Slamanig, Daniel
85  Ergebnisse:
Personensuche X
?
2

Threshold Delegatable Anonymous Credentials With Controlled..:

Mir, Omid ; Slamanig, Daniel ; Mayrhofer, René
IEEE Transactions on Dependable and Secure Computing.  21 (2024)  4 - p. 2312-2326 , 2024
 
?
4

Threshold Structure-Preserving Signatures: Strong and Adapt..:

, In: Lecture Notes in Computer Science; Public-Key Cryptography – PKC 2024,
 
?
6

Aggregate Signatures with Versatile Randomization and Issue..:

, In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security,
Mir, Omid ; Bauer, Balthazar ; Griffy, Scott.. - p. 30-44 , 2023
 
?
7

Unique-Path Identity Based Encryption with Applications to ..:

, In: Advances in Cryptology – EUROCRYPT 2023; Lecture Notes in Computer Science,
 
?
8

Revisiting Updatable Encryption: Controlled Forward Securit..:

, In: Theory of Cryptography; Lecture Notes in Computer Science,
Slamanig, Daniel ; Striecks, Christoph - p. 220-250 , 2023
 
?
9

Threshold Structure-Preserving Signatures:

, In: Advances in Cryptology – ASIACRYPT 2023; Lecture Notes in Computer Science,
 
?
10

Optimizing 0-RTT Key Exchange with Full Forward Security:

, In: Proceedings of the 2023 on Cloud Computing Security Workshop,
 
?
11

RiBAC: Strengthening Access Control Systems for Pandemic Ri..:

, In: Proceedings of the 18th International Conference on Availability, Reliability and Security,
 
?
12

Securing the Internet of Things – Security and Privacy in a..:

, In: Building the Hyperconnected Society- Internet of Things Research and Innovation Value Chains, Ecosystems and Markets,
 
?
13

CRS-Updatable Asymmetric Quasi-Adaptive NIZK Arguments:

, In: Lecture Notes in Computer Science; Progress in Cryptology – INDOCRYPT 2022,
 
?
14

Logarithmic-Size (Linkable) Threshold Ring Signatures in th..:

, In: Public-Key Cryptography – PKC 2022; Lecture Notes in Computer Science,
Haque, Abida ; Krenn, Stephan ; Slamanig, Daniel. - p. 437-467 , 2022
 
?
15

Updatable Trapdoor SPHFs: Modular Construction of Updatable..:

, In: Information Security and Privacy; Lecture Notes in Computer Science,
 
1-15