Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Anna Lauks"'
Publikováno v:
Computer Security – ESORICS 2020 ISBN: 9783030589509
ESORICS (1)
ESORICS (1)
The main real impact of the GDPR regulation of the EU should be improving the protection of data concerning physical persons. The sharp GDPR rules have to create a controllable information environment, and to prevent misuse of personal data. The gene
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ca28ec509930bf3162841011fc4e86bc
https://doi.org/10.1007/978-3-030-58951-6_36
https://doi.org/10.1007/978-3-030-58951-6_36
Autor:
Anna Lauks, Magdalena Gebala, Daliborka Jambrec, Malte Kokoschka, Wolfgang Schuhmann, Raoudha Haddad
Publikováno v:
ChemPlusChem. 81:604-612
Quantum mechanical SCS(MI)-MP2/cc-pVTZ calculations predict the strength of proflavine, ellipticine and 1-pyrenemethylamine intercalation into single-stranded (ss) and double-stranded (ds) DNA. The results were compared with experimental results obta
Publikováno v:
Computing. 85:137-151
Group signature schemes enable to create digital signatures such that the signers are hidden in a group of potential signers. However, in a case of need it is possible to reveal the actual signer either by a group administrator or collectively by the
Publikováno v:
Information, Security and Cryptology – ICISC 2009 ISBN: 9783642144226
ICISC
ICISC
In this paper, we present a new class of attacks against an anonymous communication protocol, originally presented in ACNS 2008. The protocol itself was proposed as an improved version of ModOnions, which uses universal re-encryption in order to avoi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a1a7a602c85dfda4989d5b9784141ab9
https://doi.org/10.1007/978-3-642-14423-3_18
https://doi.org/10.1007/978-3-642-14423-3_18
Publikováno v:
KSII Transactions on Internet and Information Systems.
In this paper, we present a new class of attacks against an anonymous communication protocol, originally presented in ACNS 2008. The protocol itself was proposed as an improved version of ModOnions, which exploits universal re-encryption in order to
Publikováno v:
Business Information Systems Workshops ISBN: 9783642154010
BIS (Workshops)
BIS (Workshops)
We present an approach different from the classical framework of qualified electronic signatures that seem to offer much better properties regarding usability, costs, risk level as well as security in technical sense. Our approach is based on mediate
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ec14059e81332570ce117e65cb67c17f
https://doi.org/10.1007/978-3-642-15402-7_36
https://doi.org/10.1007/978-3-642-15402-7_36
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783540852377
MFCS
MFCS
We propose a version of ring signatures for which the set of potential signers may be reduced: the real signer can prove that he or she has created the signature, while every other member of the ring can prove not to be the signer. Possibility to run
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8a8a62ae463e487deb2b45bd8ce4a2d7
https://doi.org/10.1007/978-3-540-85238-4_35
https://doi.org/10.1007/978-3-540-85238-4_35
Publikováno v:
Applied Cryptography and Network Security ISBN: 9783540689133
ACNS
ACNS
This paper is devoted to ModOnions - an anonymous communication protocol, for which a message is encoded as a set of onions and sent through intermediate nodes so that each node knows only its predecessor and its successor on the routing path. Moreov
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5efdafd2afb6c8a87718c167f67d1342
https://doi.org/10.1007/978-3-540-68914-0_18
https://doi.org/10.1007/978-3-540-68914-0_18
Autor:
Marek Klonowski, Anna Lauks
Publikováno v:
Information Security and Cryptology – ICISC 2006 ISBN: 9783540491125
ICISC
ICISC
Sanitizable signatures introduced by Ateniese et al. is a powerful and fairly practical tool that enables an authorised party called the censor to modify designated parts of a signed message in an arbitrary way without interacting with the signer. In
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e62397e0417487d93c9bbe50ef86e3bc
https://doi.org/10.1007/11927587_28
https://doi.org/10.1007/11927587_28
Publikováno v:
Trust and Privacy in Digital Business ISBN: 9783540377504
TrustBus
TrustBus
Many attempts to controlling who and under which circumstances can verify our signatures have been made so far. For this purpose one can use undeniable signatures, designated confirmer signatures or designated verifier signatures. We introduce a mode
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c1e0a5b1a26c9dc2086d85bb0576ae21
https://doi.org/10.1007/11824633_20
https://doi.org/10.1007/11824633_20