Search
for Author
All Reviews
Preneel, Bart
Options:
All Media Types
Journals
Proceedings
Div Books
Whole Books
Other
Date Reviewed
Title
Author
Publisher
Published Date
Descending
Ascending
Date Reviewed
1
-
4
of
4
reviews
For some eyes only: protecting online information sharing
Beato F., Ion I., Čapkun S., Preneel B., Langheinrich M. CODASPY 2013 (Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy, San Antonio, TX, Feb 18-20, 2013) 1-12, 2013. Type: Proceedings
This paper addresses an interesting data security and privacy issue on online sharing platforms. The authors propose a carefully designed system with strong user-side encryption. A notable feature of this system is that the ciphertext ...
...
Jul 12 2013
A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks
Wan Z., Ren K., Preneel B. Wireless network security (Proceedings of the First ACM Conference on Wireless Network Security, Alexandria, VA, 62-67, 2008. Type: Proceedings
The current challenge in wireless networking is providing users with flexibility and convenience, together with security and privacy, while they roam across several wireless networks. In this paper, Wan et al. discuss a secure roaming ...
...
Jul 2 2008
On the security of stepwise triangular systems
Wolf C., Braeken A., Preneel B. Designs, Codes and Cryptography 40(3): 285-302, 2006. Type: Article
Let
F
be a finite field of
q
elements and
P
′ be a system of quadratic polynomials
p
1
, ... ,
p
m
<...
...
Apr 11 2007
Hardware architectures for public key cryptography
Batina L., Örs S., Preneel B., Vandewalle J. Integration, the VLSI Journal 34(1-2): 1-64, 2003. Type: Article
This is a very interesting and comprehensive survey of hardware architectures for public key cryptography, focusing on the most common types: Rivest, Shamir, Adleman (RSA) and elliptic curve cryptography. After a short introduction, wh...
...
Oct 22 2003
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy