Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Game-Set-MATCH: Using Mobile Devices for Seamless External-Facing Biometric Matching., , , and . ACM Conference on Computer and Communications Security, page 1351-1370. ACM, (2020)DiSE: Distributed Symmetric-key Encryption., , , and . ACM Conference on Computer and Communications Security, page 1993-2010. ACM, (2018)Minimal Connectivity for Unconditionally Secure Message Transmission in Synchronous Directed Networks., , and . ICITS, volume 6673 of Lecture Notes in Computer Science, page 32-51. Springer, (2011)Secure Message Transmission in Asynchronous Directed Graphs., , and . INDOCRYPT, volume 7107 of Lecture Notes in Computer Science, page 359-378. Springer, (2011)ParaDiSE: Efficient Threshold Authenticated Encryption in Fully Malicious Model., , , , and . INDOCRYPT, volume 13774 of Lecture Notes in Computer Science, page 26-51. Springer, (2022)2D-2FA: A New Dimension in Two-Factor Authentication., and . ACSAC, page 482-496. ACM, (2021)Optimal Computational Split-state Non-malleable Codes., , , , , and . TCC (A2), volume 9563 of Lecture Notes in Computer Science, page 393-417. Springer, (2016)CoRA: Collaborative Risk-Aware Authentication., , , , and . IACR Cryptol. ePrint Arch., (2022)BETA: Biometric-Enabled Threshold Authentication., , , , and . Public Key Cryptography (2), volume 12711 of Lecture Notes in Computer Science, page 290-318. Springer, (2021)Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions., and . EUROCRYPT (2), volume 10211 of Lecture Notes in Computer Science, page 30-61. (2017)