Denise Demirel

According to our database1, Denise Demirel authored at least 36 papers between 2011 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
The Status of Quantum-Key-Distribution-Based Long-Term Secure Internet Communication.
IEEE Trans. Sustain. Comput., 2021

2018
Function-Dependent Commitments for Verifiable Multi-Party Computation.
IACR Cryptol. ePrint Arch., 2018

2017
Privately and Publicly Verifiable Computing Techniques - A Survey
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-53798-6, 2017

AS<sup>3</sup>: Adaptive Social Secret Sharing for Distributed Storage Systems.
IACR Cryptol. ePrint Arch., 2017

Performing Computations on Hierarchically Shared Secrets.
IACR Cryptol. ePrint Arch., 2017

Dynamic and Verifiable Hierarchical Secret Sharing.
IACR Cryptol. ePrint Arch., 2017

Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems.
IACR Cryptol. ePrint Arch., 2017

Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability.
IACR Cryptol. ePrint Arch., 2017

Efficient Proactive Secret Sharing.
IACR Cryptol. ePrint Arch., 2017

The Status of Quantum-Based Long-Term Secure Communication over the Internet.
CoRR, 2017

Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems (Short Paper).
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

MoPS: A Modular Protection Scheme for Long-Term Storage.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

LINCOS: A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Homomorphic Signature Schemes - A Survey
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-32115-8, 2016

An Unconditionally Hiding Auditing Procedure for Multi-Party Computations.
IACR Cryptol. ePrint Arch., 2016

LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality (Full Paper).
IACR Cryptol. ePrint Arch., 2016

A security analysis of techniques for long-term integrity protection.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Formal Policy-Based Provenance Audit.
Proceedings of the Advances in Information and Computer Security, 2016

An unconditionally hiding auditing procedure for computations over distributed data.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

Efficient and Privacy Preserving Third Party Auditing for a Distributed Storage System.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
How to Securely Prolong the Computational Bindingness of Pedersen Commitments.
IACR Cryptol. ePrint Arch., 2015

An Unconditionally Hiding and Long-Term Binding Post-Quantum Commitment Scheme.
IACR Cryptol. ePrint Arch., 2015

Towards a New Paradigm for Privacy and Security in Cloud Services.
Proceedings of the Cyber Security and Privacy, 2015

On the Security of Long-Lived Archiving Systems Based on the Evidence Record Syntax.
Proceedings of the Codes, Cryptology, and Information Security, 2015

2014
A privacy-enhancing protocol that provides in-network data aggregation and verifiable smart meter billing.
Proceedings of the IEEE Symposium on Computers and Communications, 2014

An efficient time-stamping solution for long-term digital archiving.
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014

A Performance Analysis of Long-Term Archiving Techniques.
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014

2013
Universally verifiable poll-site voting schemes providing everlasting privacy.
PhD thesis, 2013

Prêt à Voter Providing Everlasting Privacy.
Proceedings of the E-Voting and Identify - 4th International Conference, 2013

Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy.
Proceedings of the Financial Cryptography and Data Security, 2013

2012
A Publicly-Veri able Mix-net with Everlasting Privacy Towards Observers.
IACR Cryptol. ePrint Arch., 2012

Improving Helios with Everlasting Privacy Towards the Public.
Proceedings of the 2012 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2012

Random Block Verification: Improving the Norwegian Electoral Mix-Net.
Proceedings of the 5th International Conference on Electronic Voting 2012, 2012

2011
Feasibility Analysis of Prêt à Voter for German Federal Elections.
Proceedings of the E-Voting and Identity - Third International Conference, 2011

Vote casting device with VV-SV-PAT for elections with complicated ballot papers.
Proceedings of the 2011 International Workshop on Requirements Engineering for Electronic Voting Systems, 2011

Side-channels and eVoting machine security: Identifying vulnerabilities and defining requirements.
Proceedings of the 2011 International Workshop on Requirements Engineering for Electronic Voting Systems, 2011


  Loading...