Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Azam Soleimanian"'
Publikováno v:
Journal of Computer Security. 30:3-38
A double-authentication preventing signature (DAPS) scheme is a digital signature scheme equipped with a self-enforcement mechanism. Messages consist of an address and a payload component, and a signer is penalized if she signs two messages with the
Autor:
Azam Soleimanian
Publikováno v:
Cryptology and Network Security ISBN: 9783031209734
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::75a8fa0d6f090fd4dd07b60e9b993880
https://doi.org/10.1007/978-3-031-20974-1_15
https://doi.org/10.1007/978-3-031-20974-1_15
Autor:
Florian Bourse, David Pointcheval, Michel Abdalla, Hugo Marival, Hendrik Waldner, Azam Soleimanian
Publikováno v:
SCN 2020-12th International Conference Security and Cryptography for Networks.
SCN 2020-12th International Conference Security and Cryptography for Networks., Sep 2020, Amalfi / Virtual, Italy. pp.525-545, ⟨10.1007/978-3-030-57990-6_26⟩
Lecture Notes in Computer Science ISBN: 9783030579890
SCN
SCN 2020-12th International Conference Security and Cryptography for Networks., Sep 2020, Amalfi / Virtual, Italy. pp.525-545, ⟨10.1007/978-3-030-57990-6_26⟩
Lecture Notes in Computer Science ISBN: 9783030579890
SCN
International audience; Multi-client functional encryption (MCFE) is an extension of functional encryption (FE) in which the decryption procedure involves ciphertexts from multiple parties. It is particularly useful in the context of data outsourcing
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::65d29ee792022cf63b0975bfbd476235
https://hal.inria.fr/hal-02948657/file/2020-788.pdf
https://hal.inria.fr/hal-02948657/file/2020-788.pdf
Publikováno v:
SCN 2020-12th International Conference Security and Cryptography for Networks
SCN 2020-12th International Conference Security and Cryptography for Networks, Sep 2020, Amalfi / Virtual, Italy. pp.338-358
Lecture Notes in Computer Science ISBN: 9783030579890
SCN
SCN 2020-12th International Conference Security and Cryptography for Networks, Sep 2020, Amalfi / Virtual, Italy. pp.338-358
Lecture Notes in Computer Science ISBN: 9783030579890
SCN
International audience; A double-authentication preventing signature (DAPS) scheme is a digital signature scheme equipped with a self-enforcement mechanism. Messages consist of an address and a payload component, and a signer is penalized if she sign
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::8f61cd7a06ea2f008edd2021b3eeefc6
https://hal.inria.fr/hal-03066338
https://hal.inria.fr/hal-03066338
Autor:
Shahram Khazaei, Azam Soleimanian
Publikováno v:
Designs, Codes and Cryptography. 87:123-147
Public verifiability is an interesting feature that cryptographic protocols, such as those used in cloud computing applications, may support. By public verifiability, the client can delegate the verification process to a third party auditor without r
Publikováno v:
Topics in Cryptology – CT-RSA 2019-The Cryptographers Track at the RSA Conference 2019, San Francisco, CA, USA, March 4–8, 2019, Proceedings
Topics in Cryptology – CT-RSA 2019-The Cryptographers' Track at the RSA Conference 2019, San Francisco, CA, USA, March 4–8, 2019, Proceedings
Topics in Cryptology – CT-RSA 2019
Topics in Cryptology – CT-RSA 2019, Mar 2019, San Francisco, United States. pp.127-148, ⟨10.1007/978-3-030-12612-4_7⟩
Topics in Cryptology – CT-RSA 2019 ISBN: 9783030126117
CT-RSA
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Topics in Cryptology – CT-RSA 2019
Topics in Cryptology – CT-RSA 2019-The Cryptographers' Track at the RSA Conference 2019, San Francisco, CA, USA, March 4–8, 2019, Proceedings
Topics in Cryptology – CT-RSA 2019
Topics in Cryptology – CT-RSA 2019, Mar 2019, San Francisco, United States. pp.127-148, ⟨10.1007/978-3-030-12612-4_7⟩
Topics in Cryptology – CT-RSA 2019 ISBN: 9783030126117
CT-RSA
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Topics in Cryptology – CT-RSA 2019
We construct functional encryption (FE) schemes for the orthogonality (OFE) relation where each ciphertext encrypts some vector x and each decryption key, associated to some vector y, allows to determineif x isorthogonalto y ornot. Motivated by compe
Publikováno v:
European Journal of Operational Research. 228:337-344
The robust optimization methodology is known as a popular method dealing with optimization problems with uncertain data and hard constraints. This methodology has been applied so far to various convex conic optimization problems where only their ineq
Autor:
Michel Abdalla, Florian Bourse, Hugo Marival, David Pointcheval, Azam Soleimanian, Hendrik Waldner
Accepted paper for the 12TH CONFERENCE ON SECURITY AND CRYPTOGRAPHY FOR NETWORKS [Abstract] Multi-client Functional Encryption(MCFE) is an extension ofFunctional Encryption(FE) in which the decryption procedure involves ciphertexts from multiple part
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5b736cf5a7602850974baff30507c953