Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

4 results
Keywords : Applied cryptography
Image document

Practical Immutable Signature Bouquets (PISB) for Authentication and Integrity in Outsourced Databases

Attila A. Yavuz
27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.179-194, ⟨10.1007/978-3-642-39256-6_12⟩
Conference papers hal-01490704v1
Image document

Verifiable Hierarchical Key Assignment Schemes

Anna Lisa Ferrara , Federica Paci , Chiara Ricciardi
35th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2021, Calgary, AB, Canada. pp.357-376, ⟨10.1007/978-3-030-81242-3_21⟩
Conference papers hal-03677042v1
Image document

Multi-party Private Set Operations with an External Decider

Sara Ramezanian , Tommi Meskanen , Valtteri Niemi
35th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2021, Calgary, AB, Canada. pp.117-135, ⟨10.1007/978-3-030-81242-3_7⟩
Conference papers hal-03677026v1
Image document

AQoPA: Automated Quality of Protection Analysis Framework for Complex Systems

Damian Rusinek , Bogdan Ksiezopolski , Adam Wierzbicki
14th Computer Information Systems and Industrial Management (CISIM), Sep 2015, Warsaw, Poland. pp.475-486, ⟨10.1007/978-3-319-24369-6_39⟩
Conference papers hal-01444489v1