|
Search the dblp DataBase
Eu-Jin Goh:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Hovav Shacham, Matthew Page, Ben Pfaff, Eu-Jin Goh, Nagendra Modadugu, Dan Boneh
On the effectiveness of address-space randomization. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2004, pp:298-307 [Conf]
- Louis Kruger, Somesh Jha, Eu-Jin Goh, Dan Boneh
Secure function evaluation with ordered binary decision diagrams. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2006, pp:410-420 [Conf]
- Dan Boneh, Xavier Boyen, Eu-Jin Goh
Hierarchical Identity Based Encryption with Constant Size Ciphertext. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2005, pp:440-456 [Conf]
- Eu-Jin Goh, Stanislaw Jarecki
A Signature Scheme as Secure as the Diffie-Hellman Problem. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2003, pp:401-415 [Conf]
- Eu-Jin Goh, Philippe Golle
Event Driven Private Counters. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2005, pp:313-327 [Conf]
- Eu-Jin Goh, Dan Boneh, Benny Pinkas, Philippe Golle
The Design and Implementation of Protocol-Based Hidden Key Recovery. [Citation Graph (0, 0)][DBLP] ISC, 2003, pp:165-179 [Conf]
- Eu-Jin Goh, Hovav Shacham, Nagendra Modadugu, Dan Boneh
SiRiUS: Securing Remote Untrusted Storage. [Citation Graph (0, 0)][DBLP] NDSS, 2003, pp:- [Conf]
- Dan Boneh, Eu-Jin Goh, Kobbi Nissim
Evaluating 2-DNF Formulas on Ciphertexts. [Citation Graph (0, 0)][DBLP] TCC, 2005, pp:325-341 [Conf]
Covert channels in privacy-preserving identification systems. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|