History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 | next | last

Result 1 to 20 of 48 total

Composable and modular anonymous credentials: definitions and practical constructions. (English)
Iwata, Tetsu (ed.) et al., Advances in cryptology ‒ ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 ‒ December 3, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-48799-0/pbk; 978-3-662-48800-3/ebook). Lecture Notes in Computer Science 9453, 262-288 (2015).
WorldCat.org
2
(de-)constructing TLS 1.3. (English)
Biryukov, Alex (ed.) et al., Progress in cryptology ‒ INDOCRYPT 2015. 16th international conference on cryptology in India, Bangalore, India, December 6‒9, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-26616-9/pbk; 978-3-319-26617-6/ebook). Lecture Notes in Computer Science 9462, 85-102 (2015).
WorldCat.org
3
One-out-of-many proofs: or how to leak a secret and spend a coin. (English)
Oswald, Elisabeth (ed.) et al., Advances in cryptology ‒ EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26‒30, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-46802-9/pbk; 978-3-662-46803-6/ebook). Lecture Notes in Computer Science 9057, 253-280 (2015).
WorldCat.org
4
Fully structure-preserving signatures and shrinking commitments. (English)
Oswald, Elisabeth (ed.) et al., Advances in cryptology ‒ EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26‒30, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-46802-9/pbk; 978-3-662-46803-6/ebook). Lecture Notes in Computer Science 9057, 35-65 (2015).
WorldCat.org
5
Anonymous transferable e-cash. (English)
Katz, Jonathan (ed.), Public-key cryptography ‒ PKC 2015. 18th IACR international conference on practice and theory in public-key cryptography, Gaithersburg, MD, USA, March 30 ‒ April 1, 2015. Proceedings. Berlin: Springer (ISBN 978-3-662-46446-5/pbk; 978-3-662-46447-2/ebook). Lecture Notes in Computer Science 9020, 101-124 (2015).
WorldCat.org
6
Observing and Preventing Leakage in MapReduce. (English)
ACM Conference on Computer and Communications Security, 1570-1581(2015)
WorldCat.org
7
Accountable Metadata-Hiding Escrow: A Group Signature Case Study. (English)
PoPETs 2015, N0. 2, 206-221(2015)
WorldCat.org
8
A Messy State of the Union: Taming the Composite State Machines of TLS. (English)
IEEE Symposium on Security and Privacy, 535-552(2015)
WorldCat.org
9
Geppetto: Versatile Verifiable Computation. (English)
IEEE Symposium on Security and Privacy, 253-270(2015)
WorldCat.org
10
Square span programs with applications to succinct NIZK arguments. (English)
Sarkar, Palash (ed.) et al., Advances in cryptology ‒ ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7‒11, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-45610-1/pbk). Lecture Notes in Computer Science 8873, 532-550 (2014).
WorldCat.org
11
Proving the TLS handshake secure (as it is). (English)
Garay, Juan A. (ed.) et al., Advances in cryptology ‒ CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17‒21, 2014. Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-44380-4/pbk). Lecture Notes in Computer Science 8617, 235-255 (2014).
WorldCat.org
12
Malleable Signatures: New Definitions and Delegatable Anonymous Credentials. (English)
CSF, 199-213(2014)
WorldCat.org
13
Selective disclosure in Datalog-based trust management. (English)
Accorsi, Rafael (ed.) et al., Security and trust management. 9th international workshop, STM 2013, Egham, UK, September 12‒13, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-41097-0/pbk). Lecture Notes in Computer Science 8203, 160-175 (2013).
WorldCat.org
14
Anonymity-preserving public-key encryption: A constructive approach. (English)
De Cristofaro, Emiliano (ed.) et al., Privacy enhancing technologies. 13th international symposium, PETS 2013, Bloomington, IN, USA, July 10‒12, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-39076-0/pbk). Lecture Notes in Computer Science 7981, 19-39 (2013).
WorldCat.org
15
Verifiable elections that scale for free. (English)
Kurosawa, Kaoru (ed.) et al., Public-key cryptography ‒ PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26‒March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36361-0/pbk). Lecture Notes in Computer Science 7778, 479-496 (2013).
WorldCat.org
16
Tagged one-time signatures: tight security and optimal tag size. (English)
Kurosawa, Kaoru (ed.) et al., Public-key cryptography ‒ PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26‒March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36361-0/pbk). Lecture Notes in Computer Science 7778, 312-331 (2013).
WorldCat.org
17
Succinct malleable NIZKs and an application to compact shuffles. (English)
Sahai, Amit (ed.), Theory of cryptography. 10th theory of cryptography conference, TCC 2013, Tokyo, Japan, March 3‒6, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36593-5/pbk). Lecture Notes in Computer Science 7785, 100-119 (2013).
WorldCat.org
18
Smart meter aggregation via secret-sharing. (English)
SEGS@CCS, 75-80(2013)
WorldCat.org
19
Implementing TLS with Verified Cryptographic Security. (English)
IEEE Symposium on Security and Privacy, 445-459(2013)
WorldCat.org
20
first | previous | 1 21 41 | next | last

Result 1 to 20 of 48 total

Valid XHTML 1.0 Transitional Valid CSS!