-
1
-
-
0034771832
-
Practical multi-candidate election system
-
Olivier Baudron, Pierre-Alain Fouque, David Pointcheval, Jacques Stern, and Guillaume Poupard, Practical multi-candidate election system, In Twentieth Annual ACM Symposium on Principles of Distributed Computing, pages 274-283, 2001.
-
(2001)
Twentieth Annual ACM Symposium on Principles of Distributed Computing
, pp. 274-283
-
-
Baudron, O.1
Fouque, P.-A.2
Pointcheval, D.3
Stern, J.4
Poupard, G.5
-
2
-
-
35048841300
-
Efficient selective id secure identity based encryption without random oracles
-
Advances in Cryptology-Proceedings of EUROCRYPT'04, Springer
-
D.Boneh and X.Boyen, Efficient selective id secure identity based encryption without random oracles, In Advances in Cryptology-Proceedings of EUROCRYPT'04, volume 3027 of Lecture Notes in Computer Science, pages 223-238, Springer, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3027
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
3
-
-
24944562007
-
Hierarchical identity based encryption with constant size ciphertext
-
Advances in Cryptology-Proceedings of EUROCRYPT'05, Springer
-
D.Boneh and X.Boyen, Hierarchical Identity Based Encryption with Constant Size Ciphertext, In Advances in Cryptology-Proceedings of EUROCRYPT'05, volume 3494 of Lecture Notes in Computer Science, pages 440-456. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 440-456
-
-
Boneh, D.1
Boyen, X.2
-
4
-
-
85016749139
-
Fine-grained control of security capabilities
-
February
-
D.Boneh, X.Ding, and G.Tsudik, Fine-grained control of security capabilities,ACM Transactions on Internet Technology (TOIT) Volume 4, Issue 1, February 2004.
-
(2004)
ACM Transactions on Internet Technology (TOIT)
, vol.4
, Issue.1
-
-
Boneh, D.1
Ding, X.2
Tsudik, G.3
-
5
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
Advances in Cryptology-CRYPTO 2001, Springer-Verlag
-
D.Boneh and M.Franklin, Identity-based encryption from the Weil pairing, In Advances in Cryptology-CRYPTO 2001, volume 2139 of LNCS, pages 213-229. Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
6
-
-
35048840186
-
Identity-based threshold decryption
-
Proceedings of the 7th International Workshop on Theory and Practice in Public Key Cryptogrpahy (PKC'04), Springer-Verlag
-
Joonsang Baek and Yuliang Zheng, Identity-Based Threshold Decryption, Proceedings of the 7th International Workshop on Theory and Practice in Public Key Cryptogrpahy (PKC'04), LNCS, vol. 2947, Springer-Verlag, 2004, pp. 262-276.
-
(2004)
LNCS
, vol.2947
, pp. 262-276
-
-
Baek, J.1
Zheng, Y.2
-
7
-
-
33745652236
-
ID-based threshold decryption without random oracles and its application in key escrow
-
Proceedings of the 3rd international conference on Information security
-
Zhenchuan Chai, Zhenfu Cao, and Rongxing Lu, ID-based Threshold Decryption without Random Oracles and its Application in Key Escrow, In Proceedings of the 3rd international conference on Information security, ACM International Conference Proceeding Series, 2004.
-
(2004)
ACM International Conference Proceeding Series
-
-
Chai, Z.1
Cao, Z.2
Lu, R.3
-
8
-
-
85001025766
-
Wallet databases with observers
-
Advances in Cryptology-Proceedings of CRYPTO'92, Springer-Verlag
-
D.Chaum and T.P. Pedersen, Wallet databases with observers, In Advances in Cryptology-Proceedings of CRYPTO'92, volume 740 of Lecture Notes in Computer Science, pages 89-105, Springer-Verlag, 1993.
-
(1993)
Lecture Notes in Computer Science
, vol.740
, pp. 89-105
-
-
Chaum, D.1
Pedersen, T.P.2
-
10
-
-
33745324657
-
Efficient revocation of dynamic security privileges in hierarchically structured communities
-
Fredericton, New Brunswick, Canada, October 13-15
-
D. Nali, A. Miri, and C. Adams, Efficient Revocation of Dynamic Security Privileges in Hierarchically Structured Communities, Proceedings of the 2nd Annual Conference on Privacy, Security and Trust (PST 2004), Fredericton, New Brunswick, Canada, October 13-15, 2004, pp. 219-223.
-
(2004)
Proceedings of the 2nd Annual Conference on Privacy, Security and Trust (PST 2004)
, pp. 219-223
-
-
Nali, D.1
Miri, A.2
Adams, C.3
|