-
1
-
-
26444476977
-
-
Abdalla, M., Pointcheval, D.: Interactive Diffie-Hellman assumptions with applications to password-based authentication. In: S. Patrick, A., Yung, M. (eds.) FC 2005. LNCS, 3570, pp. 341-356. Springer, Heidelberg (2005)
-
Abdalla, M., Pointcheval, D.: Interactive Diffie-Hellman assumptions with applications to password-based authentication. In: S. Patrick, A., Yung, M. (eds.) FC 2005. LNCS, vol. 3570, pp. 341-356. Springer, Heidelberg (2005)
-
-
-
-
2
-
-
34548589075
-
Buddy tracking - efficient proximity detection among mobile friends. Pervasive and Mobile
-
Amir, A., Efrat, A., Myllymaki, J., Palaniappan, L., Wampler, K.: Buddy tracking - efficient proximity detection among mobile friends. Pervasive and Mobile Computing 3, 489-511 (2007)
-
(2007)
Computing
, vol.3
, pp. 489-511
-
-
Amir, A.1
Efrat, A.2
Myllymaki, J.3
Palaniappan, L.4
Wampler, K.5
-
3
-
-
0242496951
-
Secure multi-party computation problems and their applications: A review and open problems
-
Association for Computing Machinery, pp
-
Atallah, M., Du, W.: Secure multi-party computation problems and their applications: a review and open problems. In: Proceedings of the 2001 Workshop on New Security Paradigms - NSPW 2001. Association for Computing Machinery, pp. 13-22 (2001)
-
(2001)
Proceedings of the 2001 Workshop on New Security Paradigms - NSPW
, pp. 13-22
-
-
Atallah, M.1
Du, W.2
-
4
-
-
0142156713
-
Variations of Diffie-Hellman Problem
-
Qing, S, Gollmann, D, Zhou, J, eds, ICICS 2003, Springer, Heidelberg
-
Bao, F., Deng, R., Zhu, H.: Variations of Diffie-Hellman Problem. In: Qing, S., Gollmann, D., Zhou, J. (eds.) ICICS 2003. LNCS, vol. 2836, pp. 301-312. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2836
, pp. 301-312
-
-
Bao, F.1
Deng, R.2
Zhu, H.3
-
5
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
-
Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 586-615. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
6
-
-
84946840347
-
Short signatures from the Weil pairing
-
Boyd, C, ed, ASIACRYPT 2001, Springer, Heidelberg
-
Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 297-319. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2248
, pp. 297-319
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
7
-
-
84957375076
-
A secure and optimally efficient multiauthority election
-
Fumy, W, ed, EUROCRYPT 1997, Springer, Heidelberg
-
Cramer, R., Gennaro, R., Schoenmakers, B.: A secure and optimally efficient multiauthority election. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 103-118. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1233
, pp. 103-118
-
-
Cramer, R.1
Gennaro, R.2
Schoenmakers, B.3
-
8
-
-
72449178775
-
-
Dierks, T, Rescorla, E, The transport layer security (TLS)protocol, Technical report, Version 1.1 1483 RFC 4346, Internet Engineering Task Force 2006
-
Dierks, T., Rescorla, E.: The transport layer security (TLS)protocol, Technical report, Version 1.1 1483 RFC 4346, Internet Engineering Task Force (2006), http://www.ietf.org/rfc/rfc4346.txt
-
-
-
-
10
-
-
72449179199
-
-
FIPS 186-3, Digital Signature Standard (DSS), Federal Information Processing Standards Publication 186-3, National Institute of Standards and Technology (2009)
-
FIPS 186-3, Digital Signature Standard (DSS), Federal Information Processing Standards Publication 186-3, National Institute of Standards and Technology (2009)
-
-
-
-
11
-
-
35048820609
-
Efficient private matching and set intersection
-
Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
-
Freedman, M., Nissim, K., Pinkas, B.: Efficient private matching and set intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 1-19. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 1-19
-
-
Freedman, M.1
Nissim, K.2
Pinkas, B.3
-
12
-
-
85050160774
-
-
Goldwasser, S., Micali, S.: Probabilistic encryption and how to play mental poker keeping secret all partial information. In: ACM Symposium on Theory of Computing - STOC 1982, Association for Computing Machinery, pp. 365-377 (1982)
-
Goldwasser, S., Micali, S.: Probabilistic encryption and how to play mental poker keeping secret all partial information. In: ACM Symposium on Theory of Computing - STOC 1982, Association for Computing Machinery, pp. 365-377 (1982)
-
-
-
-
13
-
-
70350337337
-
How to hash on elliptic curves
-
Halevi, S, ed, CRYPTO 2009, Springer, Heidelberg
-
Icart, T.: How to hash on elliptic curves. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 303-316. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5677
, pp. 303-316
-
-
Icart, T.1
-
15
-
-
84955606093
-
Proving without knowing: On oblivious, agnostic and blindfolded provers
-
Koblitz, N, ed, CRYPTO 1996, Springer, Heidelberg
-
Jakobsson, M., Yung, M.: Proving without knowing: On oblivious, agnostic and blindfolded provers. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 186-200. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1109
, pp. 186-200
-
-
Jakobsson, M.1
Yung, M.2
-
16
-
-
33745160750
-
Privacy-preserving set operations
-
Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
-
Kissner, L., Song, D.: Privacy-preserving set operations. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 241-257. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 241-257
-
-
Kissner, L.1
Song, D.2
-
17
-
-
33746101482
-
-
Køien, G., Oleshchuk, V.: Location privacy for cellular systems; analysis and solution. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, 3856, pp. 40-58. Springer, Heidelberg (2006)
-
Køien, G., Oleshchuk, V.: Location privacy for cellular systems; analysis and solution. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol. 3856, pp. 40-58. Springer, Heidelberg (2006)
-
-
-
-
18
-
-
84942550160
-
Lower bounds for discrete logarithms and related problems
-
Fumy, W, ed, EUROCRYPT 1997, Springer, Heidelberg
-
Shoup, V.: Lower bounds for discrete logarithms and related problems. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 256-266. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1233
, pp. 256-266
-
-
Shoup, V.1
-
19
-
-
33750057671
-
-
Szydlo, M.: A note on chosen-basis decisional Diffie-Hellman Assumptions. In: Di Crescenzo, G., Rubin, A. (eds.) FC 2006. LNCS, 4107, pp. 166-170. Springer, Heidelberg (2006)
-
Szydlo, M.: A note on chosen-basis decisional Diffie-Hellman Assumptions. In: Di Crescenzo, G., Rubin, A. (eds.) FC 2006. LNCS, vol. 4107, pp. 166-170. Springer, Heidelberg (2006)
-
-
-
-
22
-
-
38149079700
-
-
Zhong, G., Goldberg, I., Hengartner, U.: Louis, Lester and Pierre: Three protocols for location privacy. In: Borisov, N., Golle, P. (eds.) PET 2007. LNCS, 4776, pp. 62-76. Springer, Heidelberg (2007)
-
Zhong, G., Goldberg, I., Hengartner, U.: Louis, Lester and Pierre: Three protocols for location privacy. In: Borisov, N., Golle, P. (eds.) PET 2007. LNCS, vol. 4776, pp. 62-76. Springer, Heidelberg (2007)
-
-
-
|