| Publication | Date of Publication | Type |
|---|
| Element distinctness and bounded input size in private set intersection and related protocols | 2024-05-31 | Paper |
Server-Supported Signatures Computer Security — ESORICS 96 | 2022-08-16 | Paper |
Sanitizable signatures Computer Security – ESORICS 2005 | 2022-03-09 | Paper |
KRB-CCN: lightweight authentication and access control for private content-centric networks (available as arXiv preprint) | 2018-08-10 | Paper |
Assentication: user de-authentication and lunchtime attack mitigation with seated posture biometric (available as arXiv preprint) | 2018-08-10 | Paper |
Data Security in Unattended Wireless Sensor Networks IEEE Transactions on Computers | 2017-08-08 | Paper |
Bounded size-hiding private set intersection Lecture Notes in Computer Science | 2016-10-21 | Paper |
Secret sets and applications Information Processing Letters | 2016-06-09 | Paper |
Quasi-Efficient Revocation of Group Signatures Financial Cryptography | 2011-04-20 | Paper |
(If) size matters: size-hiding private set intersection Public Key Cryptography – PKC 2011 | 2011-03-15 | Paper |
Linear-complexity private set intersection protocols secure in malicious model Advances in Cryptology - ASIACRYPT 2010 | 2010-12-07 | Paper |
Some security topics with possible applications for pairing-based cryptography. (Abstract) Lecture Notes in Computer Science | 2010-11-26 | Paper |
Secure Code Update for Embedded Devices via Proofs of Secure Erasure Computer Security – ESORICS 2010 | 2010-09-20 | Paper |
Taming Big Brother Ambitions: More Privacy for Secret Handshakes Privacy Enhancing Technologies | 2010-08-10 | Paper |
Affiliation-hiding key exchange with untrusted group authorities Applied Cryptography and Network Security | 2010-07-06 | Paper |
Accumulating composites and improved group signing Lecture Notes in Computer Science | 2010-01-05 | Paper |
Remarks on ``Analysis of one popular group signature scheme in Asiacrypt 2006 International Journal of Applied Cryptography | 2009-10-12 | Paper |
Revisiting Oblivious Signature-Based Envelopes Financial Cryptography and Data Security | 2008-09-09 | Paper |
Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange Topics in Cryptology – CT-RSA 2008 | 2008-04-24 | Paper |
Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement Lecture Notes in Computer Science | 2008-04-17 | Paper |
Threshold cryptography in P2P and MANETs: The case of access control Computer Networks | 2007-07-23 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2007-05-02 | Paper |
Security in Communication Networks Lecture Notes in Computer Science | 2006-10-10 | Paper |
Secure acknowledgment aggregation and multisignatures with limited robustness Computer Networks | 2006-06-30 | Paper |
| Secret Handshakes from CA-Oblivious Encryption | 2005-08-12 | Paper |
| scientific article; zbMATH DE number 2102683 (Why is no real title available?) | 2004-09-24 | Paper |
How to construct optimal one-time signatures. Computer Networks | 2004-03-14 | Paper |
| scientific article; zbMATH DE number 1962151 (Why is no real title available?) | 2003-08-10 | Paper |
| scientific article; zbMATH DE number 1952888 (Why is no real title available?) | 2003-07-24 | Paper |
| scientific article; zbMATH DE number 1759783 (Why is no real title available?) | 2002-10-07 | Paper |
| scientific article; zbMATH DE number 1690177 (Why is no real title available?) | 2002-01-14 | Paper |
Flooding for reliable multicast in multi-hop ad hoc networks Wireless Networks | 2002-01-14 | Paper |
| scientific article; zbMATH DE number 1408383 (Why is no real title available?) | 2000-05-28 | Paper |
| scientific article; zbMATH DE number 1305483 (Why is no real title available?) | 1999-09-15 | Paper |
| scientific article; zbMATH DE number 4195144 (Why is no real title available?) | 1991-01-01 | Paper |