Author of the publication

BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems.

, and . ACSAC, page 219-228. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

HIMUTSIS: Hierarchical Multi-tier Adaptive Ad-Hoc Network Security Protocol Based on Signcryption Type Key Exchange Schemes., , and . ISCIS, volume 4263 of Lecture Notes in Computer Science, page 434-444. Springer, (2006)Towards Practical Post-quantum Signatures for Resource-Limited Internet of Things., and . ACSAC, page 119-130. ACM, (2021)Practical Immutable Signature Bouquets (PISB) for Authentication and Integrity in Outsourced Databases.. DBSec, volume 7964 of Lecture Notes in Computer Science, page 179-194. Springer, (2013)Three-tier satellite multicast security protocol based on ECMQV and IMC methods., , and . CAMAD, page 129-136. IEEE, (2006)Practical and secure dynamic searchable encryption via oblivious access on distributed data structure., , and . ACSAC, page 302-313. ACM, (2016)A Comprehensive Survey of Threshold Digital Signatures: NIST Standards, Post-Quantum Cryptography, Exotic Techniques, and Real-World Applications., and . CoRR, (2023)Envisioning the Future of Cyber Security in Post-Quantum Era: A Survey on PQ Standardization, Applications, Challenges and Opportunities., , , , and . CoRR, (2023)Proof-of-Useful-Randomness: Mitigating the Energy Waste in Blockchain Proof-of-Work., , and . SECRYPT, page 412-419. SCITEPRESS, (2021)Improved Merkle Cryptosystem (IMC)., , and . ISCIS, volume 4263 of Lecture Notes in Computer Science, page 924-934. Springer, (2006)Dynamic Searchable Symmetric Encryption with Minimal Leakage and Efficient Updates on Commodity Hardware., and . SAC, volume 9566 of Lecture Notes in Computer Science, page 241-259. Springer, (2015)