The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

John Malone-Lee: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi
    Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:205-222 [Conf]
  2. Jacques Stern, David Pointcheval, John Malone-Lee, Nigel P. Smart
    Flaws in Applying Proof Methodologies to Signature Schemes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2002, pp:93-110 [Conf]
  3. John Malone-Lee, Wenbo Mao
    Two Birds One Stone: Signcryption Using RSA. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2003, pp:211-225 [Conf]
  4. Michel Abdalla, Dario Catalano, Alexander W. Dent, John Malone-Lee, Gregory Neven, Nigel P. Smart
    Identity-Based Encryption Gone Wild. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:300-311 [Conf]
  5. Eike Kiltz, John Malone-Lee
    A General Construction of IND-CCA2 Secure Public Key Encryption. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2003, pp:152-166 [Conf]
  6. Alexander W. Dent, John Malone-Lee
    The Physically Observable Security of Signature Schemes. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2005, pp:220-232 [Conf]
  7. John Malone-Lee
    A General Construction for Simultaneous Signing and Encrypting. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2005, pp:116-135 [Conf]
  8. Liqun Chen, John Malone-Lee
    Improved Identity-Based Signcryption. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2005, pp:362-379 [Conf]
  9. John Malone-Lee, Nigel P. Smart
    Modifications of ECDSA. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2002, pp:1-12 [Conf]
  10. Dennis Hofheinz, John Malone-Lee, Martijn Stam
    Obfuscation for Cryptographic Purposes. [Citation Graph (0, 0)][DBLP]
    TCC, 2007, pp:214-232 [Conf]
  11. Eike Kiltz, Gregor Leander, John Malone-Lee
    Secure Computation of the Mean and Related Statistics. [Citation Graph (0, 0)][DBLP]
    TCC, 2005, pp:283-302 [Conf]
  12. John Malone-Lee
    Signcryption with Non-interactive Non-repudiation. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:37, n:1, pp:81-109 [Journal]
  13. Sattam S. Al-Riyami, John Malone-Lee, Nigel P. Smart
    Escrow-free encryption supporting cryptographic workflow. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2006, v:5, n:4, pp:217-229 [Journal]
  14. Steven D. Galbraith, John Malone-Lee, Nigel P. Smart
    Public key signatures in the multi-user setting. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2002, v:83, n:5, pp:263-266 [Journal]
  15. Michel Abdalla, Alexander W. Dent, John Malone-Lee, Gregory Neven, Duong Hieu Phan, Nigel P. Smart
    Identity-Based Traitor Tracing. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:361-376 [Conf]

Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002