Author of the publication

BAF and FI-BAF: Efficient and Publicly Verifiable Cryptographic Schemes for Secure Logging in Resource-Constrained Systems.

, , and . ACM Trans. Inf. Syst. Secur., 15 (2): 9:1-9:28 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On k-Set Consensus Problems in Asynchronous Systems., , and . IEEE Trans. Parallel Distributed Syst., 12 (1): 7-21 (2001)Toward strong, usable access control for shared distributed data., , , , , , , and . FAST, page 89-103. USENIX, (2014)Space-Efficient Block Storage Integrity., and . NDSS, The Internet Society, (2005)Consumable Credentials in Linear-Logic-Based Access-Control Systems., , , , and . NDSS, The Internet Society, (2007)Statistical Privacy for Streaming Traffic., , , and . NDSS, The Internet Society, (2019)The Design and Analysis of Graphical Passwords., , , , and . USENIX Security Symposium, USENIX Association, (1999)Integrity Checking in Cryptographic File Systems with Constant Trusted Storage., and . USENIX Security Symposium, USENIX Association, (2007)On Web Browsing Privacy in Anonymized NetFlows., , , , and . USENIX Security Symposium, USENIX Association, (2007)Communication-Efficient BFT Using Small Trusted Hardware to Tolerate Minority Corruption., , , and . OPODIS, volume 253 of LIPIcs, page 24:1-24:23. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2022)Using voice to generate cryptographic keys., , , and . Odyssey, page 237-242. ISCA, (2001)