History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 | next | last

Result 1 to 20 of 51 total

Constant-size structure-preserving signatures: generic constructions and simple assumptions. (English)
J. Cryptology 29, No. 4, 833-878 (2016).
WorldCat.org
1
Cinderella: Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with the Magic of Verifiable Computation. (English)
IEEE Symposium on Security and Privacy, 235-254(2016)
WorldCat.org
2
Downgrade Resilience in Key-Exchange Protocols. (English)
IEEE Symposium on Security and Privacy, 506-525(2016)
WorldCat.org
3
Composable and modular anonymous credentials: definitions and practical constructions. (English)
Iwata, Tetsu (ed.) et al., Advances in cryptology ‒ ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 ‒ December 3, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-48799-0/pbk; 978-3-662-48800-3/ebook). Lecture Notes in Computer Science 9453, 262-288 (2015).
WorldCat.org
5
(de-)constructing TLS 1.3. (English)
Biryukov, Alex (ed.) et al., Progress in cryptology ‒ INDOCRYPT 2015. 16th international conference on cryptology in India, Bangalore, India, December 6‒9, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-26616-9/pbk; 978-3-319-26617-6/ebook). Lecture Notes in Computer Science 9462, 85-102 (2015).
WorldCat.org
6
One-out-of-many proofs: or how to leak a secret and spend a coin. (English)
Oswald, Elisabeth (ed.) et al., Advances in cryptology ‒ EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26‒30, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-46802-9/pbk; 978-3-662-46803-6/ebook). Lecture Notes in Computer Science 9057, 253-280 (2015).
WorldCat.org
7
Fully structure-preserving signatures and shrinking commitments. (English)
Oswald, Elisabeth (ed.) et al., Advances in cryptology ‒ EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26‒30, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-46802-9/pbk; 978-3-662-46803-6/ebook). Lecture Notes in Computer Science 9057, 35-65 (2015).
WorldCat.org
8
Anonymous transferable e-cash. (English)
Katz, Jonathan (ed.), Public-key cryptography ‒ PKC 2015. 18th IACR international conference on practice and theory in public-key cryptography, Gaithersburg, MD, USA, March 30 ‒ April 1, 2015. Proceedings. Berlin: Springer (ISBN 978-3-662-46446-5/pbk; 978-3-662-46447-2/ebook). Lecture Notes in Computer Science 9020, 101-124 (2015).
WorldCat.org
9
Observing and Preventing Leakage in MapReduce. (English)
ACM Conference on Computer and Communications Security, 1570-1581(2015)
WorldCat.org
10
Geppetto: Versatile Verifiable Computation. (English)
IEEE Symposium on Security and Privacy, 253-270(2015)
WorldCat.org
11
A Messy State of the Union: Taming the Composite State Machines of TLS. (English)
IEEE Symposium on Security and Privacy, 535-552(2015)
WorldCat.org
12
Accountable Metadata-Hiding Escrow: A Group Signature Case Study. (English)
PoPETs 2015, N0. 2, 206-221(2015)
WorldCat.org
13
Square span programs with applications to succinct NIZK arguments. (English)
Sarkar, Palash (ed.) et al., Advances in cryptology ‒ ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7‒11, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-45610-1/pbk). Lecture Notes in Computer Science 8873, 532-550 (2014).
WorldCat.org
14
Proving the TLS handshake secure (as it is). (English)
Garay, Juan A. (ed.) et al., Advances in cryptology ‒ CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17‒21, 2014. Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-44380-4/pbk). Lecture Notes in Computer Science 8617, 235-255 (2014).
WorldCat.org
15
Malleable Signatures: New Definitions and Delegatable Anonymous Credentials. (English)
CSF, 199-213(2014)
WorldCat.org
16
Selective disclosure in Datalog-based trust management. (English)
Accorsi, Rafael (ed.) et al., Security and trust management. 9th international workshop, STM 2013, Egham, UK, September 12‒13, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-41097-0/pbk). Lecture Notes in Computer Science 8203, 160-175 (2013).
WorldCat.org
17
Anonymity-preserving public-key encryption: A constructive approach. (English)
De Cristofaro, Emiliano (ed.) et al., Privacy enhancing technologies. 13th international symposium, PETS 2013, Bloomington, IN, USA, July 10‒12, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-39076-0/pbk). Lecture Notes in Computer Science 7981, 19-39 (2013).
WorldCat.org
18
Verifiable elections that scale for free. (English)
Kurosawa, Kaoru (ed.) et al., Public-key cryptography ‒ PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26‒March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36361-0/pbk). Lecture Notes in Computer Science 7778, 479-496 (2013).
WorldCat.org
19
Tagged one-time signatures: tight security and optimal tag size. (English)
Kurosawa, Kaoru (ed.) et al., Public-key cryptography ‒ PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26‒March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36361-0/pbk). Lecture Notes in Computer Science 7778, 312-331 (2013).
WorldCat.org
20
first | previous | 1 21 41 | next | last

Result 1 to 20 of 51 total

Valid XHTML 1.0 Transitional Valid CSS!