BibTeX records: Gergely Alpár

download as .bib file

@article{DBLP:journals/compsec/LueksAHV17,
  author       = {Wouter Lueks and
                  Gergely Alp{\'{a}}r and
                  Jaap{-}Henk Hoepman and
                  Pim Vullers},
  title        = {Fast revocation of attribute-based credentials for both users and
                  verifiers},
  journal      = {Comput. Secur.},
  volume       = {67},
  pages        = {308--323},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.cose.2016.11.018},
  doi          = {10.1016/J.COSE.2016.11.018},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LueksAHV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pac/HampiholiA17,
  author       = {Brinda Hampiholi and
                  Gergely Alp{\'{a}}r},
  title        = {Privacy-Preserving Webshopping with Attributes},
  booktitle    = {{IEEE} Symposium on Privacy-Aware Computing, {PAC} 2017, Washington,
                  DC, USA, August 1-4, 2017},
  pages        = {25--36},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.ieeecomputersociety.org/10.1109/PAC.2017.34},
  doi          = {10.1109/PAC.2017.34},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pac/HampiholiA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cd/AlparBBMKGN16,
  author       = {Gergely Alp{\'{a}}r and
                  Lejla Batina and
                  Lynn Margaret Batten and
                  Veelasha Moonsamy and
                  Anna Krasnova and
                  Antoine Guellier and
                  Iynkaran Natgunanathan},
  editor       = {Gianluca Palermo and
                  John Feo},
  title        = {New directions in IoT privacy using attribute-based authentication},
  booktitle    = {Proceedings of the {ACM} International Conference on Computing Frontiers,
                  CF'16, Como, Italy, May 16-19, 2016},
  pages        = {461--466},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2903150.2911710},
  doi          = {10.1145/2903150.2911710},
  timestamp    = {Tue, 06 Nov 2018 11:07:33 +0100},
  biburl       = {https://dblp.org/rec/conf/cd/AlparBBMKGN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/LueksAHV15,
  author       = {Wouter Lueks and
                  Gergely Alp{\'{a}}r and
                  Jaap{-}Henk Hoepman and
                  Pim Vullers},
  editor       = {Hannes Federrath and
                  Dieter Gollmann},
  title        = {Fast Revocation of Attribute-Based Credentials for Both Users and
                  Verifiers},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11
                  International Conference, {SEC} 2015, Hamburg, Germany, May 26-28,
                  2015, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {455},
  pages        = {463--478},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18467-8\_31},
  doi          = {10.1007/978-3-319-18467-8\_31},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/LueksAHV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/space/HampiholiAB015,
  author       = {Brinda Hampiholi and
                  Gergely Alp{\'{a}}r and
                  Fabian van den Broek and
                  Bart Jacobs},
  editor       = {Rajat Subhra Chakraborty and
                  Peter Schwabe and
                  Jon A. Solworth},
  title        = {Towards Practical Attribute-Based Signatures},
  booktitle    = {Security, Privacy, and Applied Cryptography Engineering - 5th International
                  Conference, {SPACE} 2015, Jaipur, India, October 3-7, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9354},
  pages        = {310--328},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24126-5\_18},
  doi          = {10.1007/978-3-319-24126-5\_18},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/space/HampiholiAB015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LueksAHV15,
  author       = {Wouter Lueks and
                  Gergely Alp{\'{a}}r and
                  Jaap{-}Henk Hoepman and
                  Pim Vullers},
  title        = {Fast Revocation of Attribute-Based Credentials for Both Users and
                  Verifiers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {237},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/237},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LueksAHV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dim/AlparH13,
  author       = {Gergely Alp{\'{a}}r and
                  Jaap{-}Henk Hoepman},
  editor       = {Thomas Gro{\ss} and
                  Marit Hansen},
  title        = {A secure channel for attribute-based credentials: [short paper]},
  booktitle    = {DIM'13, Proceedings of the 2013 {ACM} Workshop on Digital Identity
                  Management, Berlin, Germany, November 8, 2013},
  pages        = {13--18},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2517881.2517884},
  doi          = {10.1145/2517881.2517884},
  timestamp    = {Tue, 12 Feb 2019 16:55:52 +0100},
  biburl       = {https://dblp.org/rec/conf/dim/AlparH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idman/AlparJ13,
  author       = {Gergely Alp{\'{a}}r and
                  Bart Jacobs},
  editor       = {Simone Fischer{-}H{\"{u}}bner and
                  Elisabeth de Leeuw and
                  Chris J. Mitchell},
  title        = {Towards Practical Attribute-Based Identity Management: The {IRMA}
                  Trajectory},
  booktitle    = {Policies and Research in Identity Management - Third {IFIP} {WG} 11.6
                  Working Conference, {IDMAN} 2013, London, UK, April 8-9, 2013. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {396},
