-
1
-
-
84865806308
-
-
ARM: ARM Company Milestones (2011), http://www.arm.com/about/company- profile/milestones.php
-
(2011)
ARM: ARM Company Milestones
-
-
-
2
-
-
85076310471
-
PrETP: Privacy-Preserving Electronic Toll Pricing
-
Balasch, J., Rial, A., Troncoso, C., Geuens, C., Preneel, B., Verbauwhede, I.: PrETP: Privacy-Preserving Electronic Toll Pricing. In: USENIX Security (2010)
-
(2010)
USENIX Security
-
-
Balasch, J.1
Rial, A.2
Troncoso, C.3
Geuens, C.4
Preneel, B.5
Verbauwhede, I.6
-
3
-
-
33847698965
-
Efficient Pairing Computation on Supersingular Abelian Varieties
-
Barreto, P., Galbraith, S., Ó'hÉigeartaigh, C., Scott, M.: Efficient Pairing Computation on Supersingular Abelian Varieties. Designs, Codes and Cryptography (2007)
-
(2007)
Designs, Codes and Cryptography
-
-
Barreto, P.1
Galbraith, S.2
Ó'hÉigeartaigh, C.3
Scott, M.4
-
5
-
-
74049125197
-
Anonymous Credentials on a Standard Java Card
-
Bichsel, P., Camenisch, J., Groß, T., Shoup, V.: Anonymous Credentials on a Standard Java Card. In: Proceedings of the 16th ACM Conference on Computer and Communications Security (2009)
-
Proceedings of the 16th ACM Conference on Computer and Communications Security (2009)
-
-
Bichsel, P.1
Camenisch, J.2
Groß, T.3
Shoup, V.4
-
6
-
-
35248839965
-
A Signature Scheme with Efficient Protocols
-
Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. Springer, Heidelberg
-
Camenisch, J., Lysyanskaya, A.: A Signature Scheme with Efficient Protocols. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol. 2576, pp. 268-289. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2576
, pp. 268-289
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
7
-
-
35048845114
-
Signature Schemes and Anonymous Credentials from Bilinear Maps
-
Franklin, M. (ed.) CRYPTO 2004. Springer, Heidelberg
-
Camenisch, J., Lysyanskaya, A.: Signature Schemes and Anonymous Credentials from Bilinear Maps. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 56-72. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 56-72
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
10
-
-
50049122814
-
Implementing Cryptographic Pairings over Barreto-Naehrig Curves
-
Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. Springer, Heidelberg
-
Devegili, A.J., Scott, M., Dahab, R.: Implementing Cryptographic Pairings over Barreto-Naehrig Curves. In: Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. LNCS, vol. 4575, pp. 197-207. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4575
, pp. 197-207
-
-
Devegili, A.J.1
Scott, M.2
Dahab, R.3
-
11
-
-
75649093754
-
Near- Threshold Computing: Reclaiming Moore's Law Through Energy Efficient Integrated Circuits
-
Dreslinski, R., Wieckowski, M., Blaauw, D., Sylvester, D., Mudge, T.: Near- Threshold Computing: Reclaiming Moore's Law Through Energy Efficient Integrated Circuits. Proceedings of the IEEE (2010)
-
Proceedings of the IEEE (2010)
-
-
Dreslinski, R.1
Wieckowski, M.2
Blaauw, D.3
Sylvester, D.4
Mudge, T.5
-
12
-
-
84990731886
-
How to Prove Yourself: Practical Solutions to Identification and Signature Problems
-
Odlyzko, A.M. (ed.) CRYPTO 1986. Springer, Heidelberg
-
Fiat, A., Shamir, A.: How to Prove Yourself: Practical Solutions to Identification and Signature Problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186-194. Springer, Heidelberg (1987)
-
(1987)
LNCS
, vol.263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
13
-
-
84958615646
-
Statistical Zero Knowledge Protocols to Prove Modular Polynomial Relations
-
Kaliski Jr., B.S. (ed.) CRYPTO 1997. Springer, Heidelberg
-
Fujisaki, E., Okamoto, T.: Statistical Zero Knowledge Protocols to Prove Modular Polynomial Relations. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 16-30. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1294
, pp. 16-30
-
-
Fujisaki, E.1
Okamoto, T.2
-
16
-
-
84865822328
-
-
Intel: Corporate Timeline (2011), http://www.intel.com/about/companyinfo/ mu-seum/archives/timeline.html
-
(2011)
Intel: Corporate Timeline
-
-
-
17
-
-
79961183580
-
Plug-In Privacy for Smart Metering Billing
-
Fischer-Hübner, S., Hopper, N. (eds.) PETS 2011. Springer, Heidelberg
-
Jawurek, M., Johns, M., Kerschbaum, F.: Plug-In Privacy for Smart Metering Billing. In: Fischer-Hübner, S., Hopper, N. (eds.) PETS 2011. LNCS, vol. 6794, pp. 192-210. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6794
, pp. 192-210
-
-
Jawurek, M.1
Johns, M.2
Kerschbaum, F.3
-
18
-
-
79961178921
-
Privacy-Friendly Aggregation for the Smart-Grid
-
Fischer-Hübner, S., Hopper, N. (eds.) PETS 2011. Springer, Heidelberg
-
Kursawe, K., Danezis, G., Kohlweiss, M.: Privacy-Friendly Aggregation for the Smart-Grid. In: Fischer-Hübner, S., Hopper, N. (eds.) PETS 2011. LNCS, vol. 6794, pp. 175-191. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6794
, pp. 175-191
-
-
Kursawe, K.1
Danezis, G.2
Kohlweiss, M.3
-
20
-
-
67651053584
-
Pseudonym Systems
-
(Extended Abstract). In: Heys, H.M., Adams, C.M. (eds.) SAC 1999. Springer, Heidelberg
-
Lysyanskaya, A., Rivest, R.L., Sahai, A., Wolf, S.: Pseudonym Systems (Extended Abstract). In: Heys, H.M., Adams, C.M. (eds.) SAC 1999. LNCS, vol. 1758, pp. 184-199. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1758
, pp. 184-199
-
-
Lysyanskaya, A.1
Rivest, R.L.2
Sahai, A.3
Wolf, S.4
-
21
-
-
78650887542
-
Private Memoirs of a Smart Meter
-
Molina-Markham, A., Shenoy, P., Fu, K., Cecchet, E., Irwin, D.: Private Memoirs of a Smart Meter. In: Proceedings of the 2nd ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Building (2010)
-
Proceedings of the 2nd ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Building (2010)
-
-
Molina-Markham, A.1
Shenoy, P.2
Fu, K.3
Cecchet, E.4
Irwin, D.5
-
23
-
-
84982943258
-
Non-interactive and Information-Theoretic Secure Verifiable Secret Sharing
-
Feigenbaum, J. (ed.) CRYPTO 1991. Springer, Heidelberg
-
Pedersen, T.P.: Non-interactive and Information-Theoretic Secure Verifiable Secret Sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 129-140. Springer, Heidelberg (1992)
-
(1992)
LNCS
, vol.576
, pp. 129-140
-
-
Pedersen, T.P.1
-
28
-
-
50049122814
-
Implementing Cryptographic Pairings over Barreto-Naehrig Curves
-
Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. Springer, Heidelberg
-
Devegili, A.J., Scott, M., Dahab, R.: Implementing Cryptographic Pairings over Barreto-Naehrig Curves. In: Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. LNCS, vol. 4575, pp. 197-207. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4575
, pp. 197-207
-
-
Devegili, A.J.1
Scott, M.2
Dahab, R.3
-
29
-
-
33750710411
-
Implementing Cryptographic Pairings on Smartcards
-
Goubin, L., Matsui, M. (eds.) CHES 2006. Springer, Heidelberg
-
Scott, M., Costigan, N., Abdulwahab, W.: Implementing Cryptographic Pairings on Smartcards. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 134-147. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4249
, pp. 134-147
-
-
Scott, M.1
Costigan, N.2
Abdulwahab, W.3
|