Browse by Person
![]() | Up a level |
Fleischhacker, N. ; Günther, F. ; Kiefer, F. ; Poettering, B. (2013):
Pseudorandom Signatures.
In: >8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), 7-10 May, Hangzhou, China, [Article]
Manulis, M. ; Poettering, B. (2011):
Affiliation-Hiding Authentication with Minimal Bandwidth Consumption.
In: 5th IFIP WG 11.2 International Workshop on Information Security Theory and Practice (WISTP 2011),
[Conference or Workshop Item]
De Cristofaro, E. ; Manulis, M. ; Poettering, B. (2011):
Private Discovery of Common Social Contacts.
In: 9th International Conference on Applied Cryptography and Network Security (ACNS 2011),
[Conference or Workshop Item]
Manulis, M. ; Poettering, B. (2011):
Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation.
In: ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011),
[Conference or Workshop Item]