Pascal and Francis Bibliographic Databases

Help

Search results

Your search

au.\*:("NEVEN, Gregory")

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 14 of 14

  • Page / 1
Export

Selection :

  • and

Efficient Sequential Aggregate Signed DataNEVEN, Gregory.IEEE transactions on information theory. 2011, Vol 57, Num 3, pp 1803-1815, issn 0018-9448, 13 p.Article

A simple transitive signature scheme for directed treesNEVEN, Gregory.Theoretical computer science. 2008, Vol 396, Num 1-3, pp 277-282, issn 0304-3975, 6 p.Article

Transitive signatures : New schemes and proofsBELLARE, Mihir; NEVEN, Gregory.IEEE transactions on information theory. 2005, Vol 51, Num 6, pp 2133-2151, issn 0018-9448, 19 p.Article

Security Proofs for Identity-Based Identification and Signature SchemesBELLARE, Mihir; NAMPREMPRE, Chanathip; NEVEN, Gregory et al.Journal of cryptology. 2009, Vol 22, Num 1, pp 1-61, issn 0933-2790, 61 p.Article

Transitive signatures based on factoring and RSABELLAREL, Mihir; NEVEN, Gregory.Lecture notes in computer science. 2002, pp 397-414, issn 0302-9743, isbn 3-540-00171-9, 18 p.Conference Paper

Identity-based multi-signatures from RSABELLARE, Mihir; NEVEN, Gregory.Lecture notes in computer science. 2006, pp 145-162, issn 0302-9743, isbn 978-3-540-69327-7, 1Vol, 18 p.Conference Paper

Security proofs for identity-based identification and signature schemesBELLARE, Mihir; NAMPREMPRE, Chanathip; NEVEN, Gregory et al.Lecture notes in computer science. 2004, pp 268-286, issn 0302-9743, isbn 3-540-21935-8, 19 p.Conference Paper

Concepts and languages for privacy-preserving attribute-based authentication : Identity Protection and ManagementCAMENISCH, Jan; DUBOVITSKAYA, Maria; ENDERLEIN, Robert R et al.Journal of information security and applications. 2014, Vol 19, Num 1, pp 25-44, 20 p.Article

Wildcarded Identity-Based EncryptionABDALLA, Michel; BIRKETT, James; CATALANO, Dario et al.Journal of cryptology. 2011, Vol 24, Num 1, pp 42-82, issn 0933-2790, 41 p.Article

Identity-Based Encryption Gone WildABDALLA, Michel; CATALANO, Dario; DENT, Alexander W et al.Lecture notes in computer science. 2006, pp 300-311, issn 0302-9743, isbn 3-540-35904-4, 12 p.Conference Paper

Searchable Encryption Revisited : Consistency Properties, Relation to Anonymous IBE, and ExtensionsABDALLA, Michel; BELLARE, Mihir; CATALANO, Dario et al.Journal of cryptology. 2008, Vol 21, Num 3, pp 350-391, issn 0933-2790, 42 p.Article

Private Policy NegotiationKURSAWE, Klaus; NEVEN, Gregory; TUYLS, Pim et al.Lecture notes in computer science. 2006, pp 81-95, issn 0302-9743, isbn 3-540-46255-4, 1Vol, 15 p.Conference Paper

Searchable encryption revisited : Consistency properties, relation to anonymous IBE, and extensionsABDALLA, Michel; BELLARE, Mihir; CATALANO, Dario et al.Lecture notes in computer science. 2005, pp 205-222, issn 0302-9743, isbn 3-540-28114-2, 1Vol, 18 p.Conference Paper

Semi-trusted hosts and mobile agents : Enabling secure distributed computationsDE DECKER, Bart; PIESSENS, Frank; VAN HOEYMISSEN, Erik et al.Lecture notes in computer science. 2000, pp 219-232, issn 0302-9743, isbn 3-540-41069-4Conference Paper

  • Page / 1