Search results for: Susan Hohenberger
Lecture Notes in Computer Science > Privacy Enhancing Technologies > 6th Workshop on Privacy Enhancing Technologies > 277-294
Lecture Notes in Computer Science > Advances in Cryptology - CRYPTO 2009 > Cryptographers’ Toolbox > 654-670
Lecture Notes in Computer Science > Computing and Combinatorics > Computational Geometry II > 351-363
Lecture Notes in Computer Science > Security and Cryptography for Networks > Applied Authentication > 288-302
Lecture Notes in Computer Science > Advances in Cryptology - ASIACRYPT 2008 > Cryptographic Protocols II > 179-197
Lecture Notes in Computer Science > Security and Cryptography for Networks > Anonymity and E-Commerce > 141-155
Lecture Notes in Computer Science > Public Key Cryptography – PKC 2009 > Group Signatures and Anonymous Credentials > 501-520
Lecture Notes in Computer Science > Advances in Cryptology - EUROCRYPT 2009 > Cryptosystems (2) > 333-350
Lecture Notes in Computer Science > Topics in Cryptology – CT-RSA 2009 > Privacy and Anonymity > 279-294
Lecture Notes in Computer Science > Advances in Cryptology – ASIACRYPT 2007 > Multiparty Computation I > 265-282
Lecture Notes in Computer Science > Advances in Cryptology – EUROCRYPT 2010 > Foundational Primitives > 656-672
Lecture Notes in Computer Science > Advances in Cryptology – EUROCRYPT 2005 > Secure Protocols > 302-321
Lecture Notes in Computer Science > Topics in Cryptology – CT-RSA 2009 > Effciency Improvements > 309-324
IEEE Security & Privacy > 2015 > 13 > 2 > 22 - 29
Journal of Cryptology > 2015 > 28 > 2 > 351-395
2014 IEEE Symposium on Security and Privacy > 375 - 389