Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/pkc/pkc2009.bht:"
@inproceedings{DBLP:conf/pkc/AbdallaBCP09, author = {Michel Abdalla and Xavier Boyen and C{\'{e}}line Chevalier and David Pointcheval}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {Distributed Public-Key Cryptography from Weak Secrets}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {139--159}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_9}, doi = {10.1007/978-3-642-00468-1\_9}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AbdallaBCP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AbeKO09, author = {Masayuki Abe and Eike Kiltz and Tatsuaki Okamoto}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {Compact CCA-Secure Encryption for Messages of Arbitrary Length}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {377--392}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_21}, doi = {10.1007/978-3-642-00468-1\_21}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AbeKO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AkiyamaGM09, author = {Koichiro Akiyama and Yasuhiro Goto and Hideyuki Miyake}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {An Algebraic Surface Cryptosystem}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {425--442}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_24}, doi = {10.1007/978-3-642-00468-1\_24}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AkiyamaGM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Aono09, author = {Yoshinori Aono}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {A New Lattice Construction for Partial Key Exposure Attack for {RSA}}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {34--53}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_3}, doi = {10.1007/978-3-642-00468-1\_3}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Aono09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BonehFKW09, author = {Dan Boneh and David Mandell Freeman and Jonathan Katz and Brent Waters}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {Signing a Linear Subspace: Signature Schemes for Network Coding}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {68--87}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_5}, doi = {10.1007/978-3-642-00468-1\_5}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BonehFKW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BrzuskaFFLPSSV09, author = {Christina Brzuska and Marc Fischlin and Tobias Freudenreich and Anja Lehmann and Marcus Page and Jakob Schelbert and Dominique Schr{\"{o}}der and Florian Volk}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {Security of Sanitizable Signatures Revisited}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {317--336}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_18}, doi = {10.1007/978-3-642-00468-1\_18}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/BrzuskaFFLPSSV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CamenischKRS09, author = {Jan Camenisch and Markulf Kohlweiss and Alfredo Rial and Caroline Sheedy}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {196--214}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_12}, doi = {10.1007/978-3-642-00468-1\_12}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CamenischKRS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CamenischKS09, author = {Jan Camenisch and Markulf Kohlweiss and Claudio Soriente}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {481--500}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_27}, doi = {10.1007/978-3-642-00468-1\_27}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/CamenischKS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Chow09, author = {Sherman S. M. Chow}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {Removing Escrow from Identity-Based Encryption}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {256--276}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_15}, doi = {10.1007/978-3-642-00468-1\_15}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/Chow09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CoullGH09, author = {Scott E. Coull and Matthew Green and Susan Hohenberger}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {501--520}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_28}, doi = {10.1007/978-3-642-00468-1\_28}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CoullGH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DamgardGKN09, author = {Ivan Damg{\aa}rd and Martin Geisler and Mikkel Kr{\o}igaard and Jesper Buus Nielsen}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {Asynchronous Multiparty Computation: Theory and Implementation}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {160--179}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_10}, doi = {10.1007/978-3-642-00468-1\_10}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DamgardGKN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DamgardM09, author = {Ivan Damg{\aa}rd and Gert L{\ae}ss{\o}e Mikkelsen}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {On the Theory and Practice of Personal Digital Signatures}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {277--296}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_16}, doi = {10.1007/978-3-642-00468-1\_16}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DamgardM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FischlinS09, author = {Marc Fischlin and Dominique Schr{\"{o}}der}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {Security of Blind Signatures under Aborts}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {297--316}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_17}, doi = {10.1007/978-3-642-00468-1\_17}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/FischlinS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GhodosiP09, author = {Hossein Ghodosi and Josef Pieprzyk}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {Multi-Party Computation with Omnipresent Adversary}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {180--195}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_11}, doi = {10.1007/978-3-642-00468-1\_11}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GhodosiP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GorantlaBN09, author = {M. Choudary Gorantla and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {105--123}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_7}, doi = {10.1007/978-3-642-00468-1\_7}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GorantlaBN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HerrmannL09, author = {Mathias Herrmann and Gregor Leander}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {A Practical Key Recovery Attack on Basic TCHo}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {411--424}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_23}, doi = {10.1007/978-3-642-00468-1\_23}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HerrmannL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HooghSSV09, author = {Sebastiaan de Hoogh and Berry Schoenmakers and Boris Skoric and Jos{\'{e}} Villegas}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {Verifiable Rotation of Homomorphic Encryptions}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {393--410}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_22}, doi = {10.1007/978-3-642-00468-1\_22}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HooghSSV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/JunodKL09, author = {Pascal Junod and Alexandre Karlov and Arjen K. Lenstra}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {Improving the Boneh-Franklin Traitor Tracing Scheme}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {88--104}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_6}, doi = {10.1007/978-3-642-00468-1\_6}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/JunodKL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KiayiasZ09, author = {Aggelos Kiayias and Hong{-}Sheng Zhou}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {Zero-Knowledge Proofs with Witness Elimination}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {124--138}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_8}, doi = {10.1007/978-3-642-00468-1\_8}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KiayiasZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KimCH09, author = {Minkyu Kim and Jung Hee Cheon and Jin Hong}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {Subset-Restricted Random Walks for Pollard rho Method on F\({}_{\mbox{p\({}^{\mbox{m}}\)}}\)}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {54--67}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_4}, doi = {10.1007/978-3-642-00468-1\_4}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KimCH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LibertV09, author = {Beno{\^{\i}}t Libert and Damien Vergnaud}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {Towards Black-Box Accountable Authority {IBE} with Short Ciphertexts and Private Keys}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {235--255}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_14}, doi = {10.1007/978-3-642-00468-1\_14}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/LibertV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LongaG09, author = {Patrick Longa and Catherine H. Gebotys}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {Fast Multibase Methods and Other Several Optimizations for Elliptic Curve Scalar Multiplication}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {443--462}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_25}, doi = {10.1007/978-3-642-00468-1\_25}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LongaG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Matt09, author = {Brian J. Matt}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {Identification of Multiple Invalid Signatures in Pairing-Based Batched Signatures}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {337--356}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_19}, doi = {10.1007/978-3-642-00468-1\_19}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Matt09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/MayR09, author = {Alexander May and Maike Ritzenhofen}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {Implicit Factoring: On Polynomial Time Factoring Given Only an Implicit Hint}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {1--14}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_1}, doi = {10.1007/978-3-642-00468-1\_1}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/MayR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/MorilloR09, author = {Paz Morillo and Carla R{\`{a}}fols}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {The Security of All Bits Using List Decoding}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {15--33}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_2}, doi = {10.1007/978-3-642-00468-1\_2}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/MorilloR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/NakanishiFHF09, author = {Toru Nakanishi and Hiroki Fujii and Yuta Hira and Nobuo Funabiki}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {Revocable Group Signature Schemes with Constant Costs for Signing and Verifying}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {463--480}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_26}, doi = {10.1007/978-3-642-00468-1\_26}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/NakanishiFHF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/SeoKOS09, author = {Jae Hong Seo and Tetsutaro Kobayashi and Miyako Ohkubo and Koutarou Suzuki}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {215--234}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_13}, doi = {10.1007/978-3-642-00468-1\_13}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/SeoKOS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ShaoC09, author = {Jun Shao and Zhenfu Cao}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {CCA-Secure Proxy Re-encryption without Pairings}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {357--376}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_20}, doi = {10.1007/978-3-642-00468-1\_20}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ShaoC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2009, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1}, doi = {10.1007/978-3-642-00468-1}, isbn = {978-3-642-00467-4}, timestamp = {Fri, 01 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.