Search for persons
X
?
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security ,
1
Short Privacy-Preserving Proofs of Liabilities:
, In:
?
Computer Security – ESORICS 2022; Lecture Notes in Computer Science ,
2
DualDory: Logarithmic-Verifier Linkable Ring Signatures Thr..:
, In:
?
Cryptology and Network Security; Lecture Notes in Computer Science ,
3
Anonymous Transactions with Revocation and Auditing in Hype..:
, In:
?
Proceedings of the 2nd ACM Conference on Advances in Financial Technologies ,
5
Privacy-preserving auditable token payments in a permission..:
, In:
?
Financial Cryptography and Data Security; Lecture Notes in Computer Science ,
6
Decentralized Privacy-Preserving Netting Protocol on Blockc..:
, In:
?
Proceedings of the 6th International Workshop on Security in Cloud Computing ,
7
POROS : Proof of Data Reliability for Outsourced Storage:
, In:
?
Proceedings of the 2016 ACM on Cloud Computing Security Workshop ,
8
Message-Locked Proofs of Retrievability with Secure Dedupli..:
, In:
?
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security ,
9
Efficient Techniques for Publicly Verifiable Delegation of ..:
, In:
?
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks ,
10
CHECKER : on-site checking in RFID-based supply chains:
, In:
?
Proceedings of the 18th ACM conference on Computer and communications security ,
11