The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Xavier Boyen: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Xavier Boyen, Daphne Koller
    Exploiting the Architecture of Dynamic Systems. [Citation Graph (0, 0)][DBLP]
    AAAI/IAAI, 1999, pp:313-320 [Conf]
  2. Xavier Boyen
    Reusable cryptographic fuzzy extractors. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:82-91 [Conf]
  3. Xavier Boyen, Qixiang Mei, Brent Waters
    Direct chosen ciphertext security from identity-based techniques. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:320-329 [Conf]
  4. Xavier Boyen, Hovav Shacham, Emily Shen, Brent Waters
    Forward-secure signatures with untrusted update. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:191-200 [Conf]
  5. Dan Boneh, Xavier Boyen
    Secure Identity Based Encryption Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2004, pp:443-459 [Conf]
  6. Dan Boneh, Xavier Boyen, Hovav Shacham
    Short Group Signatures. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2004, pp:41-55 [Conf]
  7. Xavier Boyen
    Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2003, pp:383-399 [Conf]
  8. Dan Boneh, Xavier Boyen
    On the Impossibility of Efficiently Combining Collision Resistant Hash Functions. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2006, pp:570-583 [Conf]
  9. Xavier Boyen, Brent Waters
    Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2006, pp:290-307 [Conf]
  10. Dan Boneh, Xavier Boyen, Shai Halevi
    Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2006, pp:226-243 [Conf]
  11. Dan Boneh, Xavier Boyen
    Short Signatures Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:56-73 [Conf]
  12. Dan Boneh, Xavier Boyen
    Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:223-238 [Conf]
  13. Dan Boneh, Xavier Boyen, Eu-Jin Goh
    Hierarchical Identity Based Encryption with Constant Size Ciphertext. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2005, pp:440-456 [Conf]
  14. Xavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafail Ostrovsky, Adam Smith
    Secure Remote Authentication Using Biometric Data. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2005, pp:147-163 [Conf]
  15. Xavier Boyen, Brent Waters
    Compact Group Signatures Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:427-444 [Conf]
  16. Xavier Boyen, Daphne Koller
    Approximate Learning of Dynamic Models. [Citation Graph (0, 0)][DBLP]
    NIPS, 1998, pp:396-402 [Conf]
  17. Xavier Boyen, Nir Friedman, Daphne Koller
    Discovering the Hidden Structure of Complex Dynamic Systems. [Citation Graph (0, 0)][DBLP]
    UAI, 1999, pp:91-100 [Conf]
  18. Xavier Boyen, Daphne Koller
    Tractable Inference for Complex Stochastic Processes. [Citation Graph (0, 0)][DBLP]
    UAI, 1998, pp:33-42 [Conf]
  19. Xavier Boyen
    Miniature CCA2 PK Encryption: Tight Security Without Redundancy. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2007, pp:485-501 [Conf]
  20. Xavier Boyen
    Mesh Signatures. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2007, pp:210-227 [Conf]
  21. Xavier Boyen
    General Ad Hoc Encryption from Exponent Inversion IBE. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2007, pp:394-411 [Conf]
  22. Xavier Boyen, Brent Waters
    Full-Domain Subgroup Hiding and Constant-Size Group Signatures. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:1-15 [Conf]

  23. New Paradigms for Password Security. [Citation Graph (, )][DBLP]


  24. Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions. [Citation Graph (, )][DBLP]


  25. HPAKE : Password Authentication Secure against Cross-Site User Impersonation. [Citation Graph (, )][DBLP]


  26. Hidden credential retrieval from a reusable password. [Citation Graph (, )][DBLP]


  27. Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE. [Citation Graph (, )][DBLP]


  28. Kamouflage: Loss-Resistant Password Management. [Citation Graph (, )][DBLP]


  29. Efficient Lattice (H)IBE in the Standard Model. [Citation Graph (, )][DBLP]


  30. Distributed Public-Key Cryptography from Weak Secrets. [Citation Graph (, )][DBLP]


  31. Preventing Pollution Attacks in Multi-source Network Coding. [Citation Graph (, )][DBLP]


  32. Lattice Mixing and Vanishing Trapdoors: A Framework for Fully Secure Short Signatures and More. [Citation Graph (, )][DBLP]


  33. Expressive Subgroup Signatures. [Citation Graph (, )][DBLP]


  34. The Uber-Assumption Family. [Citation Graph (, )][DBLP]


  35. Strong Cryptography from Weak Secrets. [Citation Graph (, )][DBLP]


Search in 0.028secs, Finished in 0.030secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002