Gregory Neven
According to our database1,
Gregory Neven
authored at least 80 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IACR Cryptol. ePrint Arch., 2024
2023
2020
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the Security and Cryptography for Networks - 12th International Conference, 2020
Proceedings of the IEEE European Symposium on Security and Privacy, 2020
2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Proceedings of the Applied Cryptography and Network Security, 2019
2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Information Security - 21st International Conference, 2018
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018
Proceedings of the Applied Cryptography and Network Security, 2018
2017
Privacy-preserving attribute-based credentials in cooperative intelligent transport systems.
Proceedings of the 2017 IEEE Vehicular Networking Conference, 2017
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015
Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions.
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the Applied Cryptography and Network Security, 2015
Proceedings of the Attribute-based Credentials for Trust: Identity in the Information Society, 2015
Proceedings of the Attribute-based Credentials for Trust: Identity in the Information Society, 2015
2014
J. Inf. Secur. Appl., 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
Memento: How to Reconstruct Your Secrets from a Single Password in a Hostile Environment.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014
Better Zero-Knowledge Proofs for Lattice Encryption and Their Application to Group Signatures.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
2013
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013
Proceedings of the Policies and Research in Identity Management, 2013
2012
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012
Practical yet universally composable two-server password-authenticated secret sharing.
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
Proceedings of the Public Key Cryptography - PKC 2011, 2011
Proceedings of the Privacy and Identity Management for Life, 2011
Matching Privacy Policies and Preferences: Access Control, Obligations, Authorisations, and Downstream Usage.
Proceedings of the Privacy and Identity Management for Life, 2011
Proceedings of the Privacy and Identity Management for Life, 2011
2010
Exploiting cryptography for privacy-enhanced access control: A result of the PRIME Project.
J. Comput. Secur., 2010
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010
Proceedings of the Information and Communications Security - 12th International Conference, 2010
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010
Proceedings of the 6th Workshop on Digital Identity Management, 2010
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
2009
Proceedings of the Privacy and Identity Management for Life, 2009
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
2008
IET Inf. Secur., 2008
Proceedings of the Advances in Cryptology, 2008
2007
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
Protection and Retrieval of Encrypted Multimedia Content: When Cryptography Meets Signal Processing.
EURASIP J. Inf. Secur., 2007
Proceedings of the Automata, Languages and Programming, 34th International Colloquium, 2007
Proceedings of the Advances in Cryptology, 2007
Proceedings of the Computer Security, 2007
Proceedings of the Topics in Cryptology, 2007
Proceedings of the Advances in Cryptology, 2007
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007
2006
Proceedings of the Automata, Languages and Programming, 33rd International Colloquium, 2006
Proceedings of the Financial Cryptography and Data Security, 2006
Proceedings of the Topics in Cryptology, 2006
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006
2005
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions.
Proceedings of the Advances in Cryptology, 2005
2004
Proceedings of the Advances in Cryptology, 2004
2003
Secure Vickrey Auctions without a Trusted Third Party.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003
2002
Proceedings of the Advances in Cryptology, 2002
2001
On Securely Scheduling a Meeting.
Proceedings of the Trusted Information: The New Decade Challenge, 2001
Proceedings of the New Developments in Distributed Applications and Interoperable Systems, 2001
2000
On the Practical Feasibiltiy of Secure Distributed Computing: A Case Study.
Proceedings of the Information Security for Global Information Infrastructures, 2000
Proceedings of the Mobile Agents for Telecommunication Applications, 2000