Author of the publication

Covert channels in privacy-preserving identification systems.

, , , and . ACM Conference on Computer and Communications Security, page 297-306. ACM, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hierarchical Identity Based Encryption with Constant Size Ciphertext., , and . EUROCRYPT, volume 3494 of Lecture Notes in Computer Science, page 440-456. Springer, (2005)Covert channels in privacy-preserving identification systems., , , and . ACM Conference on Computer and Communications Security, page 297-306. ACM, (2007)Secure Indexes.. IACR Cryptology ePrint Archive, (2003)Secure function evaluation with ordered binary decision diagrams., , , and . ACM Conference on Computer and Communications Security, page 410-420. ACM, (2006)The Design and Implementation of Protocol-Based Hidden Key Recovery., , , and . ISC, volume 2851 of Lecture Notes in Computer Science, page 165-179. Springer, (2003)Efficient Signature Schemes with Tight Reductions to the Diffie-Hellman Problems., , , and . J. Cryptology, 20 (4): 493-514 (2007)Evaluating 2-DNF Formulas on Ciphertexts., , and . TCC, volume 3378 of Lecture Notes in Computer Science, page 325-341. Springer, (2005)A Signature Scheme as Secure as the Diffie-Hellman Problem., and . EUROCRYPT, volume 2656 of Lecture Notes in Computer Science, page 401-415. Springer, (2003)SiRiUS: Securing Remote Untrusted Storage., , , and . NDSS, The Internet Society, (2003)On the effectiveness of address-space randomization., , , , , and . ACM Conference on Computer and Communications Security, page 298-307. ACM, (2004)