Author of the publication

BAF and FI-BAF: Efficient and Publicly Verifiable Cryptographic Schemes for Secure Logging in Resource-Constrained Systems.

, , and . ACM Trans. Inf. Syst. Secur., 15 (2): 9:1-9:28 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

HIMUTSIS: Hierarchical Multi-tier Adaptive Ad-Hoc Network Security Protocol Based on Signcryption Type Key Exchange Schemes., , and . ISCIS, volume 4263 of Lecture Notes in Computer Science, page 434-444. Springer, (2006)Towards Practical Post-quantum Signatures for Resource-Limited Internet of Things., and . ACSAC, page 119-130. ACM, (2021)Practical Immutable Signature Bouquets (PISB) for Authentication and Integrity in Outsourced Databases.. DBSec, volume 7964 of Lecture Notes in Computer Science, page 179-194. Springer, (2013)Three-tier satellite multicast security protocol based on ECMQV and IMC methods., , and . CAMAD, page 129-136. IEEE, (2006)Envisioning the Future of Cyber Security in Post-Quantum Era: A Survey on PQ Standardization, Applications, Challenges and Opportunities., , , , and . CoRR, (2023)A Comprehensive Survey of Threshold Digital Signatures: NIST Standards, Post-Quantum Cryptography, Exotic Techniques, and Real-World Applications., and . CoRR, (2023)Proof-of-Useful-Randomness: Mitigating the Energy Waste in Blockchain Proof-of-Work., , and . SECRYPT, page 412-419. SCITEPRESS, (2021)Practical and secure dynamic searchable encryption via oblivious access on distributed data structure., , and . ACSAC, page 302-313. ACM, (2016)Improved Merkle Cryptosystem (IMC)., , and . ISCIS, volume 4263 of Lecture Notes in Computer Science, page 924-934. Springer, (2006)Dynamic Searchable Symmetric Encryption with Minimal Leakage and Efficient Updates on Commodity Hardware., and . SAC, volume 9566 of Lecture Notes in Computer Science, page 241-259. Springer, (2015)