A Lattice-Based Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ESORICS (25. : 2020 : Online) Computer Security – ESORICS 2020 ; Part 2
1. Verfasser: Liu, Wenling (VerfasserIn)
Weitere Verfasser: Liu, Zhen (VerfasserIn), Nguyen, Khoa (VerfasserIn), Yang, Guomin (VerfasserIn), Yu, Yu (VerfasserIn)
Pages:2020
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
When Is a Test Not a Proof? 2020 McMurtry, Eleanor
Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorohic Encryption 2020 Susilo, Willy
Semantic Definition of Anonymity in Identity-Based Encryption and Its Relation to Indistinguishability-Based Definition 2020 Hanaoka, Goichiro
Linear Attack on Round-Reduced DES Using Deep Learning 2020 Hou, Botao
Detection by Attack: Detecting Adversarial Samples by Undercover Attack 2020 Zhou, Qifei
An Optimizing Protocol Transformation for Constructor Finite Variant Theories in Maude-NPA 2020 Aparicio-Sánchez, Damián
On the Privacy Risks of Compromised Trigger-Action Platforms 2020 Chiang, Yu-Hsi
Certifying Decision Trees Against Evasion Attacks by Program Analysis 2020 Calzavara, Stefano
Understanding Object Detection Through an Adversarial Lens 2020 Chow, Ka-Ho
Evaluating the Effectiveness of Heuristic Worst-Case Noise Analysis in FHE 2020 Costache, Anamaria
How to Model the Bribery Attack: A Practical Quantification Method in Blockchain 2020 Sun, Hanyi
Securing DNSSEC Keys via Threshold ECDSA from Generic MPC 2020 Dalskov, Anders
On Private Information Retrieval Supporting Range Queries 2020 Hayata, Junichiro
Hardware Fingerprinting for the ARINC 429 Avionic Bus 2020 Gilboa-Markevich, Nimrod
Big Enough to Care Not Enough to Scare! Crawling to Attack Recommender Systems 2020 Aiolli, Fabio
Fooling Primality Tests on Smartcards 2020 Sedlacek, Vladimir
Active Re-identification Attacks on Periodically Released Dynamic Social Graphs 2020 Chen, Xihui
Post-Quantum Adaptor Signatures and Payment Channel Networks 2020 Esgin, Muhammed F.
PrivacyGuard: Enforcing Private Data Usage Control with Blockchain and Attested Off-Chain Contract Execution 2020 Xiao, Yang
Identity-Based Authenticated Encryption with Identity Confidentiality 2020 Zhao, Yunlei
Alle Artikel auflisten