History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 | next | last

Result 1 to 20 of 33 total

Verifiable elections that scale for free. (English)
Kurosawa, Kaoru (ed.) et al., Public-key cryptography ‒ PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26‒March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36361-0/pbk). Lecture Notes in Computer Science 7778, 479-496 (2013).
WorldCat.org
1
Tagged one-time signatures: tight security and optimal tag size. (English)
Kurosawa, Kaoru (ed.) et al., Public-key cryptography ‒ PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26‒March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36361-0/pbk). Lecture Notes in Computer Science 7778, 312-331 (2013).
WorldCat.org
2
Succinct malleable nizks and an application to compact shuffles. (English)
Sahai, Amit (ed.), Theory of cryptography. 10th theory of cryptography conference, TCC 2013, Tokyo, Japan, March 3‒6, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36593-5/pbk). Lecture Notes in Computer Science 7785, 100-119 (2013).
WorldCat.org
3
Anonymity-Preserving Public-Key Encryption: A Constructive Approach. (English)
Privacy Enhancing Technologies, 19-39(2013)
WorldCat.org
4
Selective Disclosure in Datalog-Based Trust Management. (English)
STM, 160-175(2013)
WorldCat.org
5
Optimally private access control. (English)
WPES, 37-48(2013)
WorldCat.org
6
Implementing TLS with Verified Cryptographic Security. (English)
IEEE Symposium on Security and Privacy, 445-459(2013)
WorldCat.org
7
Private client-side profiling with random forests and hidden Markov models. (English)
Fischer-Hübner, Simone (ed.) et al., Privacy enhancing technologies. 12th international symposium, PETS 2012, Vigo, Spain, July 11‒13, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31679-1/pbk). Lecture Notes in Computer Science 7384, 18-37 (2012).
WorldCat.org
8
Constant-size structure-preserving signatures: generic constructions and simple assumptions. (English)
Wang, Xiaoyun (ed.) et al., Advances in cryptology ‒ ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2‒6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34960-7/pbk). Lecture Notes in Computer Science 7658, 4-24 (2012).
WorldCat.org
9
A new hash-and-sign approach and structure-preserving signatures from DLIN. (English)
Visconti, Ivan (ed.) et al., Security and cryptography for networks. 8th international conference, SCN 2012, Amalfi, Italy, September 5‒7, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32927-2/pbk). Lecture Notes in Computer Science 7485, 131-148 (2012).
WorldCat.org
10
Malleable proof systems and applications. (English)
Pointcheval, David (ed.) et al., Advances in cryptology ‒ EUROCRYPT 2012. 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15‒19, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29010-7/pbk). Lecture Notes in Computer Science 7237, 281-300 (2012).
WorldCat.org
11
On the Non-malleability of the Fiat-Shamir Transform. (English)
INDOCRYPT, 60-79(2012)
WorldCat.org
12
Further privacy mechanisms. (English)
Camenisch, Jan (ed.) et al., Digital privacy. PRIME ‒ privacy and identity management for Europe. Berlin: Springer (ISBN 978-3-642-19049-0/pbk). Lecture Notes in Computer Science 6545, 485-555 (2011).
WorldCat.org
13
Pseudonyms and private credentials. (English)
Camenisch, Jan (ed.) et al., Digital privacy. PRIME ‒ privacy and identity management for Europe. Berlin: Springer (ISBN 978-3-642-19049-0/pbk). Lecture Notes in Computer Science 6545, 289-308 (2011).
WorldCat.org
14
Structure preserving CCA secure encryption and applications. (English)
Lee, Dong Hoon (ed.) et al., Advances in cryptology ‒ ASIACRYPT 2011. 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4‒8, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25384-3/pbk). Lecture Notes in Computer Science 7073, 89-106 (2011).
WorldCat.org
15
Analysis of revocation strategies for anonymous Idemix credentials. (English)
De Decker, Bart (ed.) et al., Communications and multimedia security. 12th IFIP TC 6/TC 11 international conference, CMS 2011, Ghent, Belgium, October 19‒21, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-24711-8/pbk). Lecture Notes in Computer Science 7025, 3-17 (2011).
WorldCat.org
16
Differentially private billing with rebates. (English)
Filler, Tomáš (ed.) et al., Information hiding. 13th international conference, IH 2011, Prague, Czech Republic, May 18‒20, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-24177-2/pbk). Lecture Notes in Computer Science 6958, 148-162 (2011).
WorldCat.org
17
Scramble! Your social network data. (English)
Fischer-Hübner, Simone (ed.) et al., Privacy enhancing technologies. 11th international symposium, PETS 2011, Waterloo, ON, Canada, July 27‒29, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22262-7/pbk). Lecture Notes in Computer Science 6794, 211-225 (2011).
WorldCat.org
18
Privacy-friendly aggregation for the smart-grid. (English)
Fischer-Hübner, Simone (ed.) et al., Privacy enhancing technologies. 11th international symposium, PETS 2011, Waterloo, ON, Canada, July 27‒29, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22262-7/pbk). Lecture Notes in Computer Science 6794, 175-191 (2011).
WorldCat.org
19
Cryptographic Mechanisms for Privacy. (English)
Privacy and Identity Management for Life, 117-134(2011)
WorldCat.org
20
first | previous | 1 21 | next | last

Result 1 to 20 of 33 total

Valid XHTML 1.0 Transitional Valid CSS!