History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 | next | last

Result 1 to 20 of 38 total

Square span programs with applications to succinct NIZK arguments. (English)
Sarkar, Palash (ed.) et al., Advances in cryptology ‒ ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7‒11, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-45610-1/pbk). Lecture Notes in Computer Science 8873, 532-550 (2014).
WorldCat.org
1
Proving the TLS handshake secure (as it is). (English)
Garay, Juan A. (ed.) et al., Advances in cryptology ‒ CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17‒21, 2014. Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-44380-4/pbk). Lecture Notes in Computer Science 8617, 235-255 (2014).
WorldCat.org
2
Malleable Signatures: New Definitions and Delegatable Anonymous Credentials. (English)
CSF, 199-213(2014)
WorldCat.org
3
Selective disclosure in Datalog-based trust management. (English)
Accorsi, Rafael (ed.) et al., Security and trust management. 9th international workshop, STM 2013, Egham, UK, September 12‒13, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-41097-0/pbk). Lecture Notes in Computer Science 8203, 160-175 (2013).
WorldCat.org
4
Anonymity-preserving public-key encryption: A constructive approach. (English)
De Cristofaro, Emiliano (ed.) et al., Privacy enhancing technologies. 13th international symposium, PETS 2013, Bloomington, IN, USA, July 10‒12, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-39076-0/pbk). Lecture Notes in Computer Science 7981, 19-39 (2013).
WorldCat.org
5
Verifiable elections that scale for free. (English)
Kurosawa, Kaoru (ed.) et al., Public-key cryptography ‒ PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26‒March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36361-0/pbk). Lecture Notes in Computer Science 7778, 479-496 (2013).
WorldCat.org
6
Tagged one-time signatures: tight security and optimal tag size. (English)
Kurosawa, Kaoru (ed.) et al., Public-key cryptography ‒ PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26‒March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36361-0/pbk). Lecture Notes in Computer Science 7778, 312-331 (2013).
WorldCat.org
7
Succinct malleable NIZKs and an application to compact shuffles. (English)
Sahai, Amit (ed.), Theory of cryptography. 10th theory of cryptography conference, TCC 2013, Tokyo, Japan, March 3‒6, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36593-5/pbk). Lecture Notes in Computer Science 7785, 100-119 (2013).
WorldCat.org
8
Smart meter aggregation via secret-sharing. (English)
SEGS@CCS, 75-80(2013)
WorldCat.org
9
Pinocchio coin: building zerocoin from a succinct pairing-based proof system. (English)
PETShop@CCS, 27-30(2013)
WorldCat.org
10
Implementing TLS with Verified Cryptographic Security. (English)
IEEE Symposium on Security and Privacy, 445-459(2013)
WorldCat.org
11
On the non-malleability of the fiat-shamir transform. (English)
Galbraith, Steven (ed.) et al., Progress in cryptology ‒ INDOCRYPT 2012. 13th international conference on cryptology in India, Kolkata, India, December 9‒12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34930-0/pbk). Lecture Notes in Computer Science 7668, 60-79 (2012).
WorldCat.org
12
Succinct malleable nizks and an application to compact shuffles. (English)
Huang, Tingwen (ed.) et al., Neural information processing. 19th international conference, ICONIP 2012, Doha, Qatar, November 12‒15, 2012. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-34474-9/pbk). Lecture Notes in Computer Science 7663, 100-119 (2012).
WorldCat.org
13
Private client-side profiling with random forests and hidden Markov models. (English)
Fischer-Hübner, Simone (ed.) et al., Privacy enhancing technologies. 12th international symposium, PETS 2012, Vigo, Spain, July 11‒13, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31679-1/pbk). Lecture Notes in Computer Science 7384, 18-37 (2012).
WorldCat.org
14
Constant-size structure-preserving signatures: generic constructions and simple assumptions. (English)
Wang, Xiaoyun (ed.) et al., Advances in cryptology ‒ ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2‒6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34960-7/pbk). Lecture Notes in Computer Science 7658, 4-24 (2012).
WorldCat.org
15
A new hash-and-sign approach and structure-preserving signatures from DLIN. (English)
Visconti, Ivan (ed.) et al., Security and cryptography for networks. 8th international conference, SCN 2012, Amalfi, Italy, September 5‒7, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32927-2/pbk). Lecture Notes in Computer Science 7485, 131-148 (2012).
WorldCat.org
16
Malleable proof systems and applications. (English)
Pointcheval, David (ed.) et al., Advances in cryptology ‒ EUROCRYPT 2012. 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15‒19, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29010-7/pbk). Lecture Notes in Computer Science 7237, 281-300 (2012).
WorldCat.org
17
Further privacy mechanisms. (English)
Camenisch, Jan (ed.) et al., Digital privacy. PRIME ‒ privacy and identity management for Europe. Berlin: Springer (ISBN 978-3-642-19049-0/pbk). Lecture Notes in Computer Science 6545, 485-555 (2011).
WorldCat.org
18
Pseudonyms and private credentials. (English)
Camenisch, Jan (ed.) et al., Digital privacy. PRIME ‒ privacy and identity management for Europe. Berlin: Springer (ISBN 978-3-642-19049-0/pbk). Lecture Notes in Computer Science 6545, 289-308 (2011).
WorldCat.org
19
Structure preserving CCA secure encryption and applications. (English)
Lee, Dong Hoon (ed.) et al., Advances in cryptology ‒ ASIACRYPT 2011. 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4‒8, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25384-3/pbk). Lecture Notes in Computer Science 7073, 89-106 (2011).
WorldCat.org
20
first | previous | 1 21 | next | last

Result 1 to 20 of 38 total

Valid XHTML 1.0 Transitional Valid CSS!