Search results for: Giuseppe Ateniese
IEEE Transactions on Information Forensics and Security > 2017 > 12 > 4 > 767 - 778
Future Generation Computer Systems > 2016 > 62 > C > 104-118
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Identity-Based Cryptography > 288-306
Lecture Notes in Computer Science > Security in Communication Networks > Authentication and Identification > 165-179
Lecture Notes in Computer Science > Topics in Cryptology – CT-RSA 2009 > Privacy and Anonymity > 279-294
Lecture Notes in Computer Science > Advances in Cryptology – ASIACRYPT 2009 > Cryptographic Protocols > 319-333
Lecture Notes in Computer Science > Topics in Cryptology — CT-RSA 2002 > E-Commerce and Applications > 182-199
Lecture Notes in Computer Science > Topics in Cryptology – CT-RSA 2009 > Identity-Based Encryption > 32-47
Lecture Notes in Computer Science > Cryptology and Network Security > Firewalls, Denial of Service and DNS Security > 288-303
Lecture Notes in Computer Science > Advances in Cryptology - ASIACRYPT 2003 > Group Signatures > 246-268
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO 2000 > Digital Signatures > 255-270