default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 26 matches
- 2018
- Giuseppe Ateniese, Aggelos Kiayias, Bernardo Magri, Yiannis Tselekounis, Daniele Venturi:
Secure Outsourcing of Cryptographic Circuits Manufacturing. ProvSec 2018: 75-93 - Nuttapong Attrapadung, Goichiro Hanaoka, Takato Hirano, Yutaka Kawai, Yoshihiro Koseki, Jacob C. N. Schuldt:
Token-Based Multi-input Functional Encryption. ProvSec 2018: 147-164 - José Becerra, Dimiter Ostrev, Marjan Skrobot:
Forward Secrecy of SPAKE2. ProvSec 2018: 366-384 - Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Håvard Raddum, Mohsen Toorani:
Security Notions for Cloud Storage and Deduplication. ProvSec 2018: 347-365 - Pedro Branco, Paulo Mateus:
A Code-Based Linkable Ring Signature Scheme. ProvSec 2018: 203-219 - Sanjit Chatterjee, R. Kabaleeshwaran:
Towards Static Assumption Based Cryptosystem in Pairing Setting: Further Applications of DéjàQ and Dual-Form Signature (Extended Abstract). ProvSec 2018: 220-238 - David Derler, Sebastian Ramacher, Daniel Slamanig:
Generic Double-Authentication Preventing Signatures and a Post-quantum Instantiation. ProvSec 2018: 258-276 - Aurélien Dupin, Jean-Marc Robert, Christophe Bidan:
Location-Proof System Based on Secure Multi-party Computations. ProvSec 2018: 22-39 - Aurélien Dupin, David Pointcheval, Christophe Bidan:
On the Leakage of Corrupted Garbled Circuits. ProvSec 2018: 3-21 - Atsushi Fujioka, Kazuki Yoneyama:
Single Private-Key Generator Security Implies Multiple Private-Key Generators Security. ProvSec 2018: 56-74 - Britta Hale:
User-Mediated Authentication Protocols and Unforgeability in Key Collision. ProvSec 2018: 387-396 - Leon J. Helsloot, Gamze Tillem, Zekeriya Erkin:
BAdASS: Preserving Privacy in Behavioural Advertising with Applied Secret Sharing. ProvSec 2018: 397-405 - Ryo Hiromasa:
Digital Signatures from the Middle-Product LWE. ProvSec 2018: 239-257 - Arinjita Paul, Varshika Srinivasavaradhan, S. Sharmila Deva Selvi, C. Pandu Rangan:
A CCA-Secure Collusion-Resistant Identity-Based Proxy Re-Encryption Scheme. ProvSec 2018: 111-128 - Edoardo Persichetti:
On the CCA2 Security of McEliece in the Standard Model. ProvSec 2018: 165-181 - Shingo Sato, Shoichi Hirose, Junji Shikata:
Generic Construction of Sequential Aggregate MACs from Any MACs. ProvSec 2018: 295-312 - Shingo Sato, Junji Shikata:
Signcryption with Quantum Random Oracles. ProvSec 2018: 406-414 - Georgia Tsaloli, Bei Liang, Aikaterini Mitrokotsa:
Verifiable Homomorphic Secret Sharing. ProvSec 2018: 40-55 - Shengmin Xu, Guomin Yang, Yi Mu, Ximeng Liu:
Efficient Attribute-Based Encryption with Blackbox Traceability. ProvSec 2018: 182-200 - Zheng Yang, Kimmo Järvinen:
Modeling Privacy in WiFi Fingerprinting Indoor Localization. ProvSec 2018: 329-346 - Takanori Yasuda:
Multivariate Encryption Schemes Based on the Constrained MQ Problem. ProvSec 2018: 129-146 - Satoshi Yasuda, Yoshihiro Koseki, Yusuke Sakai, Fuyuki Kitagawa, Yutaka Kawai, Goichiro Hanaoka:
Formal Treatment of Verifiable Privacy-Preserving Data-Aggregation Protocols. ProvSec 2018: 415-422 - Xiangyang Zhang, Yaobin Shen, Hailun Yan, Ying Zou, Ming Wan, Zheyi Wu, Lei Wang:
Length-Preserving Encryption Based on Single-Key Tweakable Block Cipher. ProvSec 2018: 313-326 - Shuoyao Zhao, Yu Yu, Jiang Zhang:
On the Hardness of Learning Parity with Noise over Rings. ProvSec 2018: 94-108 - Gongming Zhao, Miaomiao Tian:
A Simpler Construction of Identity-Based Ring Signatures from Lattices. ProvSec 2018: 277-291 - Joonsang Baek, Willy Susilo, Jongkil Kim:
Provable Security - 12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018, Proceedings. Lecture Notes in Computer Science 11192, Springer 2018, ISBN 978-3-030-01445-2 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-01-12 00:36 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint