au.\*:("NEVEN, Gregory")
Results 1 to 14 of 14
Selection :
Efficient Sequential Aggregate Signed DataNEVEN, Gregory.IEEE transactions on information theory. 2011, Vol 57, Num 3, pp 1803-1815, issn 0018-9448, 13 p.Article
A simple transitive signature scheme for directed treesNEVEN, Gregory.Theoretical computer science. 2008, Vol 396, Num 1-3, pp 277-282, issn 0304-3975, 6 p.Article
Transitive signatures : New schemes and proofsBELLARE, Mihir; NEVEN, Gregory.IEEE transactions on information theory. 2005, Vol 51, Num 6, pp 2133-2151, issn 0018-9448, 19 p.Article
Security Proofs for Identity-Based Identification and Signature SchemesBELLARE, Mihir; NAMPREMPRE, Chanathip; NEVEN, Gregory et al.Journal of cryptology. 2009, Vol 22, Num 1, pp 1-61, issn 0933-2790, 61 p.Article
Transitive signatures based on factoring and RSABELLAREL, Mihir; NEVEN, Gregory.Lecture notes in computer science. 2002, pp 397-414, issn 0302-9743, isbn 3-540-00171-9, 18 p.Conference Paper
Identity-based multi-signatures from RSABELLARE, Mihir; NEVEN, Gregory.Lecture notes in computer science. 2006, pp 145-162, issn 0302-9743, isbn 978-3-540-69327-7, 1Vol, 18 p.Conference Paper
Security proofs for identity-based identification and signature schemesBELLARE, Mihir; NAMPREMPRE, Chanathip; NEVEN, Gregory et al.Lecture notes in computer science. 2004, pp 268-286, issn 0302-9743, isbn 3-540-21935-8, 19 p.Conference Paper
Concepts and languages for privacy-preserving attribute-based authentication : Identity Protection and ManagementCAMENISCH, Jan; DUBOVITSKAYA, Maria; ENDERLEIN, Robert R et al.Journal of information security and applications. 2014, Vol 19, Num 1, pp 25-44, 20 p.Article
Wildcarded Identity-Based EncryptionABDALLA, Michel; BIRKETT, James; CATALANO, Dario et al.Journal of cryptology. 2011, Vol 24, Num 1, pp 42-82, issn 0933-2790, 41 p.Article
Identity-Based Encryption Gone WildABDALLA, Michel; CATALANO, Dario; DENT, Alexander W et al.Lecture notes in computer science. 2006, pp 300-311, issn 0302-9743, isbn 3-540-35904-4, 12 p.Conference Paper
Searchable Encryption Revisited : Consistency Properties, Relation to Anonymous IBE, and ExtensionsABDALLA, Michel; BELLARE, Mihir; CATALANO, Dario et al.Journal of cryptology. 2008, Vol 21, Num 3, pp 350-391, issn 0933-2790, 42 p.Article
Private Policy NegotiationKURSAWE, Klaus; NEVEN, Gregory; TUYLS, Pim et al.Lecture notes in computer science. 2006, pp 81-95, issn 0302-9743, isbn 3-540-46255-4, 1Vol, 15 p.Conference Paper
Searchable encryption revisited : Consistency properties, relation to anonymous IBE, and extensionsABDALLA, Michel; BELLARE, Mihir; CATALANO, Dario et al.Lecture notes in computer science. 2005, pp 205-222, issn 0302-9743, isbn 3-540-28114-2, 1Vol, 18 p.Conference Paper
Semi-trusted hosts and mobile agents : Enabling secure distributed computationsDE DECKER, Bart; PIESSENS, Frank; VAN HOEYMISSEN, Erik et al.Lecture notes in computer science. 2000, pp 219-232, issn 0302-9743, isbn 3-540-41069-4Conference Paper