Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Gergely Alpár
@article{DBLP:journals/compsec/LueksAHV17, author = {Wouter Lueks and Gergely Alp{\'{a}}r and Jaap{-}Henk Hoepman and Pim Vullers}, title = {Fast revocation of attribute-based credentials for both users and verifiers}, journal = {Comput. Secur.}, volume = {67}, pages = {308--323}, year = {2017}, url = {https://doi.org/10.1016/j.cose.2016.11.018}, doi = {10.1016/J.COSE.2016.11.018}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LueksAHV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pac/HampiholiA17, author = {Brinda Hampiholi and Gergely Alp{\'{a}}r}, title = {Privacy-Preserving Webshopping with Attributes}, booktitle = {{IEEE} Symposium on Privacy-Aware Computing, {PAC} 2017, Washington, DC, USA, August 1-4, 2017}, pages = {25--36}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.ieeecomputersociety.org/10.1109/PAC.2017.34}, doi = {10.1109/PAC.2017.34}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pac/HampiholiA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cd/AlparBBMKGN16, author = {Gergely Alp{\'{a}}r and Lejla Batina and Lynn Margaret Batten and Veelasha Moonsamy and Anna Krasnova and Antoine Guellier and Iynkaran Natgunanathan}, editor = {Gianluca Palermo and John Feo}, title = {New directions in IoT privacy using attribute-based authentication}, booktitle = {Proceedings of the {ACM} International Conference on Computing Frontiers, CF'16, Como, Italy, May 16-19, 2016}, pages = {461--466}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2903150.2911710}, doi = {10.1145/2903150.2911710}, timestamp = {Tue, 06 Nov 2018 11:07:33 +0100}, biburl = {https://dblp.org/rec/conf/cd/AlparBBMKGN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/LueksAHV15, author = {Wouter Lueks and Gergely Alp{\'{a}}r and Jaap{-}Henk Hoepman and Pim Vullers}, editor = {Hannes Federrath and Dieter Gollmann}, title = {Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers}, booktitle = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11 International Conference, {SEC} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {455}, pages = {463--478}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18467-8\_31}, doi = {10.1007/978-3-319-18467-8\_31}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/LueksAHV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/space/HampiholiAB015, author = {Brinda Hampiholi and Gergely Alp{\'{a}}r and Fabian van den Broek and Bart Jacobs}, editor = {Rajat Subhra Chakraborty and Peter Schwabe and Jon A. Solworth}, title = {Towards Practical Attribute-Based Signatures}, booktitle = {Security, Privacy, and Applied Cryptography Engineering - 5th International Conference, {SPACE} 2015, Jaipur, India, October 3-7, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9354}, pages = {310--328}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24126-5\_18}, doi = {10.1007/978-3-319-24126-5\_18}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/space/HampiholiAB015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LueksAHV15, author = {Wouter Lueks and Gergely Alp{\'{a}}r and Jaap{-}Henk Hoepman and Pim Vullers}, title = {Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {237}, year = {2015}, url = {http://eprint.iacr.org/2015/237}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LueksAHV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dim/AlparH13, author = {Gergely Alp{\'{a}}r and Jaap{-}Henk Hoepman}, editor = {Thomas Gro{\ss} and Marit Hansen}, title = {A secure channel for attribute-based credentials: [short paper]}, booktitle = {DIM'13, Proceedings of the 2013 {ACM} Workshop on Digital Identity Management, Berlin, Germany, November 8, 2013}, pages = {13--18}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517881.2517884}, doi = {10.1145/2517881.2517884}, timestamp = {Tue, 12 Feb 2019 16:55:52 +0100}, biburl = {https://dblp.org/rec/conf/dim/AlparH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/idman/AlparJ13, author = {Gergely Alp{\'{a}}r and Bart Jacobs}, editor = {Simone Fischer{-}H{\"{u}}bner and Elisabeth de Leeuw and Chris J. Mitchell}, title = {Towards Practical Attribute-Based Identity Management: The {IRMA} Trajectory}, booktitle = {Policies and Research in Identity Management - Third {IFIP} {WG} 11.6 Working Conference, {IDMAN} 2013, London, UK, April 8-9, 2013. