Παρακολούθηση
Mario Strefler
Mario Strefler
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα kit.edu
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts
DH Phan, D Pointcheval, SF Shahandashti, M Strefler
International journal of information security 12 (4), 251-265, 2013
1102013
On the joint security of encryption and signature in EMV
JP Degabriele, A Lehmann, KG Paterson, NP Smart, M Strefler
Cryptographers’ Track at the RSA Conference, 116-135, 2012
732012
Decentralized dynamic broadcast encryption
DH Phan, D Pointcheval, M Strefler
International Conference on Security and Cryptography for Networks, 166-183, 2012
432012
Security notions for broadcast encryption
DH Phan, D Pointcheval, M Strefler
International Conference on Applied Cryptography and Network Security, 377-394, 2011
322011
A Practical Attack Against the Use of RC4 in the HIVE Hidden Volume Encryption System
KG Paterson, M Strefler
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
112015
Partnership in key exchange protocols
K Kobara, S Shin, M Strefler
Proceedings of the 4th International Symposium on Information, Computer, and …, 2009
92009
Towards secure cloud computing
C Henrich, M Huber, C Kempka, J Muller-Quade, M Strefler
LECTURE NOTES IN COMPUTER SCIENCE 1 (5873), 785-786, 2009
9*2009
Message-based traitor tracing with optimal ciphertext rate
DH Phan, D Pointcheval, M Strefler
International Conference on Cryptology and Information Security in Latin …, 2012
82012
Brief Announcement: Towards secure cloud computing
C Henrich, M Huber, C Kempka, J Müller-Quade, M Strefler
Symposium on Self-Stabilizing Systems, 785-786, 2009
52009
Broadcast Encryption with Traitor Tracing
M Strefler
Ecole Normale Supérieure de Paris-ENS Paris, 2013
3*2013
Invisible Adaptive Attacks.
JB Nielsen, M Strefler
IACR Cryptology ePrint Archive 2014, 597, 2014
22014
Tor und JAP: Umsetzung von Anonymitätstechniken
M Strefler
Datenschutz in Kommunikationsnet-zen, 33, 2006
2006
Computational and Symbolic Proofs of Security: a short report
M Strefler, C Su, V Suppakitpaisarn, I Suzuki, A Turrini
A New Security Model for Key Exchange
H Imai, J Müller-Quade, M Strefler, K Kobara, SH Shin, DID Kraschewski
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–14