Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

14 results
Keywords : signatures
Image document

Optimal Parameters for XMSSMT

Andreas Hülsing , Lea Rausch , Johannes Buchmann
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.194-208
Conference papers hal-01506577v1
Image document

Expiration and Revocation of Keys for Attribute-Based Signatures

Stephen R. Tate , Roopa Vishwanathan
29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.153-169, ⟨10.1007/978-3-319-20810-7_10⟩
Conference papers hal-01745835v1
Image document

Digital Signatures: How Close Is Europe to Truly Interoperable Solutions?

Konstantinos Rantos
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.155-162, ⟨10.1007/978-3-642-24712-5_13⟩
Conference papers hal-01596183v1
Image document

Securing Location-Aware Services Based on Online/Offline Signatures in VANETs

Chul Sur , Youngho Park , Takashi Nishide , Kouichi Sakurai , Kyung Hyune Rhee
1st Availability, Reliability and Security (CD-ARES), Aug 2011, Vienna, Austria. pp.271-285, ⟨10.1007/978-3-642-23300-5_21⟩
Conference papers hal-01590395v1
Image document

Code-Based Identification and Signature Schemes in Software

Sidi Mohamed El Yousfi Alaoui , Pierre-Louis Cayrel , Rachid El Bansarkhani , Gerhard Hoffmann
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.122-136
Conference papers hal-00864936v1
Image document

That’s My DNA: Detecting Malicious Tampering of Synthesized DNA

Diptendu Mohan Kar , Indrajit Ray
33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.61-80, ⟨10.1007/978-3-030-22479-0_4⟩
Conference papers hal-02384604v1
Image document

Practical Immutable Signature Bouquets (PISB) for Authentication and Integrity in Outsourced Databases

Attila A. Yavuz
27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.179-194, ⟨10.1007/978-3-642-39256-6_12⟩
Conference papers hal-01490704v1
Image document

Privacy-Enhancing Proxy Signatures from Non-interactive Anonymous Credentials

David Derler , Christian Hanser , Daniel Slamanig
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.49-65, ⟨10.1007/978-3-662-43936-4_4⟩
Conference papers hal-01284842v1
Image document

Modular Architecture for Adaptable Signature-Creation Tools

Vesna Krnjic , Klaus Stranacher , Tobias Kellner , Andreas Fitzek
12th International Conference on Electronic Government (EGOV), Sep 2013, Koblenz, Germany. pp.274-285, ⟨10.1007/978-3-642-40358-3_23⟩
Conference papers hal-01490913v1
Image document

Benchmarking Cryptographic Schemes for Securing Public Cloud Storages

Stefan Contiu , Emmanuel Leblond , Laurent Réveillère
17th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2017, Neuchâtel, Switzerland. pp.163-176, ⟨10.1007/978-3-319-59665-5_12⟩
Conference papers hal-01800117v1
Image document

Philanthropy on the Blockchain

Danushka Jayasinghe , Sheila Cobourne , Konstantinos Markantonakis , Raja Naeem Akram , Keith Mayes
11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.25-38, ⟨10.1007/978-3-319-93524-9_2⟩
Conference papers hal-01875527v1
Image document

Pairing-Based Cryptography on the Internet of Things: A Feasibility Study

Ioanna Karantaidou , Spyros T. Halkidis , Sophia Petridou , Lefteris Mamatas , George Stephanides
International Conference on Wired/Wireless Internet Communication (WWIC), Jun 2018, Boston, MA, United States. pp.219-230, ⟨10.1007/978-3-030-02931-9_18⟩
Conference papers hal-02269719v1
Image document

Fmeter: Extracting Indexable Low-Level System Signatures by Counting Kernel Function Calls

Tudor Marian , Hakim Weatherspoon , Ki-Suh Lee , Abhishek Sagar
13th International Middleware Conference (MIDDLEWARE), Dec 2012, Montreal, QC, Canada. pp.81-100, ⟨10.1007/978-3-642-35170-9_5⟩
Conference papers hal-01555553v1
Image document

Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures

Michael Braun , Ulrike Meyer , Susanne Wetzel
4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.122-137, ⟨10.1007/978-3-642-12368-9_9⟩
Conference papers hal-01056062v1