G. Tsudik

From MaRDI portal
(Redirected from Person:223048)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Element distinctness and bounded input size in private set intersection and related protocols2024-05-31Paper
Server-Supported Signatures
Computer Security — ESORICS 96
2022-08-16Paper
Sanitizable signatures
Computer Security – ESORICS 2005
2022-03-09Paper
KRB-CCN: lightweight authentication and access control for private content-centric networks
(available as arXiv preprint)
2018-08-10Paper
Assentication: user de-authentication and lunchtime attack mitigation with seated posture biometric
(available as arXiv preprint)
2018-08-10Paper
Data Security in Unattended Wireless Sensor Networks
IEEE Transactions on Computers
2017-08-08Paper
Bounded size-hiding private set intersection
Lecture Notes in Computer Science
2016-10-21Paper
Secret sets and applications
Information Processing Letters
2016-06-09Paper
Quasi-Efficient Revocation of Group Signatures
Financial Cryptography
2011-04-20Paper
(If) size matters: size-hiding private set intersection
Public Key Cryptography – PKC 2011
2011-03-15Paper
Linear-complexity private set intersection protocols secure in malicious model
Advances in Cryptology - ASIACRYPT 2010
2010-12-07Paper
Some security topics with possible applications for pairing-based cryptography. (Abstract)
Lecture Notes in Computer Science
2010-11-26Paper
Secure Code Update for Embedded Devices via Proofs of Secure Erasure
Computer Security – ESORICS 2010
2010-09-20Paper
Taming Big Brother Ambitions: More Privacy for Secret Handshakes
Privacy Enhancing Technologies
2010-08-10Paper
Affiliation-hiding key exchange with untrusted group authorities
Applied Cryptography and Network Security
2010-07-06Paper
Accumulating composites and improved group signing
Lecture Notes in Computer Science
2010-01-05Paper
Remarks on ``Analysis of one popular group signature scheme in Asiacrypt 2006
International Journal of Applied Cryptography
2009-10-12Paper
Revisiting Oblivious Signature-Based Envelopes
Financial Cryptography and Data Security
2008-09-09Paper
Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange
Topics in Cryptology – CT-RSA 2008
2008-04-24Paper
Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement
Lecture Notes in Computer Science
2008-04-17Paper
Threshold cryptography in P2P and MANETs: The case of access control
Computer Networks
2007-07-23Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2007-05-02Paper
Security in Communication Networks
Lecture Notes in Computer Science
2006-10-10Paper
Secure acknowledgment aggregation and multisignatures with limited robustness
Computer Networks
2006-06-30Paper
Secret Handshakes from CA-Oblivious Encryption2005-08-12Paper
scientific article; zbMATH DE number 2102683 (Why is no real title available?)2004-09-24Paper
How to construct optimal one-time signatures.
Computer Networks
2004-03-14Paper
scientific article; zbMATH DE number 1962151 (Why is no real title available?)2003-08-10Paper
scientific article; zbMATH DE number 1952888 (Why is no real title available?)2003-07-24Paper
scientific article; zbMATH DE number 1759783 (Why is no real title available?)2002-10-07Paper
scientific article; zbMATH DE number 1690177 (Why is no real title available?)2002-01-14Paper
Flooding for reliable multicast in multi-hop ad hoc networks
Wireless Networks
2002-01-14Paper
scientific article; zbMATH DE number 1408383 (Why is no real title available?)2000-05-28Paper
scientific article; zbMATH DE number 1305483 (Why is no real title available?)1999-09-15Paper
scientific article; zbMATH DE number 4195144 (Why is no real title available?)1991-01-01Paper


Research outcomes over time


This page was built for person: G. Tsudik