Essam Ghadafi

Orcid: 0000-0003-4897-0180

According to our database1, Essam Ghadafi authored at least 30 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Privacy-Preserving Mutual Authentication Protocol With Forward Secrecy for IoT-Edge-Cloud.
IEEE Internet Things J., 2024

2023
Defending against adversarial machine learning attacks using hierarchical learning: A case study on network traffic attack classification.
J. Inf. Secur. Appl., 2023

2022
Functionality-Preserving Adversarial Machine Learning for Robust Classification in Cybersecurity and Intrusion Detection Domains: A Survey.
J. Cybersecur. Priv., March, 2022

Leveraging Patient Information Sharing Using Blockchain-Based Distributed Networks.
IEEE Access, 2022

2021
Adventures of a Light Blockchain Protocol in a Forest of Transactions: A Subset of a Story.
IEEE Access, 2021

Feature Vulnerability and Robustness Assessment against Adversarial Machine Learning Attacks.
Proceedings of the International Conference on Cyber Situational Awareness, 2021

2020
Foundations of Fully Dynamic Group Signatures.
J. Cryptol., 2020

Partially Structure-Preserving Signatures: Lower Bounds, Constructions and More.
IACR Cryptol. ePrint Arch., 2020

2018
Further Lower Bounds for Structure-Preserving Signatures in Asymmetric Bilinear Groups.
IACR Cryptol. ePrint Arch., 2018

2017
Towards a Classification of Non-interactive Computational Assumptions in Cyclic Groups.
IACR Cryptol. ePrint Arch., 2017

How Low Can You Go? Short Structure-Preserving Signatures for Diffie-Hellman Vectors.
IACR Cryptol. ePrint Arch., 2017

Efficient Round-Optimal Blind Signatures in the Standard Model.
IACR Cryptol. ePrint Arch., 2017

Linear-Time Zero-Knowledge Proofs for Arithmetic Circuit Satisfiability.
IACR Cryptol. ePrint Arch., 2017

Attribute-Based Signatures with User-Controlled Linkability Without Random Oracles.
Proceedings of the Cryptography and Coding - 16th IMA International Conference, 2017

Subset Signatures with Controlled Context-Hiding.
Proceedings of the Cryptography and Coding - 16th IMA International Conference, 2017

2016
More Efficient Structure-Preserving Signatures - Or: Bypassing the Type-III Lower Bounds.
IACR Cryptol. ePrint Arch., 2016

2015
Short Structure-Preserving Signatures.
IACR Cryptol. ePrint Arch., 2015

Short Accountable Ring Signatures Based on DDH.
IACR Cryptol. ePrint Arch., 2015

2014
Efficient Distributed Tag-Based Encryption and its Application to Group Signatures with Efficient Distributed Traceability.
IACR Cryptol. ePrint Arch., 2014

Stronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient Constructions.
IACR Cryptol. ePrint Arch., 2014

Attribute-Based Signatures with User-Controlled Linkability.
Proceedings of the Cryptology and Network Security - 13th International Conference, 2014

2013
Anonymous attestation with user-controlled linkability.
Int. J. Inf. Sec., 2013

Decentralized Traceable Attribute-Based Signatures.
IACR Cryptol. ePrint Arch., 2013

Sub-linear Blind Ring Signatures without Random Oracles.
IACR Cryptol. ePrint Arch., 2013

2012
Efficient Signatures of Knowledge and DAA in the Standard Model.
IACR Cryptol. ePrint Arch., 2012

2011
Practical privacy-preserving cryptographic protocols.
PhD thesis, 2011

Formalizing Group Blind Signatures and Practical Constructions without Random Oracles.
IACR Cryptol. ePrint Arch., 2011

2010
Efficient Two-Move Blind Signatures in the Common Reference String Model.
IACR Cryptol. ePrint Arch., 2010

2009
Groth-Sahai proofs revisited.
IACR Cryptol. ePrint Arch., 2009

Practical Zero-Knowledge Proofs for Circuit Evaluation.
Proceedings of the Cryptography and Coding, 2009


  Loading...