The SCEAS System
Navigation Menu

Search the dblp DataBase


Javier Herranz: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Vanesa Daza, Javier Herranz, Germán Sáez
    Constructing General Dynamic Group Key Distribution Schemes with Decentralized User Join. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:464-475 [Conf]
  2. Raghav Bhaskar, Javier Herranz, Fabien Laguillaumie
    Efficient Authentication for Reactive Routing Protocols. [Citation Graph (0, 0)][DBLP]
    AINA (2), 2006, pp:57-61 [Conf]
  3. David Galindo, Javier Herranz, Eike Kiltz
    On the Generic Construction of Identity-Based Signatures with Additional Properties. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2006, pp:178-193 [Conf]
  4. Vanesa Daza, Javier Herranz, Germán Sáez
    Some Protocols Useful on the Internet from Threshold Signature Schemes. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2003, pp:359-363 [Conf]
  5. Javier Herranz, Germán Sáez
    Ring Signature Schemes for General Ad-Hoc Access Structures. [Citation Graph (0, 0)][DBLP]
    ESAS, 2004, pp:54-65 [Conf]
  6. Javier Herranz, Germán Sáez
    Verifiable Secret Sharing for General Access Structures, with Application to Fully Distributed Proxy Signatures. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2003, pp:286-302 [Conf]
  7. David Galindo, Javier Herranz
    A Generic Construction for Token-Controlled Public Key Encryption. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2006, pp:177-190 [Conf]
  8. Javier Herranz, Germán Sáez
    New Identity-Based Ring Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:27-39 [Conf]
  9. Javier Herranz, Germán Sáez
    Forking Lemmas for Ring Signature Schemes. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2003, pp:266-279 [Conf]
  10. Javier Herranz, Germán Sáez
    Revisiting Fully Distributed Proxy Signature Schemes. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:356-370 [Conf]
  11. Javier Herranz, Fabien Laguillaumie
    Blind Ring Signatures Secure Under the Chosen-Target-CDH Assumption. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:117-130 [Conf]
  12. Javier Herranz, Carles Padró, Germán Sáez
    Distributed RSA Signature Schemes for General Access Structures. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:122-136 [Conf]
  13. Vanesa Daza, Javier Herranz, Carles Padró, Germán Sáez
    A Distributed and Computationally Secure Key Distribution Scheme. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:342-356 [Conf]
  14. Javier Herranz
    A formal proof of security of Zhang and Kim's ID-based ring signature scheme. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2004, pp:63-72 [Conf]
  15. Giovanni Di Crescenzo, Javier Herranz, Germán Sáez
    Reducing Server Trust in Private Proxy Auctions. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2004, pp:80-89 [Conf]
  16. Javier Herranz, Jorge Luis Villar
    An Unbalanced Protocol for Group Key Exchange. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2004, pp:172-180 [Conf]
  17. Javier Herranz
    Deterministic Identity-Based Signatures for Partial Aggregation. [Citation Graph (0, 0)][DBLP]
    Comput. J., 2006, v:49, n:3, pp:322-330 [Journal]
  18. Javier Herranz, Germán Sáez
    Distributed Ring Signatures from General Dual Access Structures. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2006, v:40, n:1, pp:103-120 [Journal]
  19. Vanesa Daza, Javier Herranz, Germán Sáez
    Protocols useful on the Internet from distributed signature schemes. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2004, v:3, n:2, pp:61-69 [Journal]
  20. Vanesa Daza, Javier Herranz, Paz Morillo, Carla Ràfols
    CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts. [Citation Graph (0, 0)][DBLP]
    ProvSec, 2007, pp:35-50 [Conf]

  21. A Cryptographic Solution for Private Distributed Simple Meeting Scheduling. [Citation Graph (, )][DBLP]

  22. Additively Homomorphic Encryption with d-Operand Multiplications. [Citation Graph (, )][DBLP]

  23. Attribute selection in multivariate microaggregation. [Citation Graph (, )][DBLP]

  24. Distributed Privacy-Preserving Methods for Statistical Disclosure Control. [Citation Graph (, )][DBLP]

  25. Partial Symbol Ordering Distance. [Citation Graph (, )][DBLP]

  26. Constant Size Ciphertexts in Threshold Attribute-Based Encryption. [Citation Graph (, )][DBLP]

  27. Towards a More Realistic Disclosure Risk Assessment. [Citation Graph (, )][DBLP]

  28. Cryptographic techniques for mobile ad-hoc networks. [Citation Graph (, )][DBLP]

  29. On the disclosure risk of multivariate microaggregation. [Citation Graph (, )][DBLP]

  30. Rethinking rank swapping to decrease disclosure risk. [Citation Graph (, )][DBLP]

  31. Ad-Hoc Threshold Broadcast Encryption with Shorter Ciphertexts. [Citation Graph (, )][DBLP]

Search in 0.022secs, Finished in 0.023secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002