  pages        = {1--3},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-37282-7\_1},
  doi          = {10.1007/978-3-642-37282-7\_1},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/idman/AlparJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idman/VullersA13,
  author       = {Pim Vullers and
                  Gergely Alp{\'{a}}r},
  editor       = {Simone Fischer{-}H{\"{u}}bner and
                  Elisabeth de Leeuw and
                  Chris J. Mitchell},
  title        = {Efficient Selective Disclosure on Smart Cards Using Idemix},
  booktitle    = {Policies and Research in Identity Management - Third {IFIP} {WG} 11.6
                  Working Conference, {IDMAN} 2013, London, UK, April 8-9, 2013. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {396},
  pages        = {53--67},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-37282-7\_5},
  doi          = {10.1007/978-3-642-37282-7\_5},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/idman/VullersA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/primelife/AlparE13,
  author       = {Gergely Alp{\'{a}}r and
                  Maarten H. Everts},
  editor       = {Marit Hansen and
                  Jaap{-}Henk Hoepman and
                  Ronald E. Leenes and
                  Diane Whitehouse},
  title        = {Mobile Devices to the Identity Rescue},
  booktitle    = {Privacy and Identity Management for Emerging Services and Technologies
                  - 8th {IFIP} {WG} 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer
                  School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected
                  Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {421},
  pages        = {237--247},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-55137-6\_19},
  doi          = {10.1007/978-3-642-55137-6\_19},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/primelife/AlparE13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlparHL13,
  author       = {Gergely Alp{\'{a}}r and
                  Jaap{-}Henk Hoepman and
                  Wouter Lueks},
  title        = {An Attack Against Fixed Value Discrete Logarithm Representations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {120},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/120},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlparHL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmb/AlparBV12,
  author       = {Gergely Alp{\'{a}}r and
                  Lejla Batina and
                  Roel Verdult},
  editor       = {Jens B. Schmitt},
  title        = {Using {NFC} Phones for Proving Credentials},
  booktitle    = {Measurement, Modelling, and Evaluation of Computing Systems and Dependability
                  and Fault Tolerance - 16th International {GI/ITG} Conference, {MMB}
                  {\&} {DFT} 2012, Kaiserslautern, Germany, March 19-21, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7201},
  pages        = {317--330},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28540-0\_26},
  doi          = {10.1007/978-3-642-28540-0\_26},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/mmb/AlparBV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/AlparBL12,
  author       = {Gergely Alp{\'{a}}r and
                  Lejla Batina and
                  Wouter Lueks},
  editor       = {Jaap{-}Henk Hoepman and
                  Ingrid Verbauwhede},
  title        = {Designated Attribute-Based Proofs for {RFID} Applications},
  booktitle    = {Radio Frequency Identification. Security and Privacy Issues - 8th
                  International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July
                  2-3, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7739},
  pages        = {59--75},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-36140-1\_5},
  doi          = {10.1007/978-3-642-36140-1\_5},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/rfidsec/AlparBL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/primelife/AlparH11,
  author       = {Gergely Alp{\'{a}}r and
                  Jaap{-}Henk Hoepman},
  editor       = {Jan Camenisch and
                  Bruno Crispo and
                  Simone Fischer{-}H{\"{u}}bner and
                  Ronald Leenes and
                  Giovanni Russello},
  title        = {Avoiding Man-in-the-Middle Attacks When Verifying Public Terminals},
  booktitle    = {Privacy and Identity Management for Life - 7th {IFIP} {WG} 9.2, 9.6/11.7,
                  11.4, 11.6/PrimeLife International Summer School, Trento, Italy, September
                  5-9, 2011, Revised Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {375},
  pages        = {261--273},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-31668-5\_20},
  doi          = {10.1007/978-3-642-31668-5\_20},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/primelife/AlparH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1101-0427,
  author       = {Gergely Alp{\'{a}}r and
                  Jaap{-}Henk Hoepman and
                  Johanneke Siljee},
  title        = {The Identity Crisis. Security, Privacy and Usability Issues in Identity
                  Management},
  journal      = {CoRR},
  volume       = {abs/1101.0427},
  year         = {2011},
  url          = {http://arxiv.org/abs/1101.0427},
  eprinttype    = {arXiv},
  eprint       = {1101.0427},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1101-0427.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics