Search

Your search keyword '"Stephan Krenn"' showing total 62 results

Search Constraints

Start Over You searched for: Author "Stephan Krenn" Remove constraint Author: "Stephan Krenn" Language undetermined Remove constraint Language: undetermined
62 results on '"Stephan Krenn"'

Search Results

12. KRAKEN

15. KRAKEN: A Secure, Trusted, Regulatory-Compliant, and Privacy-Preserving Data Sharing Platform

18. On the Security of Offloading Post-Processing for Quantum Key Distribution

19. Privacy-Preserving Analytics for Data Markets Using MPC

20. Privacy-Preserving Incentive Systems with Highly Efficient Point-Collection

21. Fully invisible protean signatures schemes

22. Privacy and Identity Management. Data for Better Living: AI and Privacy

23. Towards Privacy in Geographic Message Dissemination for Connected Vehicles

24. Practical Group-Signatures with Privacy-Friendly Openings

25. Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data

26. iUC: Flexible Universal Composability Made Simple

27. Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications

28. Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications

29. Protean Signature Schemes

30. Towards Attribute-Based Credentials in the Cloud

31. Batch-verifiable Secret Sharing with Unconditional Privacy

32. Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures

33. Malicious Clients in Distributed Secret Sharing Based Storage Networks

34. Chameleon-Hashes with Ephemeral Trapdoors

35. A counterexample to the chain rule for conditional HILL entropy

36. CREDENTIAL: A Framework for Privacy-Preserving Cloud-Based Data Sharing

37. Opportunities and Challenges of CREDENTIAL

38. Universal Composition with Responsive Environments

39. Signer-Anonymous Designated-Verifier Redactable Signatures for Cloud-Based Data Sharing

40. Efficient zero-knowledge proofs for commitments from learning with errors over rings

41. Recovering Lost Device-Bound Credentials

42. An Architecture for Privacy-ABCs

43. Cryptographic Protocols Underlying Privacy-ABCs

44. Learning with Rounding, Revisited

46. A Counterexample to the Chain Rule for Conditional HILL Entropy

48. cPLC — A cryptographic programming language and compiler

49. Cache games - Bringing access-based cache attacks on AES to practice

50. A Framework for Practical Universally Composable Zero-Knowledge Protocols

Catalog

Books, media, physical & digital resources