258 results on '"Mark Manulis"'
Search Results
2. Fully Homomorphic Encryption Beyond IND-CCA1 Security: Integrity Through Verifiability.
3. FEASE: Fast and Expressive Asymmetric Searchable Encryption.
4. Generalised Asynchronous Remote Key Generation for Pairing-Based Cryptosystems.
5. Asynchronous Remote Key Generation for Post-Quantum Cryptosystems from Lattices.
6. Revocable Hierarchical Attribute-Based Signatures from Lattices.
7. ICT in Healthcare: the role of IoT and the SECANT solution.
8. Unlinkable Delegation of WebAuthn Credentials.
9. Distributed Asynchronous Remote Key Generation.
10. Fast SNARK-based Non-Interactive Distributed Verifiable Random Function with Ethereum Compatibility.
11. TAPESTRY: A De-Centralized Service for Trusted Interaction Online.
12. Biometric-Authenticated Searchable Encryption.
13. Asynchronous Remote Key Generation: An Analysis of Yubico's Proposal for W3C WebAuthn.
14. KYChain: user-controlled KYC data sharing and certification.
15. An Interoperable Architecture for Usable Password-Less Authentication.
16. Cyber security in New Space.
17. Password-authenticated searchable encryption.
18. Hierarchical Attribute-Based Signatures: Short Keys and Optimal Signature Length.
19. pRate: Anonymous Star Rating with Rating Secrecy.
20. Enhancing Security and Dependability of Industrial Networks with Opinion Dynamics.
21. Hierarchical Attribute-Based Signatures.
22. Bootstrapping Online Trust: Timeline Activity Proofs.
23. Password Authenticated Keyword Search.
24. Universally Composable Two-Server PAKE.
25. Blind Password Registration for Two-Server Password Authenticated Key Exchange and Secret Sharing Protocols.
26. Blind Password Registration for Verifier-based PAKE.
27. Public Key Encryption with Distributed Keyword Search.
28. Oblivious PAKE: Efficient Handling of Password Trials.
29. TAPESTRY: A Blockchain based Service for Trusted Interaction Online.
30. Securing Fleets of Consumer Drones at Low Cost.
31. Secure modular password authentication for the web using channel bindings.
32. Rerandomizable Threshold Blind Signatures.
33. Distributed Smooth Projective Hashing and Its Application to Two-Server Password Authenticated Key Exchange.
34. Formalising Human Recognition: a Fundamental Building Block for Security Proofs.
35. Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation.
36. A Modular Framework for Multi-Factor Authentication and Key Exchange.
37. Secure Modular Password Authentication for the Web Using Channel Bindings.
38. Zero-Knowledge Password Policy Checks and Verifier-Based PAKE.
39. Relations among Privacy Notions for Signcryption and Key Invisible 'Sign-then-Encrypt'.
40. Unique Aggregate Signatures with Applications to Distributed Verifiable Random Functions.
41. Pseudorandom signatures.
42. Fully Private Revocable Predicate Encryption.
43. Sufficient Condition for Ephemeral Key-Leakage Resilient Tripartite Key Exchange.
44. Publicly Verifiable Ciphertexts.
45. Forward-Secure Hierarchical Predicate Encryption.
46. Topology-Driven Secure Initialization in Wireless Sensor Networks: A Tool-Assisted Approach.
47. Non-interactive and Re-usable Universally Composable String Commitments with Adaptive Security.
48. UPBA: User-Authenticated Property-Based Attestation.
49. Private Discovery of Common Social Contacts.
50. Cryptographic Treatment of Private User Profiles.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.