Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts., and . Public Key Cryptography, volume 7293 of Lecture Notes in Computer Science, page 225-242. Springer, (2012)Non-interactive Zero-Knowledge from Homomorphic Encryption., , and . TCC, volume 3876 of Lecture Notes in Computer Science, page 41-59. Springer, (2006)Dynamic and Efficient Key Management for Access Hierarchies., , , and . ACM Trans. Inf. Syst. Secur., 12 (3): 18:1-18:43 (2009)Broadcast Steganography., , and . CT-RSA, volume 8366 of Lecture Notes in Computer Science, page 64-84. Springer, (2014)Tutorial on content protection., and . ACM Multimedia, page 1153-1154. ACM, (2008)On Cryptographic Techniques for Digital Rights Management.. New York University, USA, (2006)Generalized Learning Problems and Applications to Non-commutative Cryptography., , , , and . ProvSec, volume 6980 of Lecture Notes in Computer Science, page 324-339. Springer, (2011)Extended Abstract.Traitor Tracing with Optimal Transmission Rate., , and . ISC, volume 4779 of Lecture Notes in Computer Science, page 71-88. Springer, (2007)