Personensuche
X
?
Lecture Notes in Computer Science; Public-Key Cryptography – PKC 2024 ,
4
Threshold Structure-Preserving Signatures: Strong and Adapt..:
, In:
?
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security ,
6
Aggregate Signatures with Versatile Randomization and Issue..:
, In:
?
Advances in Cryptology – EUROCRYPT 2023; Lecture Notes in Computer Science ,
7
Unique-Path Identity Based Encryption with Applications to ..:
, In:
?
Theory of Cryptography; Lecture Notes in Computer Science ,
8
Revisiting Updatable Encryption: Controlled Forward Securit..:
, In:
?
Advances in Cryptology – ASIACRYPT 2023; Lecture Notes in Computer Science ,
9
Threshold Structure-Preserving Signatures:
, In:
?
Proceedings of the 2023 on Cloud Computing Security Workshop ,
10
Optimizing 0-RTT Key Exchange with Full Forward Security:
, In:
?
Proceedings of the 18th International Conference on Availability, Reliability and Security ,
11
RiBAC: Strengthening Access Control Systems for Pandemic Ri..:
, In:
?
Building the Hyperconnected Society- Internet of Things Research and Innovation Value Chains, Ecosystems and Markets ,
12
Securing the Internet of Things – Security and Privacy in a..:
, In:
?
Lecture Notes in Computer Science; Progress in Cryptology – INDOCRYPT 2022 ,
13
CRS-Updatable Asymmetric Quasi-Adaptive NIZK Arguments:
, In:
?
Public-Key Cryptography – PKC 2022; Lecture Notes in Computer Science ,
14
Logarithmic-Size (Linkable) Threshold Ring Signatures in th..:
, In:
?
Information Security and Privacy; Lecture Notes in Computer Science ,
15