Search the dblp DataBase
Javier Herranz :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Vanesa Daza , Javier Herranz , Germán Sáez Constructing General Dynamic Group Key Distribution Schemes with Decentralized User Join. [Citation Graph (0, 0)][DBLP ] ACISP, 2003, pp:464-475 [Conf ] Raghav Bhaskar , Javier Herranz , Fabien Laguillaumie Efficient Authentication for Reactive Routing Protocols. [Citation Graph (0, 0)][DBLP ] AINA (2), 2006, pp:57-61 [Conf ] David Galindo , Javier Herranz , Eike Kiltz On the Generic Construction of Identity-Based Signatures with Additional Properties. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2006, pp:178-193 [Conf ] Vanesa Daza , Javier Herranz , Germán Sáez Some Protocols Useful on the Internet from Threshold Signature Schemes. [Citation Graph (0, 0)][DBLP ] DEXA Workshops, 2003, pp:359-363 [Conf ] Javier Herranz , Germán Sáez Ring Signature Schemes for General Ad-Hoc Access Structures. [Citation Graph (0, 0)][DBLP ] ESAS, 2004, pp:54-65 [Conf ] Javier Herranz , Germán Sáez Verifiable Secret Sharing for General Access Structures, with Application to Fully Distributed Proxy Signatures. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2003, pp:286-302 [Conf ] David Galindo , Javier Herranz A Generic Construction for Token-Controlled Public Key Encryption. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2006, pp:177-190 [Conf ] Javier Herranz , Germán Sáez New Identity-Based Ring Signature Schemes. [Citation Graph (0, 0)][DBLP ] ICICS, 2004, pp:27-39 [Conf ] Javier Herranz , Germán Sáez Forking Lemmas for Ring Signature Schemes. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2003, pp:266-279 [Conf ] Javier Herranz , Germán Sáez Revisiting Fully Distributed Proxy Signature Schemes. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2004, pp:356-370 [Conf ] Javier Herranz , Fabien Laguillaumie Blind Ring Signatures Secure Under the Chosen-Target-CDH Assumption. [Citation Graph (0, 0)][DBLP ] ISC, 2006, pp:117-130 [Conf ] Javier Herranz , Carles Padró , Germán Sáez Distributed RSA Signature Schemes for General Access Structures. [Citation Graph (0, 0)][DBLP ] ISC, 2003, pp:122-136 [Conf ] Vanesa Daza , Javier Herranz , Carles Padró , Germán Sáez A Distributed and Computationally Secure Key Distribution Scheme. [Citation Graph (0, 0)][DBLP ] ISC, 2002, pp:342-356 [Conf ] Javier Herranz A formal proof of security of Zhang and Kim's ID-based ring signature scheme. [Citation Graph (0, 0)][DBLP ] WOSIS, 2004, pp:63-72 [Conf ] Giovanni Di Crescenzo , Javier Herranz , Germán Sáez Reducing Server Trust in Private Proxy Auctions. [Citation Graph (0, 0)][DBLP ] TrustBus, 2004, pp:80-89 [Conf ] Javier Herranz , Jorge Luis Villar An Unbalanced Protocol for Group Key Exchange. [Citation Graph (0, 0)][DBLP ] TrustBus, 2004, pp:172-180 [Conf ] Javier Herranz Deterministic Identity-Based Signatures for Partial Aggregation. [Citation Graph (0, 0)][DBLP ] Comput. J., 2006, v:49, n:3, pp:322-330 [Journal ] Javier Herranz , Germán Sáez Distributed Ring Signatures from General Dual Access Structures. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 2006, v:40, n:1, pp:103-120 [Journal ] Vanesa Daza , Javier Herranz , Germán Sáez Protocols useful on the Internet from distributed signature schemes. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2004, v:3, n:2, pp:61-69 [Journal ] Vanesa Daza , Javier Herranz , Paz Morillo , Carla Ràfols CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts. [Citation Graph (0, 0)][DBLP ] ProvSec, 2007, pp:35-50 [Conf ] A Cryptographic Solution for Private Distributed Simple Meeting Scheduling. [Citation Graph (, )][DBLP ] Additively Homomorphic Encryption with d -Operand Multiplications. [Citation Graph (, )][DBLP ] Attribute selection in multivariate microaggregation. [Citation Graph (, )][DBLP ] Distributed Privacy-Preserving Methods for Statistical Disclosure Control. [Citation Graph (, )][DBLP ] Partial Symbol Ordering Distance. [Citation Graph (, )][DBLP ] Constant Size Ciphertexts in Threshold Attribute-Based Encryption. [Citation Graph (, )][DBLP ] Towards a More Realistic Disclosure Risk Assessment. [Citation Graph (, )][DBLP ] Cryptographic techniques for mobile ad-hoc networks. [Citation Graph (, )][DBLP ] On the disclosure risk of multivariate microaggregation. [Citation Graph (, )][DBLP ] Rethinking rank swapping to decrease disclosure risk. [Citation Graph (, )][DBLP ] Ad-Hoc Threshold Broadcast Encryption with Shorter Ciphertexts. [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.327secs