History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 | next | last

Result 1 to 20 of 35 total

Verifiable elections that scale for free. (English)
Kurosawa, Kaoru (ed.) et al., Public-key cryptography ‒ PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26‒March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36361-0/pbk). Lecture Notes in Computer Science 7778, 479-496 (2013).
WorldCat.org
1
Tagged one-time signatures: tight security and optimal tag size. (English)
Kurosawa, Kaoru (ed.) et al., Public-key cryptography ‒ PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26‒March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36361-0/pbk). Lecture Notes in Computer Science 7778, 312-331 (2013).
WorldCat.org
2
Succinct malleable nizks and an application to compact shuffles. (English)
Sahai, Amit (ed.), Theory of cryptography. 10th theory of cryptography conference, TCC 2013, Tokyo, Japan, March 3‒6, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36593-5/pbk). Lecture Notes in Computer Science 7785, 100-119 (2013).
WorldCat.org
3
Implementing TLS with Verified Cryptographic Security. (English)
IEEE Symposium on Security and Privacy, 445-459(2013)
WorldCat.org
4
Selective Disclosure in Datalog-Based Trust Management. (English)
STM, 160-175(2013)
WorldCat.org
5
Anonymity-Preserving Public-Key Encryption: A Constructive Approach. (English)
Privacy Enhancing Technologies, 19-39(2013)
WorldCat.org
6
Pinocchio coin: building zerocoin from a succinct pairing-based proof system. (English)
PETShop@CCS, 27-30(2013)
WorldCat.org
7
Smart meter aggregation via secret-sharing. (English)
SEGS@CCS, 75-80(2013)
WorldCat.org
8
Succinct malleable nizks and an application to compact shuffles. (English)
Huang, Tingwen (ed.) et al., Neural information processing. 19th international conference, ICONIP 2012, Doha, Qatar, November 12‒15, 2012. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-34474-9/pbk). Lecture Notes in Computer Science 7663, 100-119 (2012).
WorldCat.org
9
Private client-side profiling with random forests and hidden Markov models. (English)
Fischer-Hübner, Simone (ed.) et al., Privacy enhancing technologies. 12th international symposium, PETS 2012, Vigo, Spain, July 11‒13, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31679-1/pbk). Lecture Notes in Computer Science 7384, 18-37 (2012).
WorldCat.org
10
Constant-size structure-preserving signatures: generic constructions and simple assumptions. (English)
Wang, Xiaoyun (ed.) et al., Advances in cryptology ‒ ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2‒6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34960-7/pbk). Lecture Notes in Computer Science 7658, 4-24 (2012).
WorldCat.org
11
A new hash-and-sign approach and structure-preserving signatures from DLIN. (English)
Visconti, Ivan (ed.) et al., Security and cryptography for networks. 8th international conference, SCN 2012, Amalfi, Italy, September 5‒7, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32927-2/pbk). Lecture Notes in Computer Science 7485, 131-148 (2012).
WorldCat.org
12
Malleable proof systems and applications. (English)
Pointcheval, David (ed.) et al., Advances in cryptology ‒ EUROCRYPT 2012. 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15‒19, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29010-7/pbk). Lecture Notes in Computer Science 7237, 281-300 (2012).
WorldCat.org
13
On the Non-malleability of the Fiat-Shamir Transform. (English)
INDOCRYPT, 60-79(2012)
WorldCat.org
14
Further privacy mechanisms. (English)
Camenisch, Jan (ed.) et al., Digital privacy. PRIME ‒ privacy and identity management for Europe. Berlin: Springer (ISBN 978-3-642-19049-0/pbk). Lecture Notes in Computer Science 6545, 485-555 (2011).
WorldCat.org
15
Pseudonyms and private credentials. (English)
Camenisch, Jan (ed.) et al., Digital privacy. PRIME ‒ privacy and identity management for Europe. Berlin: Springer (ISBN 978-3-642-19049-0/pbk). Lecture Notes in Computer Science 6545, 289-308 (2011).
WorldCat.org
16
Structure preserving CCA secure encryption and applications. (English)
Lee, Dong Hoon (ed.) et al., Advances in cryptology ‒ ASIACRYPT 2011. 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4‒8, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25384-3/pbk). Lecture Notes in Computer Science 7073, 89-106 (2011).
WorldCat.org
17
Analysis of revocation strategies for anonymous Idemix credentials. (English)
De Decker, Bart (ed.) et al., Communications and multimedia security. 12th IFIP TC 6/TC 11 international conference, CMS 2011, Ghent, Belgium, October 19‒21, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-24711-8/pbk). Lecture Notes in Computer Science 7025, 3-17 (2011).
WorldCat.org
18
Differentially private billing with rebates. (English)
Filler, Tomáš (ed.) et al., Information hiding. 13th international conference, IH 2011, Prague, Czech Republic, May 18‒20, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-24177-2/pbk). Lecture Notes in Computer Science 6958, 148-162 (2011).
WorldCat.org
19
Scramble! Your social network data. (English)
Fischer-Hübner, Simone (ed.) et al., Privacy enhancing technologies. 11th international symposium, PETS 2011, Waterloo, ON, Canada, July 27‒29, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22262-7/pbk). Lecture Notes in Computer Science 6794, 211-225 (2011).
WorldCat.org
20
first | previous | 1 21 | next | last

Result 1 to 20 of 35 total

Valid XHTML 1.0 Transitional Valid CSS!