Accountable certificate management using undeniable attestations
Proceedings of the 7th ACM conference on Computer and communications security
A two-level time-stamping system
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
Eliminating counterevidence with applications to accountable certificate management
Journal of Computer Security
Auditable, Anonymous Electronic Cash Extended Abstract
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Blind, Auditable Membership Proofs
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
Configurable Security Protocols for Multi-party Data Analysis with Malicious Participants
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents
International Journal of Security and Networks
Proceedings of the 15th ACM conference on Computer and communications security
A new dynamic accumulator for batch updates
ICICS'07 Proceedings of the 9th international conference on Information and communications security
Algebraic construction for zero-knowledge sets
Journal of Computer Science and Technology
Resource requirement analysis for a predictive-hashing based multicast authentication protocol
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
Verified query results from hybrid authentication trees
DBSec'05 Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security
Secure accumulators from euclidean rings without trusted setup
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
Hi-index | 0.01 |