-
1
-
-
85012908743
-
One-Way Accumulators: A Decentralized Alternative to Digital Signatures (Extended Abstract)
-
Helleseth, T. (ed.) EUROCRYPT 1993. Springer, Heidelberg
-
Benaloh, J.C., de Mare, M.: One-Way Accumulators: A Decentralized Alternative to Digital Signatures (Extended Abstract). In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 274-285. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.765
, pp. 274-285
-
-
Benaloh, J.C.1
De Mare, M.2
-
2
-
-
35048848152
-
Short Signatures Without Random Oracles
-
Cachin, C., Camenisch, J. (eds.) EUROCRYPT 2004. Springer, Heidelberg
-
Boneh, D., Boyen, X.: Short Signatures Without Random Oracles. In: Cachin, C., Camenisch, J. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 56-73. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 56-73
-
-
Boneh, D.1
Boyen, X.2
-
3
-
-
74049137084
-
Oblivious Transfer with Access Control
-
ACM
-
Camenisch, J., Dubovitskaya, M., Neven, G.: Oblivious Transfer with Access Control. In: ACMConference on Computer and Communications Security, pp. 131-140. ACM (2009)
-
(2009)
ACMConference on Computer and Communications Security
, pp. 131-140
-
-
Camenisch, J.1
Dubovitskaya, M.2
Neven, G.3
-
4
-
-
79952510570
-
Oblivious Transfer with Hidden Access Control Policies
-
Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. Springer, Heidelberg
-
Camenisch, J., Dubovitskaya, M., Neven, G., Zaverucha, G.M.: Oblivious Transfer with Hidden Access Control Policies. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 192-209. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6571
, pp. 192-209
-
-
Camenisch, J.1
Dubovitskaya, M.2
Neven, G.3
Zaverucha, G.M.4
-
5
-
-
67049119910
-
An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials
-
Jarecki, S., Tsudik, G. (eds.) PKC 2009. Springer, Heidelberg
-
Camenisch, J., Kohlweiss, M., Soriente, C.: An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 481-500. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5443
, pp. 481-500
-
-
Camenisch, J.1
Kohlweiss, M.2
Soriente, C.3
-
6
-
-
84937428748
-
Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials
-
Yung, M. (ed.) CRYPTO 2002. Springer, Heidelberg
-
Camenisch, J., Lysyanskaya, A.: Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 61-76. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
, pp. 61-76
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
7
-
-
38049032965
-
Fragmentation and Encryption to Enforce Privacy in Data Storage
-
Biskup, J., López, J. (eds.) ESORICS 2007. Springer, Heidelberg
-
Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Fragmentation and Encryption to Enforce Privacy in Data Storage. In: Biskup, J., López, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 171-186. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4734
, pp. 171-186
-
-
Ciriani, V.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
8
-
-
79959823641
-
Access Controls for Oblivious and Anonymous Systems
-
Coull, S.E., Green, M., Hohenberger, S.: Access Controls for Oblivious and Anonymous Systems. ACM Trans. Inf. Syst. Secur. 14(1), 10 (2011)
-
(2011)
ACM Trans. Inf. Syst. Secur.
, vol.14
, Issue.1
, pp. 10
-
-
Coull, S.E.1
Green, M.2
Hohenberger, S.3
-
9
-
-
84857078897
-
Oblivious Outsourced Storage with Delegation
-
Danezis, G. (ed.) FC 2011. Springer, Heidelberg
-
Franz, M., Williams, P., Carbunar, B., Katzenbeisser, S., Peter, A., Sion, R., Sotakova, M.: Oblivious Outsourced Storage with Delegation. In: Danezis, G. (ed.) FC 2011. LNCS, vol. 7035, pp. 127-140. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7035
, pp. 127-140
-
-
Franz, M.1
Williams, P.2
Carbunar, B.3
Katzenbeisser, S.4
Peter, A.5
Sion, R.6
Sotakova, M.7
-
11
-
-
77956137294
-
Cryptographic Cloud Storage
-
Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Sebé, F. (eds.) FC 2010 Workshops. Springer, Heidelberg
-
Kamara, S., Lauter, K.: Cryptographic Cloud Storage. In: Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Sebé, F. (eds.) FC 2010 Workshops. LNCS, vol. 6054, pp. 136-149. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6054
, pp. 136-149
-
-
Kamara, S.1
Lauter, K.2
-
12
-
-
24944520998
-
Authentication and Integrity in Outsourced Databases
-
The Internet Society
-
Mykletun, E., Narasimha, M., Tsudik, G.: Authentication and Integrity in Outsourced Databases. In: NDSS. The Internet Society (2004)
-
(2004)
NDSS
-
-
Mykletun, E.1
Narasimha, M.2
Tsudik, G.3
-
13
-
-
70349278621
-
Building Castles out of Mud: Practical Access Pattern Privacy and Correctness on Untrusted Storage
-
ACM
-
Williams, P., Sion, R., Carbunar, B.: Building Castles out of Mud: Practical Access Pattern Privacy and Correctness on Untrusted Storage. In: ACM Conference on Computer and Communications Security, pp. 139-148. ACM (2008)
-
(2008)
ACM Conference on Computer and Communications Security
, pp. 139-148
-
-
Williams, P.1
Sion, R.2
Carbunar, B.3
-
14
-
-
84865815069
-
K2C: Cryptographic Cloud Storage with Lazy Revocation and Anonymous Access
-
Rajarajan, M., et al. (eds.) SecureComm 2011. Springer, Heidelberg
-
Zarandioon, S., Yao, D(D.), Ganapathy, V.: K2C: Cryptographic Cloud Storage with Lazy Revocation and Anonymous Access. In: Rajarajan, M., et al. (eds.) SecureComm 2011. LNICST, vol. 96, pp. 59-76. Springer, Heidelberg (2012)
-
(2012)
LNICST
, vol.96
, pp. 59-76
-
-
Zarandioon, S.1
Yao, D.2
Ganapathy, V.3
|