scheme for IoT Environment, http://arxiv.org/abs/2305.09221v1
    Conference Papers | 2022
    Jafarbeiki S; Sakzad A; Kermanshahi SK; Steinfeld R; Gaire R, 2022, 'PRESSGenDB: PRivacy-prEserving Substring Search on Encrypted Genomic DataBase', in INFOCOM WKSHPS 2022 - IEEE Conference on Computer Communications Workshops, http://dx.doi.org/10.1109/INFOCOMWKSHPS54753.2022.9797931
    Reports | 2022
    Kasra Kermanshahi S; Thai V; von Kaenel J; Arrigo R; Baulch B; Pham T; Chhetri P; Nguyen T; Alamgir Hossain M; Shahparvari S, 2022, Vietnam’s Industry 4.0 Opportunities for Australian Business, file:///C:/Users/z3540640/Downloads/atih-industry-4-0-in-vietnam.pdf
    Conference Papers | 2021
    Jafarbeiki S; Gaire R; Sakzad A; Kermanshahi SK; Steinfeld R, 2021, 'Collaborative analysis of genomic data: vision and challenges', in Proceedings - 2021 IEEE 7th International Conference on Collaboration and Internet Computing, CIC 2021, pp. 77 - 86, http://dx.doi.org/10.1109/CIC52973.2021.00020
    Conference Papers | 2021
    Jafarbeiki S; Sakzad A; Kermanshahi SK; Steinfeld R; Gaire R; Lai S, 2021, 'A Non-interactive Multi-user Protocol for Private Authorised Query Processing on Genomic Data', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 70 - 94, http://dx.doi.org/10.1007/978-3-030-91356-4_5
    Conference Papers | 2019
    Kasra Kermanshahi S; Liu JK; Steinfeld R; Nepal S, 2019, 'Generic Multi-keyword Ranked Search on Encrypted Cloud Data', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 322 - 343, http://dx.doi.org/10.1007/978-3-030-29962-0_16
    Conference Papers | 2019
    Yu B; Kermanshahi SK; Sakzad A; Nepal S, 2019, 'Chameleon Hash Time-Lock Contract for Privacy Preserving Payment Channel Networks', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 303 - 318, http://dx.doi.org/10.1007/978-3-030-31919-9_18
    Conference Papers | 2017
    Kermanshahi SK; Liu JK; Steinfeld R, 2017, 'Multi-user cloud-based secure keyword search', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 227 - 247, http://dx.doi.org/10.1007/978-3-319-60055-0_12
    Conference Papers | 2015
    Kasra-Kermanshahi S; Salleh M, 2015, 'A novel authentication scheme for mobile environments in the context of Elliptic Curve Cryptography', in I4CT 2015 - 2015 2nd International Conference on Computer, Communications, and Control Technology, Art Proceeding, pp. 506 - 510, http://dx.doi.org/10.1109/I4CT.2015.7219630
    Conference Papers | 2015
    Kasra-Kermanshahi S; Salleh M, 2015, 'An improved certificateless public key authentication scheme for mobile ad hoc networks over elliptic curves', in Advances in Intelligent Systems and Computing, pp. 327 - 334, http://dx.doi.org/10.1007/978-3-319-17398-6_30
    Conference Papers | 2015
    Kermanshahi SK; Salleh M, 2015, 'An enhanced certificateless cryptosystem for mobile ad hoc networks', in Proceedings - 2014 International Symposium on Biometrics and Security Technologies, ISBAST 2014, pp. 176 - 181, http://dx.doi.org/10.1109/ISBAST.2014.7013117

  • SELFY; "contributing with expertise in Artificial Intelligence techniques to detect cyber-attacks in distributed systems." European project consortium led by Eurecat
  • Vietnam’s Industry 4.0 Opportunities for Australian Business (VHESIF Pool 1 - Asia Trade and Innovation Hub)
  • Identifying cybersecurity best practices for marine renewable energy, The not-for-profit Oceania Cyber Security Centre (OCSC)
  • Secure Content Storage and Delivery via Blockchain Technology

  • Ethically aligned AI cyberbullying detection tools

  • Innovations in online postgraduate teaching to enhance engagement, learning outcomes, and course scores

 

  • Nominee Vice Chancellor’s and RMIT Research Awards
  • Postgraduate Publication Award
  • People’s Choice Award, Faculty of IT 3 Minute Thesis Competition- Monash University
  • Winner’s Award, Faculty of IT 3 Minute Thesis Competition- Monash University
  • Best Student Paper Award (ACISP 2017)
  • CSIRO Data61 research scholarship
  • Monash Graduate Scholarship (MGS)
  • Best Student Award with golden medal (Master degree)

My Research Supervision

** Scholarships of $35,000 (AUD) are available for PhD students who achieved High Distinction (H1) in their undergraduate program and/or have completed a Masters by Research.

Research Student (PhD & Master by Research) Scholarships:

Several types of scholarships are available; however, admission and scholarship applications are highly competitive. A self-assessment tool is available to get a general feel for your competitiveness. You need to meet the English language requirements.

If you are eligible and interested in working on the following (or closely related) topics or keywords, please send me your CVacademic transcripts, the result of the self-assessment, and a research proposal: highlight research MotivationResearch problemsResearch Objectives and Questions, a brief Review of the most relevant Literature, your proposed Methodology (discussing your proposed approach to answer the RQs including the type of data you need and how you will get them, techniques, etc.) and Expected Outcome.

For more information, please refer to the following links on how and when to apply for a research degree.

  • Applied Cryptography
  • Searchable Encryption
  • Secure Content Storage and Delivery via Blockchain Technology
  • The privacy implications of blockchain technology
  • Cyber security in vehicular networks
  • Data Privacy in Healthcare 
  • Socio-technical aspects of Securing Machine Learning Systems