Search for persons
X
?
Public-Key Cryptography – PKC 2022; Lecture Notes in Computer Science ,
1
Lifting Standard Model Reductions to Common Setup Assumptio..:
, In:
?
Provable and Practical Security; Lecture Notes in Computer Science ,
2
Cryptographic Role-Based Access Control, Reconsidered:
, In:
?
Advances in Cryptology – CRYPTO 2021; Lecture Notes in Computer Science ,
3
Provable Security Analysis of FIDO2:
, In:
?
2020 IEEE 33rd Computer Security Foundations Symposium (CSF) ,
4
Fifty Shades of Ballot Privacy: Privacy against a Malicious..:
, In:
?
2020 IEEE 33rd Computer Security Foundations Symposium (CSF) ,
5
Authentication in Key-Exchange: Definitions, Relations and ..:
, In:
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
6
Masking Fuzzy-Searchable Public Databases:
, In:
?
Topics in Cryptology – CT-RSA 2019; Lecture Notes in Computer Science ,
7
Efficient Function-Hiding Functional Encryption: From Inner..:
, In:
?
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security ,
8
Encrypted Databases : New Volume Attacks against Range Q..:
, In:
?
Proceedings of the 1st International Workshop on Security Awareness from Design to Deployment ,
9
Safe cryptography for all : towards visual metaphor driv..:
, In:
?
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security ,
15