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {396}, pages = {1--3}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-37282-7\_1}, doi = {10.1007/978-3-642-37282-7\_1}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/idman/AlparJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/idman/VullersA13, author = {Pim Vullers and Gergely Alp{\'{a}}r}, editor = {Simone Fischer{-}H{\"{u}}bner and Elisabeth de Leeuw and Chris J. Mitchell}, title = {Efficient Selective Disclosure on Smart Cards Using Idemix}, booktitle = {Policies and Research in Identity Management - Third {IFIP} {WG} 11.6 Working Conference, {IDMAN} 2013, London, UK, April 8-9, 2013. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {396}, pages = {53--67}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-37282-7\_5}, doi = {10.1007/978-3-642-37282-7\_5}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/idman/VullersA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/primelife/AlparE13, author = {Gergely Alp{\'{a}}r and Maarten H. Everts}, editor = {Marit Hansen and Jaap{-}Henk Hoepman and Ronald E. Leenes and Diane Whitehouse}, title = {Mobile Devices to the Identity Rescue}, booktitle = {Privacy and Identity Management for Emerging Services and Technologies - 8th {IFIP} {WG} 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {421}, pages = {237--247}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-55137-6\_19}, doi = {10.1007/978-3-642-55137-6\_19}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/primelife/AlparE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlparHL13, author = {Gergely Alp{\'{a}}r and Jaap{-}Henk Hoepman and Wouter Lueks}, title = {An Attack Against Fixed Value Discrete Logarithm Representations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {120}, year = {2013}, url = {http://eprint.iacr.org/2013/120}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlparHL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmb/AlparBV12, author = {Gergely Alp{\'{a}}r and Lejla Batina and Roel Verdult}, editor = {Jens B. Schmitt}, title = {Using {NFC} Phones for Proving Credentials}, booktitle = {Measurement, Modelling, and Evaluation of Computing Systems and Dependability and Fault Tolerance - 16th International {GI/ITG} Conference, {MMB} {\&} {DFT} 2012, Kaiserslautern, Germany, March 19-21, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7201}, pages = {317--330}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28540-0\_26}, doi = {10.1007/978-3-642-28540-0\_26}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/mmb/AlparBV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rfidsec/AlparBL12, author = {Gergely Alp{\'{a}}r and Lejla Batina and Wouter Lueks}, editor = {Jaap{-}Henk Hoepman and Ingrid Verbauwhede}, title = {Designated Attribute-Based Proofs for {RFID} Applications}, booktitle = {Radio Frequency Identification. Security and Privacy Issues - 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7739}, pages = {59--75}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-36140-1\_5}, doi = {10.1007/978-3-642-36140-1\_5}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/rfidsec/AlparBL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/primelife/AlparH11, author = {Gergely Alp{\'{a}}r and Jaap{-}Henk Hoepman}, editor = {Jan Camenisch and Bruno Crispo and Simone Fischer{-}H{\"{u}}bner and Ronald Leenes and Giovanni Russello}, title = {Avoiding Man-in-the-Middle Attacks When Verifying Public Terminals}, booktitle = {Privacy and Identity Management for Life - 7th {IFIP} {WG} 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Trento, Italy, September 5-9, 2011, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {375}, pages = {261--273}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31668-5\_20}, doi = {10.1007/978-3-642-31668-5\_20}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/primelife/AlparH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1101-0427, author = {Gergely Alp{\'{a}}r and Jaap{-}Henk Hoepman and Johanneke Siljee}, title = {The Identity Crisis. Security, Privacy and Usability Issues in Identity Management}, journal = {CoRR}, volume = {abs/1101.0427}, year = {2011}, url = {http://arxiv.org/abs/1101.0427}, eprinttype = {arXiv}, eprint = {1101.0427}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1101-0427.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.