Author of the publication

Anonymity 2.0 - X.509 Extensions Supporting Privacy-Friendly Authentication.

, , , and . Cryptology and Network Security, volume 4856 of Lecture Notes in Computer Science, page 265-281. Springer, (2007)
DOI: http://dx.doi.org/10.1007/978-3-540-76969-9_17

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anonymity 2.0 - X.509 Extensions Supporting Privacy-Friendly Authentication., , , and . Cryptology and Network Security, volume 4856 of Lecture Notes in Computer Science, page 265-281. Springer, (2007)Semantically Rich Access Control in Cloud EHR Systems Based on MA-ABE., , , and . BigDataSecurity/HPSC/IDS, page 1-10. IEEE, (2022)Improved, black-box, non-malleable encryption from semantic security., , , and . Des. Codes Cryptogr., 86 (3): 641-663 (2018)(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens., , , , and . J. Cryptol., 32 (2): 459-497 (2019)Deterministic, Stash-Free Write-Only ORAM., , , and . CCS, page 507-521. ACM, (2017)On the Privacy of Sublinear-Communication Jaccard Index Estimation via Min-hash Sketching., , , , and . IACR Cryptol. ePrint Arch., (2023)Managing Cloud Storage Obliviously., , , , , and . CLOUD, page 990-993. IEEE Computer Society, (2016)Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS., , , and . IACR Cryptology ePrint Archive, (2012)Short Traceable Signatures Based on Bilinear Pairings., , and . IWSEC, volume 4266 of Lecture Notes in Computer Science, page 88-103. Springer, (2006)Lossy trapdoor functions from homomorphic reproducible encryption., and . Inf. Process. Lett., 112 (20): 794-798 (2012)