The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Brent Waters: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Xavier Boyen, Qixiang Mei, Brent Waters
    Direct chosen ciphertext security from identity-based techniques. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:320-329 [Conf]
  2. Brent Waters, Ari Juels, J. Alex Halderman, Edward W. Felten
    New client puzzle outsourcing techniques for DoS resistance. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:246-256 [Conf]
  3. Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Waters
    Attribute-based encryption for fine-grained access control of encrypted data. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:89-98 [Conf]
  4. Matthew Pirretti, Patrick Traynor, Patrick McDaniel, Brent Waters
    Secure attribute-based systems. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:99-112 [Conf]
  5. Xavier Boyen, Hovav Shacham, Emily Shen, Brent Waters
    Forward-secure signatures with untrusted update. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:191-200 [Conf]
  6. Dan Boneh, Brent Waters
    A fully collusion resistant broadcast, trace, and revoke system. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:211-220 [Conf]
  7. Dan Boneh, Craig Gentry, Brent Waters
    Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:258-275 [Conf]
  8. Xavier Boyen, Brent Waters
    Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2006, pp:290-307 [Conf]
  9. Dan Boneh, Amit Sahai, Brent Waters
    Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:573-592 [Conf]
  10. Xavier Boyen, Brent Waters
    Compact Group Signatures Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:427-444 [Conf]
  11. Steve Lu, Rafail Ostrovsky, Amit Sahai, Hovav Shacham, Brent Waters
    Sequential Aggregate Signatures and Multisignatures Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:465-485 [Conf]
  12. Amit Sahai, Brent Waters
    Fuzzy Identity-Based Encryption. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2005, pp:457-473 [Conf]
  13. Brent Waters
    Efficient Identity-Based Encryption Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2005, pp:114-127 [Conf]
  14. Adam Barth, Dan Boneh, Brent Waters
    Privacy in Encrypted Content Distribution Using Private Broadcast Encryption. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2006, pp:52-64 [Conf]
  15. Dan Boneh, Emily Shen, Brent Waters
    Strongly Unforgeable Signatures Based on Computational Diffie-Hellman. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:229-240 [Conf]
  16. John Bethencourt, Dawn Xiaodong Song, Brent Waters
    New Constructions and Practical Applications for Private Stream Searching (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:132-139 [Conf]
  17. John Bethencourt, Amit Sahai, Brent Waters
    Ciphertext-Policy Attribute-Based Encryption. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:321-334 [Conf]
  18. Dan Boneh, Brent Waters
    Conjunctive, Subset, and Range Queries on Encrypted Data. [Citation Graph (0, 0)][DBLP]
    TCC, 2007, pp:535-554 [Conf]
  19. J. Alex Halderman, Brent Waters, Edward W. Felten
    A convenient method for securely managing passwords. [Citation Graph (0, 0)][DBLP]
    WWW, 2005, pp:471-479 [Conf]
  20. Hovav Shacham, Brent Waters
    Efficient Ring Signatures Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:166-180 [Conf]
  21. Xavier Boyen, Brent Waters
    Full-Domain Subgroup Hiding and Constant-Size Group Signatures. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:1-15 [Conf]

  22. Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions. [Citation Graph (, )][DBLP]


  23. Compact Proofs of Retrievability. [Citation Graph (, )][DBLP]


  24. Attribute-based encryption with non-monotonic access structures. [Citation Graph (, )][DBLP]


  25. Harvesting verifiable challenges from oblivious online sources. [Citation Graph (, )][DBLP]


  26. Black-box accountable authority identity-based encryption. [Citation Graph (, )][DBLP]


  27. Efficient pseudorandom functions from the decisional linear assumption and weaker variants. [Citation Graph (, )][DBLP]


  28. A Framework for Efficient and Composable Oblivious Transfer. [Citation Graph (, )][DBLP]


  29. Short and Stateless Signatures from the RSA Assumption. [Citation Graph (, )][DBLP]


  30. Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions. [Citation Graph (, )][DBLP]


  31. Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products. [Citation Graph (, )][DBLP]


  32. Realizing Hash-and-Sign Signatures under Standard Assumptions. [Citation Graph (, )][DBLP]


  33. Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts). [Citation Graph (, )][DBLP]


  34. Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption. [Citation Graph (, )][DBLP]


  35. Constructing Verifiable Random Functions with Large Input Spaces. [Citation Graph (, )][DBLP]


  36. On the Impossibility of Basing Identity Based Encryption on Trapdoor Permutations. [Citation Graph (, )][DBLP]


  37. Delegating Capabilities in Predicate Encryption Systems. [Citation Graph (, )][DBLP]


  38. Cryptographic Methods for Storing Ballots on a Voting Machine. [Citation Graph (, )][DBLP]


  39. Analysis-Resistant Malware. [Citation Graph (, )][DBLP]


  40. Signing a Linear Subspace: Signature Schemes for Network Coding. [Citation Graph (, )][DBLP]


  41. Revocation Systems with Very Small Private Keys. [Citation Graph (, )][DBLP]


  42. Lossy trapdoor functions and their applications. [Citation Graph (, )][DBLP]


  43. Predicate Privacy in Encryption Systems. [Citation Graph (, )][DBLP]


  44. New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts. [Citation Graph (, )][DBLP]


  45. Lossy Trapdoor Functions and Their Applications. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002